Search

Software Defined Radio (SDR) for Hackers: Setting Up Your HackRF One
Welcome back, my aspiring SDR hackers! In the previous tutorials in this series, we used the inexpensive but capable RTL-SDR for our...
3 min read
60,038 views


Mobile Telecom Networks for Hackers, Part 2
Welcome back, my aspiring cyberwarriors! In our modern digital era, mobile or cellular networks are the dominant mode of communication....
5 min read
1,053 views


Mobile Telecom Networks for Hackers, Part 1: Getting Started with Mobile Networks
Welcome back, my aspiring cyberwarriors! The world is rapidly becoming dominated by mobile cellular networks. Not long ago, telecom...
5 min read
1,524 views


Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
5 min read
918 views


Python Basics for Hackers, Part 4: Building a Simple Encryption Algorithm in Python
Welcome back, my aspiring cyberwarriors! Cryptography is one of foundational technologies of cybersecurity. It helps to keep our...
4 min read
1,086 views

Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
3 min read
595 views


Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics
Welcome back, my aspiring cyberwarriors! As our digital world progresses toward a circumstance where data analytics and artificial...
5 min read
608 views

Exploit Development: Fuzzing with American Fuzzy Lop++ (AFL++) to Find Zero-Day Vulnerabilities
Welcome back, my aspiring cyberwarriors! Finding vulnerabilities in applications and services is the first step toward developing your...
5 min read
1,534 views

SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
2 min read
2,406 views


Python Basics for Hacker is Now Available for Pre-Order
Due to overwhelming demand from our students and readers, Python Basics for Hackers is now available for preorder. We estimate a...
1 min read
2,296 views


Data Science Analytics for Cybersecurity, January 28-30
Welcome back, my cyberwarriors! Right now, we are on the advent of the Age of Artificial Intelligence ! You will either embrace this new...
1 min read
593 views

IoT Hacking: RFID Basics for Hackers
Welcome back, my aspirational cyberwarriors! IoT devices are increasing at an exponential rate in our digital world. These IoT devices...
5 min read
2,414 views


IoT Hacking: How We Hacked the Dahua Cameras In Ukraine and Russia
Welcome back, my aspiring cyberwarriors! As you know, Hackers-Arise played a key role in the Ukrainian resistance to Russia's brutal...
3 min read
2,676 views

The SQLite Database: The Ubiquitous Database that Few Understand
Welcome back, my aspiring cyberwarriors! While most IT and cybersecurity professionals are familiar with the big database management...
4 min read
848 views


Mr Robot Hacks: How Elliot and f/society Cloned the Key Card to Enter Steel Mountain
Welcome back, my Mr. Robot aficionados! As you know, Mr. Robot is my favorite TV show even though the show last aired nearly a decade...
4 min read
1,459 views

Physical Security: Lock Picking Basics for Hackers
Welcome back, my aspiring cyberwarriors! Physical perimeter security is just a important as your IT perimeter security. If the hacker can...
6 min read
1,603 views


Satellite Hacking: An Introduction to Satellites and Satellite Systems
Welcome back, my aspiring cyberwarriors! Satellites and the communication they engender have become a crucial element in our modern...
4 min read
1,516 views


Linux Firewalls: The Modern NFTable Firewall
Welcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
5 min read
1,021 views


Satellite Hacking: Hacking the Iridium Satellite System
Welcome back, my aspiring cyberwarriors! In our modern digital era, satellites have been used for numerous essential services, such as:...
4 min read
1,468 views


Internet of Things (IoT) Hacking, October 8-10
The Internet of Things is growing exponentially! These devices represent an incredible cybersecurity threat to every organization and...
1 min read
1,167 views