Metasploit Basics, Part 5: Using Metasploit for Reconnaissance (nmap, EternalBlue, SCADA, and MS SQL)

Welcome back, my rookie hackers! As you know, reconnaissance is a crucial part of the hacker/pentester’s job. Without good reconnaissance, it is likely that all your work and effort will go for naught. As Metasploit has evolved from strictly an exploitation framework to a multi-faceted, penetration testing tool, it has added additional capabilities, including reconnaissance. […]

Continue Reading

Software Defined Radio (SDR) for Hackers, Part 4: Intercepting International Space Station Signals

Welcome back, my aspiring RF hackers! In this series, we are exploring how we can use a simple and inexpensive rtl-sdr dongle, in conjunction with our computer and software, to listen, intercept, decode and decrypt various radio frequency signals. These include such things as cellphones, pagers, garage door openers, remotes, automobile remote door openers, police […]

Continue Reading