Search
Network Hacking
Learn how to identify and exploit vulnerabilities within networks.


5 min read
Mobile Telecom Networks for Hackers, Part 2
Welcome back, my aspiring cyberwarriors! In our modern digital era, mobile or cellular networks are the dominant mode of communication....
767 views


5 min read
Mobile Telecom Networks for Hackers, Part 1: Getting Started with Mobile Networks
Welcome back, my aspiring cyberwarriors! The world is rapidly becoming dominated by mobile cellular networks. Not long ago, telecom...
1,029 views


5 min read
What is a Mesh Network and How Does it Work with the Internet of Things (IoT)?
Welcome back, my aspiring cyberwarriors! In my book, Network Basics for Hackers, I talked about the various types of network topologies....
325 views

5 min read
Networking Basics for Hackers, Part 1
With our dramatic growth over the last year, we have added many new aspiring hackers who are still lacking in the basics of network and...
15,942 views


5 min read
Networking Basics for Hackers, Part 2
In the first part of this series, I introduced you to the basics of networking including IP addresses, ports, NAT, and DHCP. In this...
5,870 views

5 min read
Network Basics for Hackers, Part 5: Simple Mail Transport Protocol (SMTP)
Welcome back, my aspiring cyberwarriors! In this series, Network Basics for Hackers, we explore the structure, operation and...
8,889 views

1 min read
Network Basics for Hackers! Networks--How they work, and how they can be broken
Did you love Linux Basics for Hackers? Then you will love this book! Once again, Master OTW--in his inimical style of making the complex...
13,765 views

3 min read
Network Basics for Hackers, Part 3: Subnetting, Network Masks, and CIDR Basics
Welcome back, my aspiring cyber warriors! In this series, we are exploring networks of all kinds and how to break them. In this tutorial...
14,741 views

11 min read
Network Basics for Hackers: Domain Name Service (DNS) and BIND. How it Works and How it Breaks
Welcome back, my aspiring cyber warriors! The Domain Name System or DNS is one of those network protocols that makes the world go round....
32,235 views

5 min read
Network Basics for Hackers, TCP/IP: Part 1
Welcome back, my aspiring cyberwarriors! Many of you who aspire to a career in cybersecurity have written me asking whether networking is...
69,335 views

5 min read
Network Basics for Hackers, TCP/IP: Part 2
Welcome back, my aspiring cyberwarriors! In the first part of this series, I introduced you to the basics of networking including IP...
19,376 views

5 min read
Network Basics for Hackers: Server Message Block (SMB) and Samba
Welcome back, my aspiring cyber warriors! This series is intended to provide the aspiring cyber warrior with all the information you need...
18,808 views

4 min read
Network Basics for Hackers: Address Resolution Protocol or ARP
Welcome back, my aspiring cyber warriors! Understanding the many network protocols can enhance your ability to gain information and...
10,080 views

6 min read
Network Basics for Hackers: Simple Network Management Protocol (SNMP) Theory, Reconnaissance and Exp
Welcome back my aspiring cyber warriors! The Simple Network Management Protocol or SNMP is among the least understood protocols, yet so...
16,694 views

4 min read
Network Forensics: Wireshark Basics, Part 2
Welcome back, my aspiring network forensics investigators! In my previous post in this series, I introduced you to the most widely-used...
4,907 views

5 min read
Network Forensics, Wireshark Basics, Part 1
Welcome back, my aspiring Digital Forensics Investigators! Although Wireshark is the most widely used network and protocol analyzer, it...
46,544 views


3 min read
Metasploit Basics, Part 10: Pivoting to Compromise the Network
Welcome back, my Metasploit aficionados! In this series, we began with the Metasploit basics and have progressed through exploitation and...
5,418 views


6 min read
Linux Basics for the Aspiring Hacker, Part 4 (Networking)
From working with thousands of aspiring hackers, I have found that very often the greatest hurdle to getting started in hacking is...
15,798 views