4 min read
Ukraine/Russia War: Mobile Phones and Networks Weaponized to Target on Both Sides
Welcome back, my cyberwarriors! In our digital age, we are blessed with many digital wonders. Among these is the mobile phone. The mobile...
4,054 views
5 min read
Mr. Robot Hacks: How f/society Ransomed Evil Corp for $5.9 million
Welcome back, my greenhorn cyberwarriors! For those of you who are new to Mr. Robot, Elliot Alderson is an asocial IT security engineer...
9,512 views
1 min read
SCADA Hacking: "Mysterious" Explosions and Fires at Russian Industrial Sites
Welcome back, my cyberwarrior heroes! As I mentioned in my second interview with David Bombal, the second round of the Ukraine/Russia...
3,434 views
5 min read
Essentials Skills of a Professional Hacker
Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good, professional hacker?" As the...
62,207 views
4 min read
SCADA Hacking and Security: This is How the World Ends!
As the cyberwar to save Ukraine enters Round 2, SCADA/ICS is likely to become the target of both sides. In this article, I simply try to...
12,930 views
2 min read
Finding the Location of the Russian Oligarch's Mega Yachts. U.S. Now Offering Up to $5M Reward!
Welcome back, my cyberwarriors! We all stand in solidarity against the naked aggression of the Putin regime against Ukraine. The...
8,450 views
3 min read
Clogging, Saturating and DoSing Russia's Internet with zmap
Welcome back, my cyberwarriors! Stopping Russia's naked and brutal aggression is paramount. If we can't join the front lines to defend...
10,946 views
1 min read
What is a White Hat Hacker?
Welcome back, my cyberwarriors! Hackers-Arise is a white-hat hacker training site. This means that we use our skills for good. Obviously,...
3,694 views
2 min read
The App That May Save Ukraine!
Welcome back, my cyberwarriors! I truly appreciate all of the work you have done to support the brave people of Ukraine. You are all...
2,709 views
4 min read
Open Source Intelligence (OSINT): Using Google Earth Pro Satellite Imagery for Investigations
Welcome back, my aspiring investigators! Open Source Intelligence (OSINT) is a very broad field with a multitude of applications...
5,467 views
4 min read
Network Forensics, Part 5: Wi-Fi (802.11) Forensics
Welcome back my aspiring DFIR analysts! In recent recent years, Wi-Fi has become ubiquitous throughout our home and working environments....
3,670 views
4 min read
Python Scripting for Hackers, Part 1: Getting Started
Welcome back, my hacker novitiates! I began this series on scripting a while back to teach all aspiring hackers how to write some basic...
60,351 views
5 min read
SCADA Hacking: Anatomy of a SCADA Malware, BlackEnergy 3 Attack on the Ukraine Grid
Welcome back to this series on SCADA Hacking and Security! SCADA/ICS security is critical for SO many reasons. Among the most important...
11,700 views
2 min read
Evading Antivirus: How Antivirus Works
Welcome back my aspiring cyberwarriors! Before beginning on the journey to learn to how to evade AV, it is critical to first understand...
3,646 views
5 min read
How To Study and Pass the Certified Whitehat Hacker Associate (CWA) Exam
Many of you have been asking me, "How can I study for the CWA certification exam, and what material is covered on the exam?" Here is the ...
15,717 views
2 min read
Software Defined Radio (SDR) for Hackers: Radio Frequency Attack Methods
Welcome back, my aspiring radio hackers! With the advent of inexpensive radio devices such as the RTL-SDR, HackRF, LimeSDR and bladeRF,...
10,790 views
3 min read
Reverse Engineering Malware: Reversing and Disassembly Tools
Welcome back, my aspiring malware analysts! In previous tutorials here, I have demonstrated the power of such reversing and disassembly...
4,483 views
4 min read
Password Cracking: Creating a Custom Wordlist with crunch
Welcome back, my aspiring cyberwarriors! In this series on password cracking, I have been attempting to develop your skills in the...
29,452 views
3 min read
Open Source Intelligence (OSINT), Spyse, Part 1: Finding Critical Information about a Domain
Welcome back, my open source intelligence (OSINT) investigators. In previous tutorials, we have examined numerous web services that...
6,424 views
5 min read
SCADA Hacking: Developing Zero-Day SCADA Exploits
As white-hat hackers, ultimately we want to be able to develop exploits for SCADA/ICS systems. In this way, we can find vulnerabilities...
6,612 views