Posts by Category

What The Hack

What is Ransomware?

8 minute read

Ransomware has easily become one of the most popular cyber security threats over the last few years. It has affected countless individuals and every industry...

What is Encryption?

13 minute read

Encryption is one of the most fundamental parts of modern computing. It’s the reason why your credit card information isn’t stolen every time you buy somethi...

What is BitTorrent?

10 minute read

Torrenting, although somewhat of an old concept, is still very much relevant today. Often it is brought up in terms of illegal activity where you might torre...

What is the Dark Web?

7 minute read

Lately I feel like I’ve seen and heard the dark web being brought up in more mainstream conversations about data security. Most notably, “Dark web scanning” ...

What is a VPN?

10 minute read

With the recent increase of people working from home due to COVID-19, I think it’s appropriate the first post in this topic be about VPN’s.

Back to Top ↑

Hacking

Exploiting Log4shell

5 minute read

This article is intended to show the Log4shell exploit in action. If you’re unfamiliar with what Log4shell is, please read this article. Essentially, we’re g...

Finding Passwords with Wireshark

8 minute read

So we’ve already seen how we can collect credentials through using SET (Social Engineering Toolkit). Now let’s see how we can get credentials using a network...

Let’s Hack Wifi

8 minute read

Well just like the title says, we’re going to hack wifi in this article. It’s a lot easier than you’d think. Remember, this is just a proof of concept. I’ll ...

Stealing Facebook Credentials

8 minute read

In this article we’re going to see how we can use some hacking tools to create a fake website in order to gain user credentials for Facebook. Scenario

Google Hacking

4 minute read

What if I told you that you’ve been searching on google the wrong way all this time? Ok, maybe not the wrong way, but what if I told you that you can signifi...

Warning:Don’t Be Dumb

less than 1 minute read

If you’re reading this, chances are you’re interested in seeing how hackers are able to actually able to do the things they do. Now, while I’m definitely not...

Back to Top ↑

Privacy, Security and Safety

Are Antivirus Programs Obsolete?

7 minute read

It’s no surprise that cyber security has largely been commodified. This means there’s a whole bunch of products that companies are selling to try to get you ...

Two-Factor Authentication

5 minute read

If you want to further protect your accounts on various websites, you will need to apply more security controls than just your username and password. Two-Fac...

Mobile Security

9 minute read

Phone technology has transformed dramatically in the last 10-15 years. Not only can we call people, but most if not all phones are capable of connecting to t...

Email Security

8 minute read

Contrary to what you may think, email is actually the most common attack vector for hackers. Depending on the goals of the hacker, they will probably try to ...

How Safe is my Password?

9 minute read

This question is probably one that is most asked when it comes to ensuring your various accounts are secure. Hopefully after reading this you’ll have a good ...

Back to Top ↑

Capture The Flag and Pentesting

Ports and Protocols

2 minute read

This article is supplementary to the Nmap section in Kali Tools. If you’re going to be following the CTF guide on here or elsewhere, you’re still going to ha...

Kali Tools

5 minute read

I mentioned in the last post that Kali (amongst other security distros) comes pre-packaged with a myriad of tools that are at your disposal. When performing ...

Introduction and Requirements

2 minute read

So you want to learn how to hack and cause mischeif on the internet? Well, this guide is definitely not for you. I wanted to break down the steps of what kno...

Back to Top ↑

General

Happy New Years!

less than 1 minute read

Happy New Years everybody! Here’s to hoping that your year is filled with joy, excitement and fulfillment of your goals. I have a feeling that the cyber sec...

Log4shell Vulnerability

5 minute read

WHEW, it certainly has been one hell of a year for cyber security, and it’s only getting more intense. You may have heard of the recent vulnerability dubbed ...

Back to Top ↑