Search


Socat: The Advanced Hacker's Network Tool
Welcome back, my aspiring cyberwarriors! In the world of cybersecurity, certain tools become legendary not because they're flashy, but...
3 min read
372 views


SCADA/ICS Hacking and Security: Chinese APT, Volt Typhoon, Has Compromised Numerous Industrial Systems in the US!
Welcome back, aspiring cyberwarriors! In a cyberwar, SCADA and ICS industrial systems can be both a target and a weapon! Although the...
7 min read
329 views


NymVPN. Is This the World's Most Secure VPN?
Welcome back, my aspiring cyberwarriors! The landscape of digital privacy continues to evolve as surveillance capabilities expand...
4 min read
1,056 views


Open-Source Intelligence or OSINT: You Can’t Hide on Telegram!
Welcome back, aspiring cyberwarriors! A lot of people believe that the widely-used social media site, Telegram, offers them anonymity to...
10 min read
5,225 views


The Default Passwords of Nearly Every IP Camera
Welcome back, my aspiring camera hackers! As you know, at the beginning of the Russian invasion of Ukraine, the Ukrainian Army asked for...
1 min read
19,544 views


SDR (Signals Intelligence) for Hackers: Soon, all Cellphones will be Connected by Satellites
Welcome back, my aspiring cyberwarriors! In earlier posts here, we have described hacking satellite communication systems. While many...
6 min read
611 views


Cyber Threat Intelligence (CTI) and Network Defenses: Getting Started with CrowdSec
Welcome back, aspiring cyberwarriors! In the ever-evolving landscape of cybersecurity, new tools and approaches are constantly emerging...
5 min read
528 views


The Medusa Ransomware Threat: Anatomy of a Cybercrime Operation
Welcome back, aspiring cyberwarriors! In Greek mythology, Medusa was once a beautiful woman until Athena’s curse transformed her into a...
8 min read
1,040 views


Vulnerability Scanning: Automatic Search For Known CVEs With CVEScannerV2
Welcome back, aspiring cyberwarriors! During reconnaissance, our goal is to identify vulnerable services within our target’s network. To...
3 min read
1,364 views


Vagrant: Building Secure Testing Environments
Welcome back, aspiring cyberwarriors! Creating and managing virtual machines has traditionally been a tedious and time-consuming process....
5 min read
545 views


Cyberwar Mission #3: Using QRCodes in Phishing and Social Media Attacks
Welcome back, aspiring cyberwarriors. In this article, one of our fighters in Ukraine (Sierra) demonstrates how they use social...
8 min read
1,633 views


It's Time to Elevate Your Cybersecurity Game! Earn the Crown Jewel of Cybersecurity Certifications!
The CISSP is widely considered to be the premier cybersecurity certifications. The average salary in the US is almost $150,000 and I'll...
1 min read
176 views


VPN Hacking: How VPN's Work and How They Break Our Security
Welcome back, my aspiring cyberwarriors! In recent posts, I have emphasized the risks inherent in VPN's. Virtual Private Networks or...
34 min read
1,807 views


Physical Security: Single Pin Lockpicking for Hackers and Pentesters
Welcome back, my aspiring cyberwarriors! Physical security is often an overlooked area of cybersecurity. If the attacker can physical...
7 min read
523 views


Signal Intelligence with a Software Defined Radio (SDR): The Quiet Revolution in Cybersecurity and Cyberwarfare
Welcome back, aspiring cyberwarriors! Software-Defined Radio (SDR) has changed the way we communicate and conduct warfare. This...
4 min read
940 views


Malware Analysis: Process Injection in the REMCOS RAT
Process injection is one of those stealthy techniques malware loves to use to stay under the radar. By injecting malicious code into...
6 min read
813 views


Software Defined Radio Basics (Signals Intelligence) for Hackers, June 10-12
Welcome back, my aspiring open-source signals intelligence officers! A few years back, there was revolution in signals intelligence...
2 min read
2,192 views


OSINT: Tracking US Spy Planes Surveilling the Mexican Cartels
Welcome back, aspiring cyberwarriors! OSINT has applications in so many fields including pentesting, investigations, cybersecurity,...
3 min read
1,032 views


Introduction to the IoT/Embedded Linux: The OpenWRT Project
Welcome back, my aspiring cyberwarriors! As you know, the various mobile carriers around the world sell a device they often refer to as a...
3 min read
4,959 views


Bluetooth Hacking: Using Bettercap for BLE Reconnaissance and Attacks!
Welcome back, my aspiring cyberwarriors! Bluetooth is the most underappreciated attack vector into all your devices. Nearly all our...
4 min read
1,197 views