5 min read
Chinese State-Sponsored Hackers Inside the US Mobile Telecom System: Mobile Telecom Companies Vulnerable to SS7 Vulnerability
Welcome back, my rookie cyberwarriors! In recent weeks, a series of sophisticated cyber attacks has once again exposed critical...
323 views
2 min read
Bluetooth Hacking, January 28-30
Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT...
2,816 views
3 min read
Software Defined Radio (SDR) for Hackers: Setting Up Your HackRF One
Welcome back, my aspiring SDR hackers! In the previous tutorials in this series, we used the inexpensive but capable RTL-SDR for our...
56,509 views
5 min read
Mobile Telecom Networks for Hackers, Part 2
Welcome back, my aspiring cyberwarriors! In our modern digital era, mobile or cellular networks are the dominant mode of communication....
508 views
5 min read
Mobile Telecom Networks for Hackers, Part 1: Getting Started with Mobile Networks
Welcome back, my aspiring cyberwarriors! The world is rapidly becoming dominated by mobile cellular networks. Not long ago, telecom...
816 views
6 min read
Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance
Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. Most novices focus on the handset, but in reality, there are...
5,254 views
5 min read
IoT Hacking: RFID Basics for Hackers
Welcome back, my aspirational cyberwarriors! IoT devices are increasing at an exponential rate in our digital world. These IoT devices...
1,966 views
4 min read
Satellite Hacking: Hacking the Iridium Satellite System
Welcome back, my aspiring cyberwarriors! In our modern digital era, satellites have been used for numerous essential services, such as:...
1,350 views
2 min read
Radio Basics for Hackers, Part 3: Sampling
Welcome back my aspiring cyber warriors! Sampling is the process of converting a continuous signal into a discrete signal. In the context...
1,664 views
2 min read
Why YOU Should Study Software Defined Radio (SDR) for Hackers!
Hacking radio signals (RF) IS the leading edge of cybersecurity ! So many applications in our modern life use radio frequency elements...
14,271 views
6 min read
Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain
Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital...
2,009 views
3 min read
Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Welcome back, my aspiring RF hackers! Before embarking upon the study of SDR for Hackers it is good idea to take a close look at the...
39,066 views
6 min read
Radio Basics for Hackers, Part 1: Electromagnetic Radiation, Frequency and Wavelength
Welcome back, my aspiring cyberwarriors! As you already know, radio hacking is the leading edge of cybersecurity! So many things in our...
10,151 views
3 min read
Software Defined Radio for Hackers, Part 5: How to Track Aircraft with SDR
Welcome back, my aspiring radio hackers! Nearly every vehicle in the world gives off/sends out a radio signal of one type or another....
10,006 views
2 min read
Software Defined Radio (SDR) for Hackers: Radio Frequency Attack Methods
Welcome back, my aspiring radio hackers! With the advent of inexpensive radio devices such as the RTL-SDR, HackRF, LimeSDR and bladeRF,...
10,790 views
3 min read
Software Defined Radio(SDR) for Hackers, Part 4: Intercepting and Decoding Confidential Pager Data
Welcome back, my aspiring RF hackers! Although few people still use pagers, they were once a common communication device used by many...
4,345 views