Blog

MiTM Attack with Ettercap

Welcome back, my rookie cyber warriors! Man-in-the-Middle attacks can be among the most productive and nefarious attacks. If the attacker/hacker can place themselves between two systems (usually client and server) they can control the flow of traffic between the two systems. In this way they can eavesdrop on the traffic, delete the traffic, inject malware […]

Continue Reading

Automobile Hacking, Part 5: Hacking the Car Alarm Systems to Take Control of the Vehicle

Welcome back, my budding cyber warriors! Automobile or car hacking is the cutting-edge of the cyber security world right now. With the advent of digital systems in automobiles and other vehicles and the soon-to-be autonomous driving cars, this field is rife with potential cyber security issues that will significantly impact our society and safety. This […]

Continue Reading

Metasploit5 Basics, Part 4: Connecting and Using the postgresql Database with Metasploit

Welcome back, my aspiring Metasploit Cyber Warriors! In this series, we are exploring the power and features of the world’s most popular and powerful exploitation framework, Metasploit. In this tutorial, we will be examining how to connect the postgresql database to Metasploit. In this way, we can speed up our Metasploit module searches, save our […]

Continue Reading