Before You Start Using a VPN, Read This

Use of VPNs has exploded in the last few years, pushed by increasing awareness of privacy issues among citizens as well as governments and corporations doubling down on their censorship and surveillance efforts. Now that we have AI capable of building frighteningly accurate psychological profiles of people based on their browsing habits, using a VPN … Continue reading Before You Start Using a VPN, Read This

Shell Script for Launching a Local Denial-of-Service Attack

Shell script to launch a local denial-of-service attack

Disclaimer: The following article is written for entertainment and educational purposes only. Neither the script shown here nor any of the techniques involved are intended to be used in real life. Launching denial-of-service attacks is illegal and can get you in serious trouble. I do not condone or support any use of such hacking methods … Continue reading Shell Script for Launching a Local Denial-of-Service Attack

Getting Information on People the 1337 H4xx0r Way

There are a lot of ways to get information on people through computers, ranging from amateurish methods like stalking someone's Facebook profile to methods that require a little more technical know-how. In this tutorial I'm going to focus on reconnaissance methods that harness clever tech tricks and hacks that not everyone knows about. I wouldn't … Continue reading Getting Information on People the 1337 H4xx0r Way

Up and Running: Using the TunnelBear VPN Service Through OpenVPN

In this article I want to talk about one of my tech adventures from shortly after I went on vacation, which is that of getting OpenVPN up and running and using it to contact the TunnelBear servers. TunnelBear is a paid VPN service that provides both end-to-end VPN encryption and anonymous proxying, using AES-256 encryption … Continue reading Up and Running: Using the TunnelBear VPN Service Through OpenVPN

Forensics Tool to Detect Encrypted Files

Well shit, looks like I haven't posted in about two weeks. I really didn't mean to do that. This absence was entirely unplanned and served no real purpose. But here I am again, and I'll try to update on a semi-daily basis for the forseeable future. Oh, and it looks like I'm getting regular hits … Continue reading Forensics Tool to Detect Encrypted Files

Shared Memory Exploits

So last week I checked out Season 1 of Mr. Robot from the library. It's a series I've been meaning to watch for some time now, because some scenes I've seen suggest that it's really good inspirational hacker material, while other scenes suggest that it's just fodder for dumb normies who want to think they … Continue reading Shared Memory Exploits

Escaping from the Matrix with the Van Eck Tinfoil Hat

I spend a lot of time thinking about how to become invisible on the Internet. Because I'm not going to lie; I am one of those paranoid types who thinks the CIA is out to get me. Sometimes I believe it, sometimes I don't. I still have an inkling suspicion that my dentist embedded a … Continue reading Escaping from the Matrix with the Van Eck Tinfoil Hat

The Joy of Hacking

I've been on WordPress for exactly a month now, and so I thought it fitting to make a post that was a little more reflective in nature. I'm going to explore a subject I've thought extensively about... specifically I'd like to talk about what it means to hack, what it means to be a hacker, … Continue reading The Joy of Hacking

SSD Data Sanitation in Linux

Previously I talked about data sanitation on magnetic media (see my DoD tutorial). Now I want to explore the same topic, only with solid state drives. Data sanitation for SSDs is very different from data sanitation for HDDs - it is both easier and harder. Easier because there's no residual data left over - once … Continue reading SSD Data Sanitation in Linux

How to Block Websites and Prevent DNS Leaks Using Your hosts File

The hosts file is an entity that is present in every major operating system, including MacOS, Windows, and Linux. In Unix-based systems like Linux and MacOS its filepath is /etc/hosts. In Windows its filepath is C:\Windows\System32\drivers\etc\hosts. Although largely a relic of the past, this oft-ignored configuration file can be surprisingly useful even in the modern … Continue reading How to Block Websites and Prevent DNS Leaks Using Your hosts File