Synopsis
Learn to use OSINT and hack more than IT systems and expand to the moving world with IOT and ICS/SCADA systems. Come along on a technology misadventure, learning OSINT tools & techniques while traveling on a hacker journey. Protect your organisation or find out if your home alarm system is exposed insecurely to the internet. Discover weaknesses in IT, IOT and ICS SCADA systems in-depth. Using Censys, Spiderfoot, ZMap, OWASP ZAP, Maltego and other tools to discover a wide range of vulnerable systems and information. Smart appliances, North American Open ADR smart grid, fire alarms, database servers, intelligence agency security fails, printers, email systems, remote management hacking, smart houses, solar panels, hacked web servers, hydroelectric dams, solar panels, crackable encryption, exploitable ICS/SCADA, IOT, IT & more. Get up to speed on IT/IOT & ICS SCADA hacking using the examples, exercises and tools using Kali and a customized book virtual machine. Hack the digital world with OSINT
About the Author
Chris Kubecka, founder and CEO of HypaSec, is a decorated U.S. Air Force aviator and Space Command veteran whose path into technology began early. At the age of ten she hacked the U.S. Department of Justice and the FBI, a preview of the advanced technical instincts that would define her career.
She helped restore global business operations at Saudi Aramco after one of the largest cyberattacks in history, working with an exceptional team under immense pressure. She has since advised governments, militaries, and international institutions on cyber defence, artificial intelligence, drone warfare, offensive technology, and the protection of critical infrastructure.
When Russia invaded Ukraine, Chris helped organize an OSINT-driven evacuation effort. After fleeing Kyiv herself, she aided the rescue of a prominent basketball player targeted for ransom and then coordinated the safe passage of thousands of foreign students in occupied areas. She and her team guided caravans, tracked routes, managed humanitarian shipments, leveraged diplomatic back channels, and distributed intelligence in real time.
Her investigative work includes exposing vulnerabilities in Boeing's 737 MAX systems through responsible disclosure and later serving as a whistleblower when the company retaliated. She has served as Distinguished Chair in Cybersecurity and Emerging Technologies at the Middle East Institute and was recruited for the U.S. Defense Science Board as a subject-matter expert on generative AI and cyberwarfare, a role placed on hold by executive order in 2025.
Chris has been recognized with high military decorations, the Order of Thor, and other professional honours. Her research on post-quantum cryptography ranked in the top two percent of global publications on ResearchGate in 2024. Today she continues to publish under the name SecEvangelism, delivering unfiltered analysis, technical breakdowns, and sharp commentary across IG, X, Substack, Medium, BlueSky, and Rumble.
"About this title" may belong to another edition of this title.