top of page
5 min read
How to Evade AV with OWASP-ZSC, Part 1
Among the tools available to create shellcode capable of going undetected by Anti-Virus (AV) software, OWASP-ZSC (Zero-day ShellCode)...
12,550 views
4 min read
PowerShell for Hackers, Part 1
As you know, I firmly believe that to be a true professional hacker, you need to be proficient in Linux. There are a number of good...
35,853 views
2 min read
OTW Recommended Products: VMWare, Kasperky and Palo Alto Networks
Many of my readers ask me for recommendations on products that I use. Beginning with this post I will list products that I endorse. In...
3,943 views
2 min read
Metasploit Basics, Part 6 :The Armitage Metasploit User Interface
Welcome back, my aspiring White Hat Hackers! In this series on the world's most popular exploitation framework, Metasploit, we have...
6,538 views
1 min read
Hackers-Arise Purchases Snort Training Institute
Today, Hackers-Arise announced the purchase of the Snort Training Institute! The Snort Training Institute is the premier training...
320 views
4 min read
SCADA Hacking: SCADA Risk Assessment with CSET
In an earlier article, I laid out some of the varied methods of risk assessment in SCADA/ICS systems from academia, government and...
2,440 views
4 min read
SCADA Hacking: Hacking the Schneider Electric TM221 Modicon PLC using modbus-cli
SCADA/ICS security is probably the most important and most overlooked field of cyber security. In an era where cyber warfare is an...
10,040 views
5 min read
Scripting for Hackers, Perl 2: Building a Port Scanner with Perl
Scripting skills are essential to ascend to the upper echelons of the hacker clique. Without scripting skills, you are dependent upon...
3,978 views
2 min read
Vault7 Reveals that Even the CIA Reverse Engineers Malware to Re-Use Code
The recent CIA data dump from Wikileaks named Vault7, reveals many things about the CIA's cyber intelligence efforts. For my part, the...
3,232 views
4 min read
SCADA Hacking: SCADA/ICS Risk Assessment and Management, Part 1
Introduction One of the most crucial activities involved in securing SCADA/ICS systems is the initial Risk Assessment. Risk assessment...
4,225 views
bottom of page