Scripting for Hackers
To start developing and refining your scripting skills, take a look at these tutorials.
BASH Scripting for Hackers, Part 01: BASH Scripting Basics
If you have already read Linux Basics for Hackers, Part 07: BASH Scripting Basics you can skip this article and move to the more advanced article BASH Scripting for Hackers, Part 02: Building a Continuous Wi-Fi Denial of Service Tool. This article covers the same information as Linux Basics for
BASH Scripting for Hackers, Part 02: Building a Continuous Wi-Fi Denial of Service Tool
Welcome back, my aspiring cyberwarriors! Now that you understand a bit of BASH scripting, let’s try to use our BASH scripting skills in conjunction with our Wi-Fi Hacking skills to write a simple script to create a Denial of Service (DoS) to a Wi-Fi AP. If you are unfamiliar with
Building a Raspberry Spy Pi, Part 04: Adding Listening Capability
Welcome back, my hacker noviates! In this series, we are building a Spy Pi using the tiny, but powerful Raspberry Pi. Our intention is build a device that can be used to watch and listen in any remote location. For the first 3 segments in this series, you can read
Hack to Spy: Building a Raspberry Spy Pi, Part 03
In my previous two posts in this series, I showed you how to set up a Raspberry Pi to be a spy device and then showed you how to use the Pi’s software to capture still images from your newly created Spy Pi. In this article, I will show you
PowerShell for Hackers, Part 01
As you know, I firmly believe that to be a true professional hacker, you need to be proficient in Linux. There are a number of good reasons for this. Most hacking tools are developed in Linux (well over 90 percent). Linux offers us greater granularity of control. The terminal in
Scripting Basics for Hackers: BASH Scripting for Reconnaissance
Tools are only as good as the person using them. It doesn’t matter if you have the latest computer or the fanciest keyboard – if you don’t understand how systems work, you won’t be able to hack them effectively. That’s why learning, practicing, and gaining real-world experience are so important
Scripting for Hackers, Perl Part 01: Introduction to Perl
To ascend the upper echelons of Master Hacker, you MUST develop scripting skills. It’s all great and well to use other hackers’ tools, but to get and maintain the upper hand, you must develop your own unique tools, and you can only do that by developing your scripting skills. The
Scripting for Hackers, Perl Part 02: Building a Port Scanner with Perl
Scripting skills are essential to ascend to the upper echelons of the hacker clique. Without scripting skills, you are dependent upon others to develop your tools. When others develop your tools, you will always be behind the curve in the battle against security admins. Remember, there is an ongoing chess
Splunk for Security Monitoring, Part 01
In recent years, a new tool has come onto the market that is becoming increasing useful and popular for monitoring a network. This tool is known as Splunk (I presume that the name is a play on the word “spelunking” or cave exploring). Splunk is really a simple idea whose
Splunk for Security Monitoring, Part 02 (Splunk Processing Language Basics)
Welcome back, my greenhorn hackers! In an earlier tutorial, I introduced you to Splunk for Security Monitoring. In this installment, we will examine the Splunk Processing Langauage or SPL. This is the language built into Splunk for searching for specific information among all the machine data that Splunk has gathered
Windows Remote CMD Commands for Hacking
Many new hackers come from a Windows background, but seldom–if ever–use its built-in command-line tools. As a hacker, you will often be forced to control the target system using just Windows commands and no GUI. Although we would love to get Metasploit’s Meterpreter on the target and use
Mr Robot Hacks: Building a Deadman’s Switch in Python
Welcome back, my Mr Robot aficionados! As you know, Mr. Robot is my favorite TV show because of its realistic depiction of hacking. Nearly all of the hacks in the show are real, although the time frame may be compressed (real hacking is not like a TikTok video). In the
Python Basics for Hackers, Part 0: Programming Concepts
Welcome back, my aspiring cyberwarriors! To ascend to the status of cyberwarrior, you must have some basic programming capabilities. In the field of hacking and cybersecurity, this usually means BASH and Python scripting. Python scripting is the most popular among cybersecurity professionals due to its extensive libraries and modules that
Python Basics for Hackers, Part 01: Getting Started
Welcome back, my hacker novitiates! I began this series on scripting a while back to teach all aspiring hackers how to write some basic scripts for hacking and reconnaissance. Without developing some basic scripting skills, the aspiring hacker will be condemned to the realm of the script kiddie. This means
Python Basics for Hackers, Part 02: Building a Banner Grabbing Tool
In an earlier tutorial, I introduced you to probably the most popular scripting language for hackers, Python. To become a professional hacker, you need to have some scripting skills and Python is a good choice if you want to master just one. In this latest guide, I will expand your
Python Basics for Hackers, Part 03: Building an FTP Password Cracking Tool
This is the third installment of my Python scripting series. If you haven’t read the previous two articles, take some time now to go back and read Part 1 (Introduction) and Part 2 (Building a Banner Grabbing Tool) before you proceed here. As I mentioned in previous tutorials, Python is
Python Basics for Hackers, Part 04: How to Find the Exact Location of any IP Address
Welcome back, my aspiring cyberwarriors! As hackers, we instinctively want to know as much as possible. Among this desired information may be the Geo-Location of an IP address. Thankfully for us, our friends over at MaxMind have built a database that’ll do just that! Thing is, if we want to
Python Basics for Hackers, Part 05: Creating a Web Site Scraper to Find Potential Passwords
Welcome back, my aspiring cyberwarriors! Creating password lists is a key element of a successful password cracking strategy. In nearly every case, we need to provide a list of potential passwords to the password cracking tool whether it be hashcat, John the Ripper, BurpSuite, cameradar or others (the exception being
Python Basics for Hackers, Part 6: Decoding an Encrypted Message with Frequency Analysis (Cryptanalysis)
Python Basics for Hackers, Part 6: Decoding an Encrypted Message with Frequency Analysis (Cryptanalysis) Welcome back, my aspiring cyberwarriors! Cryptography is a fundamental skill of cybersecurity. It enables so many of the protocols and technologies that keep our data safe such as passwords, Internet traffic, database info, messaging, and so
Learn more in the courses: