Wi-Fi Hacking, Part 17: Wi-Fi Hacking with Bettercap

Welcome back my aspiring cyberwarriors! In this series on Wi-Fi (802.11) hacking, we have examined a multitude of approaches to Wi-Fi hacking including; Wireless Hacking Strategies Getting Started with aircrack-ng Hacking WPA2-PSK Continuous DoSing of a Wireless AP Hacking WPS with Reaver Hacking WPA2-PSK without Password Cracking Evading Wi-Fi Authentication Evil Twin Attack to Spy […]

Continue Reading

Database Hacking: Common SQL Injection Commands

Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially one of the most serious and numerous attacks against web applications. In addition, these attacks usually involve serious financial damage to the companies and other institutions as they are attacks against the database, the repository of so […]

Continue Reading

Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io

Welcome back, my aspiring cyberwarriors! Oftentimes, as cyberwarriors, we need to check to see whether our systems or others’ are vulnerable to various known vulnerabilities and attacks. Whether a penetration tester, security engineer or other malicious actors, such information can be critical to the success of your mission. There are number of other websites that […]

Continue Reading

Finding Outdated and Vulnerable Systems in Russian Using Shodan

Welcome back, my cyberwarriors! The Russian invasion of Ukraine continues and the courageous people of Ukraine need our help. In previous posts, I have emphasized that there are many outdated and vulnerable systems around the world. Not everyone updates and upgrades their operating systems. These systems are particularly vulnerable to known attack vectors. Russia is […]

Continue Reading