Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain

Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital around us emits, radiates or receives radio waves. These include our cellphones, computers, automobiles, remote controls, key fobs, GPS, and this list could go on and on. This is a little understood field of cybersecurity by […]

Continue Reading

Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems

Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege’s of the compromised user. Regular users on systems usually have very limited privileges and can not access many of the resources or make changes to their systems and resources (databases, etc.). This is one of the many ways […]

Continue Reading

Network Basics for Hackers: Domain Name Service (DNS) and BIND. How it Works and How it Breaks

Welcome back, my aspiring cyber warriors! The Domain Name System or DNS is one of those network protocols that makes the world go round. Without it, we would need to remember innumerable IP addresses just to navigate to our favorite web sites. Imagine trying to remember the IPv4 (32-bit) addresses of Facebook, Amazon and Hackers-Arise, […]

Continue Reading

Network Basics for Hackers, Part 5: Simple Mail Transport Protocol (SMTP)

Welcome back, my aspiring cyberwarriors! In this series, Network Basics for Hackers, we explore the structure, operation and vulnerabilities of the major network protocols. In this way, the aspiring hacker/pentester/cyberwarrior will hopefully gain insight into not only it’s operation but also its vulnerabilities. In this segment of this series, we will examine the Simple Mail […]

Continue Reading