Category Cyberwarrior

Wi-Fi Hacking: Inside DragonFly, the WPA3’s Next-Gen Wireless Authentication Protocol

Welcome back, aspiring cyberwarriors! On June 25, 2018, the Wi-Fi Alliance officially introduced WPA3, a new era for wireless security. While WPA2 has dominated the landscape for over a decade, the world has changed, threats have evolved, and so has…

Read MoreWi-Fi Hacking: Inside DragonFly, the WPA3’s Next-Gen Wireless Authentication Protocol

SCADA/ICS Security in Cyber Warfare: Exposing Vulnerabilities in Russian ICS Infrastructure

Welcome back, aspiring cyberwarriors. In today’s article we will explore Russian industrial control system (ICS), revealing vulnerabilities waiting to be exploited. These systems are critical, yet security often remains an afterthought. Even Russia, which has spent years aggressively hardening its…

Read MoreSCADA/ICS Security in Cyber Warfare: Exposing Vulnerabilities in Russian ICS Infrastructure

Now that the US Has Bombed Iran, Should We Expect Attacks Against US Critical Industrial Infrastructure (SCADA/ICS)?

Welcome back, my cyberwarriors! As the US and Iran lurch toward a military confrontation, we must ask whether the US and other western nations’ industrial facilities are at risk. Unquestionably, Iran does NOT have the military capabilities to counter the…

Read MoreNow that the US Has Bombed Iran, Should We Expect Attacks Against US Critical Industrial Infrastructure (SCADA/ICS)?

How Artificial Intelligence (AI) Large Language Models (LLMs) Work, Part 1

Welcome back, my aspiring cyberwarriors! We are living on the cusp of one of the most exciting eras in the history of technology! Artificial Intelligence (AI) is about to change everything we do and change the way the world operates.…

Read MoreHow Artificial Intelligence (AI) Large Language Models (LLMs) Work, Part 1

Pivoting within the Network: Getting Started with Chisel

Welcome back, aspiring cyberwarriors! When performing a penetration test or cyberwar mission, you’re typically not targeting just one computer. Often, you’re targeting multiple systems and need to move across the network, pivoting to gain further access to the environment. However,…

Read MorePivoting within the Network: Getting Started with Chisel

Signal Intelligence with a Software Defined Radio (SDR): The Quiet Revolution in Cybersecurity and Cyberwarfare

Welcome back, aspiring cyberwarriors!   Software-Defined Radio (SDR) has changed the way we communicate and conduct warfare. This comprehensive analysis explores the technical depths of SDR systems, their real-world applications, and their impact on military operations and satellite communications. Through…

Read MoreSignal Intelligence with a Software Defined Radio (SDR): The Quiet Revolution in Cybersecurity and Cyberwarfare

The best introduction to hacking is now an unbeatable deal.​

over 56 hours of video content, 10 expert lead courses, and 3 books.

$149

Master OTW put together a powerhouse bundle with everything you need to start hacking

 You’re not going to find a more loaded starter kit