Metasploit Basics, Part 5: Using Metasploit for Reconnaissance (nmap, EternalBlue, SCADA, and MS SQL)

Welcome back, my rookie hackers! As you know, reconnaissance is a crucial part of the hacker/pentester’s job. Without good reconnaissance, it is likely that all your work and effort will go for naught. As Metasploit has evolved from strictly an exploitation framework to a multi-faceted, penetration testing tool, it has added additional capabilities, including reconnaissance. […]

Continue Reading

Open Source Intelligence (OSINT), Spyse, Part 1: Finding Critical Information about a Domain

Welcome back, my open source intelligence (OSINT) investigators. In previous tutorials, we have examined numerous web services that compile key information that is useful to pentesters, hackers and bug hunters. These include; Google Hacking Shodan Censys BuiltWith Netcraft and others These are all great tools but I’m going to show you a new kid on […]

Continue Reading

Software Defined Radio(SDR) for Hackers, Part 4: Intercepting and Decoding Confidential Pager Data

Welcome back, my aspiring RF hackers! Although few people still use pagers, they were once a common communication device used by many industries to notify employees, contractors and others of urgent information. Pagers are a wireless telecommunication device that sends and displays alphanumeric and voice messages. These pagers, once the state-of-the-art mobile communication system, are […]

Continue Reading

Advice from a Professional Hacker: How Hackers Are Stealing Your Bitcoin and Other Cryptocurrencies

As the price of the cryptocurrencies has skyrocketed over the last few years, the theft of cryptocurrencies has soared right along with it. It appears that hackers have decided it is much easier and more lucrative to steal the cryptocurrencies than the traditional, government-issued fiat currencies ($, pounds, Euros, etc.) and the possible consequences, more […]

Continue Reading