8 minMetasploit Basics for Hackers, Part 1: Getting Started with MetasploitWelcome back, my aspiring cyber warriors! In this series, I will introduce you to the world's most popular hacking/pentesting platform,...
3 minOpen Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.ioWelcome back, my aspiring cyberwarriors! Oftentimes, as cyberwarriors, we need to check to see whether our systems or others' are...
6 minThe Brief History of Russian Cyberattacks Against Ukraine and the Risks they Pose to the WestWelcome back, my cyber warriors! As the war in Ukraine rages on, it's important to keep in mind that this war didn't begin in February of...
3 minLinux Basics for Hackers, Part 14: Using the curl command to Download Web Site Source CodeWelcome back my aspiring cyber warriors! Now that you have mastered the Basics of Linux, let's begin looking at some of the more esoteric...