Satellite Hacking: An Introduction to Satellites and Satellite Systems

Welcome back, my aspiring cyberwarriors! Satellites and the communication they engender have become a crucial element in our modern economies. They enable us to use the internet, television, GPS, and mobile communication from anywhere on the planet. In addition, the world’s most powerful militaries are dependent upon satellites for visual and signal reconnaissance and communication. […]

Continue Reading

Using the Brand New IPv6 Exploit to DoS a Windows System

Welcome back, my aspiring cyberwarriors! Recently, security researchers discovered a critical vulnerability in the Windows IPv6 packet processing system, which was subsequently assigned the identifier CVE-2024-38063. This vulnerability can lead to a denial of service, as well as remote code execution (RCE) via specially crafted IPv6 packets. Unlike many vulnerabilities that require user interaction or […]

Continue Reading

Satellite Hacking: Hacking the Iridium Satellite System

Welcome back, my aspiring cyberwarriors! In our modern digital era, satellites have been used for numerous essential services, such as: GPS Internet Broadband Connectivity Satellite Phone Emergency Response and Disaster Relief Broadcast TV and Radio Weather Data Scientific Data Collection Remote Sensing and Imaging and many more. If the security of these communications are compromised […]

Continue Reading

Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets

Welcome back my cyberwarriors! One of the key tasks for those defending a country’s, institution’s or corporation’s assets is to understand what threats exist. This is often referred to as Cyber Threat Intelligence or CTI. It encompasses understanding what the threat actors (hackers and nations) are doing and which are threats to your organization. In […]

Continue Reading

Bypassing Next Generation Firewalls with fragtunnel

Welcome back, my aspiring cyberwarriors! A firewall is a critical component of network security that acts as a barrier between trusted internal networks and untrusted external networks, such as the Internet. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls can be implemented as hardware devices, software applications, or […]

Continue Reading