Blog
Reverse Engineering: Software and Hardware Used by the Dark Wizards of Hacking
Reverse engineering for me has always been interesting to say the least. One might start learning the basics of a programming language like C or Python, maybe brush up on how memory works with respects to the OS that the program ran on, and finally learn all the tools whether it be hardware or software to access that lower level of programming.
The Latest from Hak5: The Packet Squirrel Mark II
Darren Kitchen grants us another introduction to the world of hacking and cybersecurity with the latest from Hak5: The Packet Squirrel Mark II. Darren Kitchen in the “Hack Across America Van” gives us an existing introduction to the new toolset and features that are offered by the Packet Squirrel Mark II.
A Monthly Subscription for Hackers: Hacker Boxes
If one is a college student like me, you’re looking for cheap ways of finding retro or current tech at a reasonable price that will not break the bank. Today we’re looking at a HackerBox subscription I have used to work on my computer hardware skills. This is not a sponsored post. I am just talking about something that I want everyone to know about.
Flipper Zero: From the beginning to what it's currently being used for
The Flipper Zero has been out for more than two years now. What are people currently using it for? Is it something that should be prevented from purchasing like Amazon and PayPal have done in the past? Or is it a young hacker's first tool to get into cybersecurity?
Veriti: The Single Pane of Glass for Your Company
On a lot of days, IT professionals are told of some new solution that will help them in one select field of IT security. But what tools are out there to manage all the tools you already have? Veriti, a recent exhibitor at RSA 2023, has been making strides in providing full visibility and integration across your entire organization so that you can cut down on management and administrative tasks with your current toolset.
ChatGPT: What Does This Tool Mean for Cybersecurity?
There you are, sitting at your cubicle, wondering how you can copy a set of values that you don’t want to type out in Excel over and over again. You want to look up a quick way but don’t know how to word the question to Google. “Wait, Tim down the hall said some new tool is out that can help with this type of problem, what was it called? Chat-something?”. You text your buddy Tim through the office messaging center, “Hey Tim? What was that tool called you mentioned to me at the breakroom? ChatTPG??”
Level 1: Your First Step into the World of EDR
On our first step into EDR, we venture into the easiest and lowest level of EDR protection for small to medium-sized businesses. We’ll go into more detail about this level of EDR and which companies offer essential EDR protection.
Put the Packets in the Coconut: HAK5’s Latest Wi-Fi Hacking Tool
Long ago, when pen-testers and hackers needed to scan for Wi-Fi, it was loathed with the number of channels and frequency for Wi-Fi to be scanned. But now, Hak5 has released a new tool to simplify this process, introducing the Wi-Fi Coconut. But before this fantastic piece of technology was brought to life, what did hackers and pentesters do?
Microsoft Licensing Increase
In August of 2021, Microsoft announced a change in how pricing works for their Microsoft and Office 365 Products.
From then on, customers had a six-month window to decide how long they wanted to commit to Microsoft 365 products, including Teams, Outlook, and various Office products. Each License brings more with higher prices, so we've broken it down to those who want to know what they're paying for with Microsoft 365.