SCADA Hacking: Attacking SCADA/ICS Systems through the Human Machine Interface (HMI)

Welcome back, my aspiring SCADA/ICS cyberwarriors! Let’s begin by congratulating you on your foresight in committing to study SCADA/ICS hacking and security. This is certainly THE most important security issue this decade! In general, SCADA/ICS hacks have been of two types; Hack the protocols (modbus, DNP3, Profitnet, etc); Hack the Human Machine Interface (HMI) In […]

Continue Reading

Metasploit Basics, Part 15: Post- Exploitation Fun (Web Cam, Microphone, Passwords and more)

Welcome back, my fledgling hackers! As we have progressed through this series on Metasploit Basics, we have used numerous techniques to exploit your target system including; 1. SMB Exploits (EternalBlue and MS08_067, for instance); 2. File Format (ms14-0440_sandworm, office_word_hta); 3. Browser Exploits (autopwn, Abobe Flash and numerous others); 4. Social Engineering Toolkit(SET); Custom Payloads with […]

Continue Reading

Why YOU Should Study Software Defined Radio (SDR) for Hackers!

Hacking radio signals (RF) IS the leading edge of cybersecurity!    So many applications in our modern life use radio frequency elements that it is hard to list them all. For instance, consider the following list: Automobile and vehicle access and monitoring Mouse and keyboards Cellphone Signals Remote control Telemetry Satellite transmissions Police and military […]

Continue Reading

Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain

Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital around us emits, radiates or receives radio waves. These include our cellphones, computers, automobiles, remote controls, key fobs, GPS, and this list could go on and on. This is a little understood field of cybersecurity by […]

Continue Reading

Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems

Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege’s of the compromised user. Regular users on systems usually have very limited privileges and can not access many of the resources or make changes to their systems and resources (databases, etc.). This is one of the many ways […]

Continue Reading