Open Source Intelligence (OSINT): OSINT Tools for Bitcoin Investigations

Welcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency scam and theft investigations and recovery. As the price of these cryptocurrencies has soared, so has the incidence of scams and thefts. A reputable source has estimated the value of bitcoin and crypto-currency thefts and […]

Continue Reading

Metasploit Basics for Hackers, Part 1: Getting Started with Metasploit

Welcome back, my aspiring cyber warriors! In this series, I will introduce you to the world’s most popular hacking/pentesting platform, Metasploit!    Metasploit is the world’s leading exploitation/hacker framework. It is used–to some extent–by nearly every hacker/pentester. As such, you really need to become familiar with it if you want to enter and prosper in […]

Continue Reading

SCADA Hacking: SCADA/ICS Communication Protocols (Modbus)

SCADA/ICS systems are differentiated from traditional information systems in a number of ways. Probably the most important differentiation are the many communication protocols. Unlike traditional IT systems with their standardized TCP/IP protocols, SCADA/ICS systems are marked by significant variation in their communication protocols.   SCADA/ICS Manufacturers There are numerous SCADA/ICS protocols sometimes different protocols within […]

Continue Reading

Network Basics for Hackers: Simple Network Management Protocol (SNMP) Theory, Reconnaissance and Exp

Welcome back my aspiring cyber warriors! The Simple Network Management Protocol or SNMP is among the least understood protocols, yet so vitally important to the successful operation of your network. If an attacker can breach the SNMP, they may be able to unmask your encrypted VPN communication (see NSA’s ExtraBacon exploit here) as well as […]

Continue Reading