7 min readCryptography Basics for Hackers, Part 1Welcome back, my aspiring cyberwarriors! As cyberwarriors, we are often faced with the hurdle or promise of cryptography and encryption....
5 min readMETASPLOITMetasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
4 min readWIRELESS HACKSWi-Fi (802.11) Hacking: How to Hack the WPS PIN with ReaverWelcome back, my budding hackers! One of the most popular areas for those starting out in this discipline is hacking Wi-Fi. Wi-Fi has...
5 min readPASSWORD CRACKINGOnline Password Cracking with THC-Hydra and BurpSuiteWelcome back, my fledgling hackers! In an earlier tutorial, I had introduced you to two essential tools for cracking online...
5 min readDATABASE HACKINGDatabase Hacking, Part 3: Using sqlmap for SQL Injection Against MySQL and WordPressSQL Injection is one of the most important and common attacks on web sites. Nearly every website has a database behind it containing...
7 min readMETASPLOITMetasploit Basics, Part 15: Post- Exploitation Fun (Web Cam, Microphone, Passwords and more)Welcome back, my fledgling hackers! As we have progressed through this series on Metasploit Basics, we have used numerous techniques to...
2 min readMETASPLOITMetasploit Basics, Part 14: Updating the msfconsoleWelcome back my novice hackers! Recently, I have received numerous questions regarding how to update the msfconsole built into Kali....
3 min readDIGITAL FORENSICSDigital Forensics, Part 3: Recovering Deleted FilesIn the first two parts of this series, we captured a forensically sound image of the hard drive or other storage device and an image of...