-
0ut3r Space
Hi, I am Hoek. In the past, "that IT guy" from the basement of your company and then Ediscovery Engineer and then IT Security Officer and then Cyber Security Consultant (damn, who I wasn't to). Now pe
-
Ransomware simulation
In one company my boss asked me: “hey, is it possible to check whether we are well protected against ransomware, and whether we are able to detect infected devices, so that we can isolate them from th
-
Linux distributions for hackers
Today, a short entry about Linux distributions available on the market, which you can use to hack, test and analyze. Nothing beats Kali Linux of course, but it’s also worth looking at the competitors
-
Downloading big files from Tor
Some time ago I had to download some large files from the website, of one of the ransomware groups, in order to analyze the published (stolen) data. The leak was huge, hundreds of gigabytes, split in
-
Shodan Hacks
Yes, everyone knows Shodan (and who does not know, and wants to hack, should know). I’m not sure if Shodan Hacks is a good name, but I like it. It also reminds me of the Google Hacks I wrote about yes
-
CVE-2021-4034 - gimme root
Hell yeah! Finally, new category on 0ut3r Space! This is the first article in vulnerability category. I’ve been planning this for some time. I will describe shortly the most spectacular, popular and i