1 min read
X's Artificial Intelligence, Grok, Got it Right!
Welcome back, my aspiring cyberwarriors! We are in the age of artificial intelligence! It will change our daily lives and work lives in...
100 views
3 min read
IP Camera Hacking: The FFmpeg Tool for Streaming Camera Video
Welcome back, aspiring cyberwarriors! As you know, Hackers-Arise has been deeply involved in the cyberwar to help save Ukraine from the...
1,077 views
3 min read
Is Hacking IP Cameras Just for Voyeurs or Does it Have Strategic and National Security Implications?
Welcome back, my aspiring cyberwarriors! Hacking IP cameras has always had a bit of voyeuristic appeal to the aspiring cyberwarrior. Many...
259 views
5 min read
The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will be detailing how an individual or small group of cyberwarriors can impact global...
846 views
4 min read
Bypassing Next Generation Firewalls with fragtunnel
Welcome back, my aspiring cyberwarriors! A firewall is a critical component of network security that acts as a barrier between trusted...
3,393 views
1 min read
The Default Passwords of Nearly Every IP Camera
Welcome back, my aspiring camera hackers! As you know, at the beginning of the Russian invasion of Ukraine, the Ukrainian Army asked for...
17,335 views
3 min read
Software Defined Radio (SDR) for Hackers: Setting Up Your HackRF One
Welcome back, my aspiring SDR hackers! In the previous tutorials in this series, we used the inexpensive but capable RTL-SDR for our...
56,497 views
5 min read
Mobile Telecom Networks for Hackers, Part 2
Welcome back, my aspiring cyberwarriors! In our modern digital era, mobile or cellular networks are the dominant mode of communication....
503 views
5 min read
Mobile Telecom Networks for Hackers, Part 1: Getting Started with Mobile Networks
Welcome back, my aspiring cyberwarriors! The world is rapidly becoming dominated by mobile cellular networks. Not long ago, telecom...
808 views
5 min read
Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
441 views
6 min read
Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance
Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. Most novices focus on the handset, but in reality, there are...
5,248 views
4 min read
Python Basics for Hackers, Part 4: Building a Simple Encryption Algorithm in Python
Welcome back, my aspiring cyberwarriors! Cryptography is one of foundational technologies of cybersecurity. It helps to keep our...
576 views
3 min read
Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
270 views
5 min read
Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics
Welcome back, my aspiring cyberwarriors! As our digital world progresses toward a circumstance where data analytics and artificial...
338 views
5 min read
Exploit Development: Fuzzing with American Fuzzy Lop++ (AFL++) to Find Zero-Day Vulnerabilities
Welcome back, my aspiring cyberwarriors! Finding vulnerabilities in applications and services is the first step toward developing your...
1,047 views
2 min read
SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
2,042 views
5 min read
Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning
Welcome back, my aspiring cyberwarriors! Nuclei is an advanced, open-source vulnerability scanner that has gained significant popularity...
1,405 views
1 min read
Python Basics for Hacker is Now Available for Pre-Order
Due to overwhelming demand from our students and readers, Python Basics for Hackers is now available for preorder. We estimate a...
2,103 views
5 min read
What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
752 views
1 min read
Hackers-Arise Offers the Best Cybersecurity Training on the Planet! Listen to What our Students are Saying!
Hackers-Arise Offers the Best Cybersecurity Training on the Planet! We attract the best students from around the world and make them the...
2,222 views