Search


Round 2 of the Great Cyberwar of 2022: Attacking Russia's Schneider Electric SCADA/ICS Sites
Welcome back, my cyber warriors! Round 1 of the Great Cyberwar of 2022 went to Ukraine and its allies from around the world. Among the...
3 min read
13,568 views


SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
For those who are coming from a traditional IT or IT security background, SCADA/ICS systems security can prove prove daunting. Many of...
4 min read
19,336 views


Linux Basics for Hackers, Part 14: Using the curl command to Download Web Site Source Code
Welcome back my aspiring cyber warriors! Now that you have mastered the Basics of Linux, let's begin looking at some of the more esoteric...
3 min read
7,149 views


Software Defined Radio, Part 6: Building a Cellphone IMSI Catcher (Stingray)
Welcome back, my aspiring RF hackers! Among the multitude of radio signals swirling around us everyday are the mobile telephone signals...
5 min read
68,479 views


Mr. Robot Hacks: How f/society Ransomed Evil Corp for $5.9 million
Welcome back, my greenhorn cyberwarriors! For those of you who are new to Mr. Robot, Elliot Alderson is an asocial IT security...
5 min read
9,656 views


Essentials Skills of a Professional Hacker
Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good, professional hacker?" As the...
5 min read
63,536 views


SCADA Hacking and Security: This is How the World Ends!
As the cyberwar to save Ukraine enters Round 2, SCADA/ICS is likely to become the target of both sides. In this article, I simply try to...
4 min read
13,022 views


The App That May Save Ukraine!
Welcome back, my cyberwarriors! I truly appreciate all of the work you have done to support the brave people of Ukraine. You are all...
2 min read
2,733 views


Finding Outdated and Vulnerable Systems in Russian Using Shodan
Welcome back, my cyberwarriors! The Russian invasion of Ukraine continues and the courageous people of Ukraine need our help. In previous...
2 min read
7,391 views


Open Source Intelligence (OSINT): Using Google Earth Pro Satellite Imagery for Investigations
Welcome back, my aspiring investigators! Open Source Intelligence (OSINT) is a very broad field with a multitude of applications...
4 min read
5,803 views


Getting Started Bug Bounty Hunting, March 15-17
If you ever dreamed of becoming a Bug Bounty Hunter, this is the course for you! Bounty hunting has grown dramatically in recent years...
1 min read
4,446 views


Network Forensics, Part 5: Wi-Fi (802.11) Forensics
Welcome back my aspiring DFIR analysts! In recent recent years, Wi-Fi has become ubiquitous throughout our home and working environments....
4 min read
3,958 views


Python Scripting for Hackers, Part 1: Getting Started
Welcome back, my hacker novitiates! I began this series on scripting a while back to teach all aspiring hackers how to write some basic...
4 min read
60,748 views


Using Your Cyberwarrior Skills to Catch a Terrorist
Welcome back, my aspiring cyberwarriors! Previously in my "Spy on Anyone" series, we used our hacking skills to turn a target's computer...
5 min read
2,367 views


Network Basics for Hackers, Part 3: Subnetting, Network Masks, and CIDR Basics
Welcome back, my aspiring cyber warriors! In this series, we are exploring networks of all kinds and how to break them. In this tutorial...
3 min read
15,234 views


Linux Firewalls: Creating an Application Layer IDS/IPS with fwsnort
Welcome back, my aspiring cyberwarriors! In a previous tutorial here, I introduced you to the Linux firewall, iptables. iptables enables...
3 min read
5,063 views


Reverse Engineering Malware: Getting Started with Ghidra, Part 1
Welcome back, my aspiring cyber warriors! There are a number of excellent tools available to use in the field of reverse engineering (see...
3 min read
19,299 views


Database Basics for Hackers, Part 1: Getting Started
Welcome back, my aspiring cyber warriors! Although there is a multitude of different hacker types and hacking techniques, the one target...
7 min read
3,998 views


Linux Basics for Hackers, Part 13: Running Kali Linux in Windows (WSL)
Welcome back my aspiring cyber warriors! As most of you know, I am the author of the best-selling book, Linux Basics for Hackers from No...
3 min read
11,241 views


Ransomware, Part 1: History and Evolution of Ransomware and Ransomware Attacks
Welcome back, my aspiring cyberwarriors! Recent events have once again emphasized the importance of SCADA security! On May 7, 2021,...
6 min read
1,415 views