Automobile Hacking, Part 5: Hacking the Car Alarm Systems to Take Control of the Vehicle

Welcome back, my budding cyber warriors! Automobile or car hacking is the cutting-edge of the cyber security world right now. With the advent of digital systems in automobiles and other vehicles and the soon-to-be autonomous driving cars, this field is rife with potential cyber security issues that will significantly impact our society and safety. This […]

Continue Reading

Metasploit5 Basics, Part 4: Connecting and Using the postgresql Database with Metasploit

Welcome back, my aspiring Metasploit Cyber Warriors! In this series, we are exploring the power and features of the world’s most popular and powerful exploitation framework, Metasploit. In this tutorial, we will be examining how to connect the postgresql database to Metasploit. In this way, we can speed up our Metasploit module searches, save our […]

Continue Reading

Metasploit Basics for Hackers, Part 25: Web Delivery with Linux/UNIX/OsX

Welcome back, my aspiring cyber warriors! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even after my many tutorials, I have only scratched the surface of its capabilities. For instance, it can be used with Nexpose for vulnerability scanning, with nmap for port scanning, and with its numerous auxiliary modules, nearly […]

Continue Reading