5 min readLINUX FOR HACKERSLinux Firewalls: The Modern NFTable FirewallWelcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
4 min readNetwork Forensics, Part 5: Wi-Fi (802.11) ForensicsWelcome back my aspiring DFIR analysts! In recent recent years, Wi-Fi has become ubiquitous throughout our home and working environments....
5 min readREVERSE ENGINEERING MALWAREReverse Engineering Malware, Part 5: OllyDbg BasicsIn this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and...
5 min readREVERSE ENGINEERING MALWAREReverse Engineering Malware, Part 1: Getting StartedIn my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware....
3 min readDIGITAL FORENSICSDigital Forensics, Part 3: Recovering Deleted FilesIn the first two parts of this series, we captured a forensically sound image of the hard drive or other storage device and an image of...