Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance

Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. It can entail any of the following; (1) a hack against a singular phone such Pegasus and many other IoS and Android malware, (2) an attack against the mobile infrastructure such as SS7 (Chinese hackers have recently compromised the entire US telecom system using […]

Continue Reading

Cryptography Basics for Hackers, Part 4: Building a Simple Encryption Algorithm in Python

Welcome back, my aspiring cyberwarriors! Cryptography is one of foundational technologies of cybersecurity. It helps to keep our information safe, secure, and confidential. Without cryptography, anyone could read our messages or our stored data. In our previous tutorial in Cryptography Basics, I described one of the oldest forms of cryptography, The Caesar Cipher. As you […]

Continue Reading

Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence

Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of digital threats. To address this challenge, MalwareBazaar was introduced as a collaborative defense platform, revolutionizing the way cybersecurity experts analyze and combat malicious software. Conceived by abuse.ch, a distinguished Swiss cybersecurity research organization, MalwareBazaar collects known malicious malware […]

Continue Reading

Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics

Welcome back, my aspiring cyberwarriors! As our digital world progresses toward a circumstance where data analytics and artificial intelligence become key components of any cybersecurity strategy, it is becoming increasingly critical that you understand these techniques to remain relevant and employed in the most exciting and well-paying field in IT. Towards that end, we at […]

Continue Reading

Exploit Development: Fuzzing with American Fuzzy Lop++ (AFL++) to Find Zero-Day Vulnerabilities

Welcome back, my aspiring cyberwarriors! Finding vulnerabilities in applications and services is the first step toward developing your own zero-day exploit. Vulnerability scanners are great for finding KNOWN vulnerabilities, but to find unknown or zero-day vulnerabilities a fuzzer is an excellent tool that you should be familiar with. As you know, fuzzing is the process […]

Continue Reading

Exploit Development: Building Your Own Fuzzer with BASH

Welcome back, my aspiring cyberwarriors! In the digital battleground of cybersecurity, web application fuzzing stands as a critical technique for uncovering vulnerabilities and developing exploits. This practical guide equips aspiring cyber warriors with the knowledge to wield BASH scripting as a powerful weapon in creating custom fuzzing tools. Fuzzing is a dynamic analysis technique used […]

Continue Reading

SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia

Welcome back, aspiring cyberwarriors. As the war rages on, Russia’s gas exports have taken on heightened significance. This resource is literally and figuratively fueling Putin’s war efforts, which only underscores the need for attacks on this sector’s infrastructure. In this article, in collaboration with a student from Cyber Cossacks School – Citadel–we’ll show one vulnerability […]

Continue Reading

Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning

Welcome back, my aspiring cyberwarriors! Nuclei is an advanced, open-source vulnerability scanner that has gained significant popularity among cybersecurity professionals, penetration testers and developers. Known for its exceptional speed, high degree of customizability, and accuracy in identifying security vulnerabilities, misconfigurations, and potential exploits across a wide range of digital assets and networks. This article will […]

Continue Reading

Bluetooth Hacking, January 14-16

Bluetooth Hacking is one of the most under-appreciated threats in our IoT World! For years, cybersecurity researchers consider Bluetooth safe and secure but in recent weeks and months, numerous vulnerabilities have been found within this protocol that are very frightening. These exploits include send arbitrary command into your phone or desktop (Blueducky) to the most […]

Continue Reading