Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets

Welcome back my cyberwarriors! One of the key tasks for those defending a country’s, institution’s or corporation’s assets is to understand what threats exist. This is often referred to as Cyber Threat Intelligence or CTI. It encompasses understanding what the threat actors (hackers and nations) are doing and which are threats to your organization. In […]

Continue Reading

Bypassing Next Generation Firewalls with fragtunnel

Welcome back, my aspiring cyberwarriors! A firewall is a critical component of network security that acts as a barrier between trusted internal networks and untrusted external networks, such as the Internet. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls can be implemented as hardware devices, software applications, or […]

Continue Reading

Python Basics: Programming Concepts

Welcome back, my aspiring cyberwarriors! To ascend to the status of cyberwarrior, you must have some basic programming capabilities. In the field of hacking and cybersecurity, this usually means BASH and Python scripting. Python scripting is the most popular among cybersecurity professionals due to its extensive libraries and modules that are useful in cybersecurity (you […]

Continue Reading

Cyberwar Mission: Hack the Adversary’s 2FA Protected Account

To prevent password stealing and password hacking, many applications have adopted 2FA authentication. 2FA or 2-factor authentication, requires that the user authenticate not only using a username name and password (1 factor authentication but als a second authentication method such as send a one time password (2-factor authentication) to an authenticated device such as a […]

Continue Reading