Satellite Hacking: Hacking the Iridium Satellite System

Welcome back, my aspiring cyberwarriors! In our modern digital era, satellites have been used for numerous essential services, such as: GPS Internet Broadband Connectivity Satellite Phone Emergency Response and Disaster Relief Broadcast TV and Radio Weather Data Scientific Data Collection Remote Sensing and Imaging and many more. If the security of these communications are compromised […]

Continue Reading

Cyberwar Mission: Hack the Adversary’s 2FA Protected Account

To prevent password stealing and password hacking, many applications have adopted 2FA authentication. 2FA or 2-factor authentication, requires that the user authenticate not only using a username name and password (1 factor authentication but als a second authentication method such as send a one time password (2-factor authentication) to an authenticated device such as a […]

Continue Reading

Satellite Hacking, Part 1: Getting Started

Welcome back, my aspiring radio satellite hackers! In this series of tutorials, we will be exploring hacking satellites from a multitude of approaches. Satellites have become a ubiquitous and necessary technology in our everyday lives. They provide us with internet access, television and radio signals, location services, satellite phone service and, of course, satellite images […]

Continue Reading

Software Defined Radio (SDR) for Hackers: Radio Frequency Attack Methods

Welcome back, my aspiring radio hackers! With the advent of inexpensive radio devices such as the RTL-SDR, HackRF, LimeSDR and bladeRF, the possibility of hacking radio frequency (RF) communication and control devices has been blown wide open to anyone in the cybersecurity/infosec field. Although not commonly included in penetration tests, radio hacks should be considered […]

Continue Reading