Author Archives: Simon Roses

Information Warfare Strategies (SRF-IWS): Offensive Operations at the Davos Forum

Disclaimer: Everything described here is pure imagination and any resemblance to reality is coincidental. The author is not responsible for the consequences of any action taken based on the information provided in the article. The Davos Forum organized by the … Continue reading

Posted in Hacking Etico, RF, Security | Tagged , , , | Leave a comment

Modern Wardriving

Let’s start by defining the word Wardriving: it is the search for WIFI wireless networks from a vehicle equipped with a computer. This would be the classic definition. I define modern wardriving as the search for WIFI networks, Bluetooth devices … Continue reading

Posted in Hacking Etico, RADIO, RF, Security, Technology, Wireless | Tagged , , , , , , | Leave a comment

Fun in a Wild West shooting range with the Flipper Zero

For years I always thought about hacking the classic shooting range set in the Wild West powered by infrared shotguns. We can find these shooting ranges in amusement parks and fairs. Well, that moment has come and using the Flipper … Continue reading

Posted in Uncategorized | Leave a comment

Information Warfare Strategies (SRF-IWS): Unveiling the Risks: Paris Protests and the potential to compromise the cybersecurity of companies while looting their stores

Introduction The world has witnessed countless protests throughout history, as people express their grievances and demand change. Paris, known for its passionate demonstrations, has experienced its fair share of protests in recent times. Other places such as Barcelona (September 2022) … Continue reading

Posted in Economics, Pentest, Security, Technology | Tagged , , , | Leave a comment

Infrared Dominance with Flipper Zero

Flipper Zero is a portable and powerful multi-tool for hackers, security professionals or geeks. It was extremely well received when it was first launched on Kickstarter in 2020. I received my Flipper Zero in July 2021 and it’s time to … Continue reading

Posted in Hacking Etico, Pentest, RF, Security, Technology, Wireless | Tagged , , , , | Leave a comment

Offensive Security Wireless Professional (OSWP): my experience

On July 24, 2022 I took the well-known Offensive Security Wireless Professional (OSWP) practical exam and although Offensive Security can take days to inform of the result of the exam (pass/fail), the next day on July 25 they informed me … Continue reading

Posted in Hacking Etico, Pentest, RF, Security, Wireless | Tagged , , , , | 1 Comment

KringleCon / Holiday Hack 2021 Writeup

Another SANS Holiday Hack Challenge & Kringle (2021) CTF done. Please find my writeup for this awesome & fun CTF. I will continue to work on the few missing challenges so expect updates ASAP. PDF MD5: 51bc75a10e1de548de2adef974a36201 Report Download Enjoy … Continue reading

Posted in Security, Technology | Tagged , , , , | Leave a comment

Cool podcasts on cyber security, red team, and startups (1)

Here you will find some of the cool podcasts that I have been listening lately on topics like cybersecurity, red team, hacking, artificial intelligence (AI), and startups. Some in English and other in Spanish 🙂 You can listen to them … Continue reading

Posted in Podcast, Security, Technology | Tagged , , , , , | Leave a comment

Your own Spy Numbers Station on a Raspberry PI

In this post we will talk about two fascinating topics and how to combine them: Numbers Station and Raspberry Pi. We’re entering the world of spies!! Disclaimer: Do not interfere with radio stations in your area – I am not … Continue reading

Posted in Hacking Etico, RADIO, RF, Technology, Tecnologia, Wireless | Tagged , | 2 Comments

The Ten Top Computer Science Papers You Must Read

Alan Turing (1937) On Computable Numbers, with an Application to the Entscheidungsproblem Vannevar Bush (1945) As We May Think Claude Elwood Shannon (1948) A Mathematical Theory of Communication Alan Turing (1950) COMPUTING MACHINERY AND INTELLIGENCE THOMAS J. McCABE (1976) A … Continue reading

Posted in Books, Business, Security, Technology | Tagged , , , , | Leave a comment