5 minReverse Engineering Malware, Part 5: OllyDbg BasicsIn this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and...
4 minMetasploit Basics, Part 5: Using Metasploit for Reconnaissance (nmap, EternalBlue, SCADA, and MS SQLWelcome back, my rookie hackers! As you know, reconnaissance is a crucial part of the hacker/pentester's job. Without good...
3 minOpen Source Intelligence (OSINT): Reverse Image Searches for InvestigationsWelcome back, my aspiring OSINT experts! There is SO much data on the Internet that just about anything can be found, if you know how and...
4 minPassword Cracking: Creating a Custom Wordlist with crunchWelcome back, my aspiring cyberwarriors! In this series on password cracking, I have been attempting to develop your skills in the...