Network Basics for Hackers, Part 5: Simple Mail Transport Protocol (SMTP)

Welcome back, my aspiring cyberwarriors! In this series, Network Basics for Hackers, we explore the structure, operation and vulnerabilities of the major network protocols. In this way, the aspiring hacker/pentester/cyberwarrior will hopefully gain insight into not only it’s operation but also its vulnerabilities. In this segment of this series, we will examine the Simple Mail […]

Continue Reading

Open Source Intelligence (OSINT): OSINT Tools for Bitcoin Investigations

Welcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency scam and theft investigations and recovery. As the price of these cryptocurrencies has soared, so has the incidence of scams and thefts. A reputable source has estimated the value of bitcoin and crypto-currency thefts and […]

Continue Reading

Metasploit Basics for Hackers, Part 1: Getting Started with Metasploit

Welcome back, my aspiring cyber warriors! In this series, I will introduce you to the world’s most popular hacking/pentesting platform, Metasploit!    Metasploit is the world’s leading exploitation/hacker framework. It is used–to some extent–by nearly every hacker/pentester. As such, you really need to become familiar with it if you want to enter and prosper in […]

Continue Reading