Digital Forensics, Part 1: Capturing a Forensically Sound Image

Digital forensics is rapidly growing field of information security. The hacker needs to understand what evidence can be recovered and the security engineer needs to know how to find it. These skills are applicable to law enforcement, corporate investigations, network intrusions, malware analysis and incident response, among many others. No matter what area of information […]

Continue Reading

Why YOU Should Study Software Defined Radio (SDR) for Hackers!

Hacking radio signals (RF) IS the leading edge of cybersecurity!    So many applications in our modern life use radio frequency elements that it is hard to list them all. For instance, consider the following list: Automobile and vehicle access and monitoring Mouse and keyboards Cellphone Signals Remote control Telemetry Satellite transmissions Police and military […]

Continue Reading

Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain

Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital around us emits, radiates or receives radio waves. These include our cellphones, computers, automobiles, remote controls, key fobs, GPS, and this list could go on and on. This is a little understood field of cybersecurity by […]

Continue Reading

Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems

Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege’s of the compromised user. Regular users on systems usually have very limited privileges and can not access many of the resources or make changes to their systems and resources (databases, etc.). This is one of the many ways […]

Continue Reading