4 minWi-Fi Hacking, Part 11: The PMKID Attack Welcome back, my aspiring cyber warriors! As you know, the key to hacking the WPA2-PSK is to capture the PSK (pre-shared key or password)...
3 minOpen Source Intelligence (OSINT): Facial Recognition for InvestigationsWelcome back, my aspiring OSINT investigators! Very often in an investigation, we have a picture and we are trying to identify the...
3 minOSINT: Google Hacking and Dorks to Find Key InformationAs all of us know, Google operates the most widely used Internet search engine on the planet. Google crawls nearly every web page, of...
5 minReverse Engineering Malware, Part 5: OllyDbg BasicsIn this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and...