Exploring Kali Linux

So in this post I started documenting my efforts to learn about offensive security by researching vulnerability reports. In the present post, I will be documenting my efforts to learn about offensive security by exploring a Linux distro designed specifically for that purpose: Kali Linux. Kali is a Linux distro based on Debian. In fact … Continue reading Exploring Kali Linux

Before You Start Using a VPN, Read This

Use of VPNs has exploded in the last few years, pushed by increasing awareness of privacy issues among citizens as well as governments and corporations doubling down on their censorship and surveillance efforts. Now that we have AI capable of building frighteningly accurate psychological profiles of people based on their browsing habits, using a VPN … Continue reading Before You Start Using a VPN, Read This

Shell Script for Launching a Local Denial-of-Service Attack

Shell script to launch a local denial-of-service attack

Disclaimer: The following article is written for entertainment and educational purposes only. Neither the script shown here nor any of the techniques involved are intended to be used in real life. Launching denial-of-service attacks is illegal and can get you in serious trouble. I do not condone or support any use of such hacking methods … Continue reading Shell Script for Launching a Local Denial-of-Service Attack

10 Forms of Hacking That Are Totally Legal

Disclaimer: The following article is written for entertainment purposes only and should not be taken as official legal advice. It provides no guarantee that the exploits listed are legal in your jurisdiction or that they are legal in every context, only that the author has been able to do them openly without getting arrested. Consult … Continue reading 10 Forms of Hacking That Are Totally Legal

Setting Up a Home Hacking Lab

I've been hard at work setting up my new pen-testing lab, which will operate over the network I have set up in my room. This article will be both a documentation of my progress as well as advice for others who wish to set up similar labs in their own homes. The purpose of the … Continue reading Setting Up a Home Hacking Lab

Getting Information on People the 1337 H4xx0r Way

There are a lot of ways to get information on people through computers, ranging from amateurish methods like stalking someone's Facebook profile to methods that require a little more technical know-how. In this tutorial I'm going to focus on reconnaissance methods that harness clever tech tricks and hacks that not everyone knows about. I wouldn't … Continue reading Getting Information on People the 1337 H4xx0r Way

Up and Running: Using the TunnelBear VPN Service Through OpenVPN

In this article I want to talk about one of my tech adventures from shortly after I went on vacation, which is that of getting OpenVPN up and running and using it to contact the TunnelBear servers. TunnelBear is a paid VPN service that provides both end-to-end VPN encryption and anonymous proxying, using AES-256 encryption … Continue reading Up and Running: Using the TunnelBear VPN Service Through OpenVPN

Forensics Tool to Detect Encrypted Files

Well shit, looks like I haven't posted in about two weeks. I really didn't mean to do that. This absence was entirely unplanned and served no real purpose. But here I am again, and I'll try to update on a semi-daily basis for the forseeable future. Oh, and it looks like I'm getting regular hits … Continue reading Forensics Tool to Detect Encrypted Files

Shared Memory Exploits

So last week I checked out Season 1 of Mr. Robot from the library. It's a series I've been meaning to watch for some time now, because some scenes I've seen suggest that it's really good inspirational hacker material, while other scenes suggest that it's just fodder for dumb normies who want to think they … Continue reading Shared Memory Exploits

Escaping from the Matrix with the Van Eck Tinfoil Hat

I spend a lot of time thinking about how to become invisible on the Internet. Because I'm not going to lie; I am one of those paranoid types who thinks the CIA is out to get me. Sometimes I believe it, sometimes I don't. I still have an inkling suspicion that my dentist embedded a … Continue reading Escaping from the Matrix with the Van Eck Tinfoil Hat