top of page
7 min read
Hacking Active Directory
Agent, your mission—code-named "Digital Lockpick"—is set within the cyber walls of Active Directory, the nexus of network security. Your...
2,645 views
4 min read
Anti-Forensics: Using Veracrypt to Hide Your Most Sensitive Data
Welcome back, my aspiring cyberwarriors! In our industry, we often carry around some very valuable and sensitive data. This might include...
1,972 views
4 min read
Bluetooth Hacking: Injecting Commands into a Bluetooth Device with BlueDucky
Welcome back, my aspiring cyberwarriors! Bluetooth is a nearly ubiquitous protocol used to communicate between devices in close proximity...
12,933 views
2 min read
SDR for Hackers: The DragonOS for Software Defined Radio
Welcome back, my aspiring radio hackers! Radio hacking using inexpensive SDR's is the state-of-the art in hacking. So many communication...
13,075 views
4 min read
DDoS Attacks: Flooding Russian Sites with Fragmented UDP Packets
Welcome back, my aspiring cyberwarriors! At the beginning of the cyberwar between Russia and Ukraine, Hackers-Arise, the IT Army of...
15,443 views
4 min read
Getting Started with PGP for email
Welcome back, my aspiring cyberwarriors! Pretty Good Privacy or PGP has been around for over 30 years and has proven that it is pretty...
4,405 views
4 min read
Command & Control Series Part III (Installing your Redirector)
In the dynamic landscape of cybersecurity operations, the use of Command and Control (C2) servers stands as a critical component for...
4,955 views
5 min read
The Return of the Devastating DDoS Attacks or The Revenge of the IoT
Welcome back, my aspiring cyberwarriors! As you well know, the Distributed Denial of Service (DDoS) attack is one of simplest attacks. It...
6,245 views
2 min read
The Ultimate Guide to Troubleshooting your Evil-Droid problems
If you've ever used Evil-Droid, you've probably encountered a variety of issues to solve. In order to save you from wandering all over...
4,387 views
4 min read
Radio Basics for Hackers, Part 4: How Antennas Work and Which are Most Effective
Welcome back, my aspiring radio hackers! Antennas are often overlooked in the grand scheme of radio hacking but they play a crucial role...
5,394 views
bottom of page