top of page
4 min read
Splunk for Security Monitoring, Part 2 (Splunk Processing Language Basics)
Welcome back, my greenhorn hackers! In an earlier tutorial, I introduced you to Splunk for Security Monitoring. In this installment, we...
1,102 views
6 min read
Using Shodan: The World's Most Dangerous Search Engine
Welcome back, my aspiring cyber warriors! Nearly all of us have used a search engine such as Google or Bing to find material on the web....
50,107 views
4 min read
Covering your BASH Shell Tracks- Anti-Forensics
Those of us who use the BASH shell regularly, love the fact that our history can be recovered simply by using the up and down arrows....
8,265 views
3 min read
Splunk for Security Monitoring, Part 1
In recent years, a new tool has come onto the market that is becoming increasing useful and popular for monitoring a network. This tool...
4,580 views
6 min read
Operating System (OS) Fingerprinting with p0F
I have said it many times before and I will say it again, good reconnaissance is crucial to successful hacking! Without it thorough...
19,151 views
2 min read
Welcome to Hackers Arise!
Welcome back, my tenderfoot hackers! Hackers Arise! is my new home and I hope you will make it yours as well. Hackers Arise will be a...
3,457 views
6 min read
Evading Firewalls and IDS/IPS While Scanning the Target
As an outside attacker/pentester, we often have to deal with security devices that may interfere with our unfettered access to the...
3,522 views
5 min read
Cracking Passwords with hashcat
Continuing with my series on how to crack passwords, I now want to introduce you to one of the newest and best designed password crackers...
18,849 views
4 min read
How to Find the Right Exploit for the Job
This tutorial is designed to help you find and use exploits that will work against known vulnerabilities. As you already know, there is...
1,619 views
7 min read
Metasploit
This section will be dedicated to training you on Metasploit. Metasploit is THE most popular hacking framework in the world and it is...
914 views
bottom of page