Blog

Password Cracking Strategies

Welcome back, my hacker apprentices Recently, I started my password cracking series with an introduction to the principles and technologies involved in the art of cracking passwords. In past guides, I showed some specific tools and techniques for cracking Windows, online, Wi-Fi, Linux, and even SNMP passwords. This series is intended to help you hone your skills […]

Continue Reading

How to Hack Web Cams

Welcome back, my hacker novitiates!​ Like in my last article on remotely installing a keylogger onto somebody’s computer, this guide will continue to display the abilities of Metasploit’s powerful Meterpreter by hacking into the victim’s webcam. This will allow us to control the webcam remotely, capturing snapshots from it. ​ Why exactly would you want […]

Continue Reading

SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS

Welcome back, my aspiring SCADA Hackers!  The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS infrastructure is NOT immune from ransomware attacks. In fact, this attack should remind us just how vulnerable industrial systems are to cyber-attacks and the potential ramifications of such attacks. Remember, with SCADA/ICS systems you […]

Continue Reading