The Lore Of Hijacking Systems

The Devil’s Handbook Of System Take-Down And Take-Over

Mi'kail Eli'yah
3 min readJun 3, 2021

Why should you guess? You should test. The more you test, the less you guess. — Ursa

When a vulnerability is taken advantage of, the risk approaches a motivated opportunity, and manifests itself into an exploit. — Ursa

Microsoft patched that back in May. So if you are up-to-date with your Microsoft software, you don’t have to worry. It only attacks Windows. How many people update their computers in the world? The answer is 60% of the Windows computers in the world are not updated. 20% of them cannot be updated. They run pirate versions of the software that’s too old to update. This is like I told you there was a pandemic coming and 60% of you or your fellow citizens refused to be vaccinated. You wouldn’t feel too good about it. — Lawrence Husick, Re: Stuxnet, 2014

As we discussed that engineering is on 3 domains Hu(Man), Machine, and Method, the attack engineering would also be sniffing for flaws, faults to exploit on these domains. In engineering Machine and Method domains themselves, there are 7 modules on the strata.

A hacker is merely one who has the finesse to wield logic, mathematics with the computer as a tool to construct their means and as a weapon to destruct their mark.

--

--