Search


SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Welcome back, my aspiring SCADA Hackers! The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS...
4 min read
6,179 views

Satellite Hacking, Part 1: Getting Started
Welcome back, my aspiring radio satellite hackers! In this series of tutorials, we will be exploring hacking satellites from a multitude...
2 min read
5,405 views

DDoS Attacks: Flooding Russian Sites with Fragmented UDP Packets
Welcome back, my aspiring cyberwarriors! At the beginning of the cyberwar between Russia and Ukraine, Hackers-Arise, the IT Army of...
4 min read
15,606 views

Database Hacking: Common SQL Injection Commands
Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...
2 min read
4,004 views


Radio Basics for Hackers, Part 3: Sampling
Welcome back my aspiring cyber warriors! Sampling is the process of converting a continuous signal into a discrete signal. In the context...
2 min read
1,737 views

SCADA Hacking: Sending Random Inputs into the Russian Industrial Systems
Welcome back, my aspiring cyberwarriors! SCADA hacking and security is different from traditional hacking in numerous ways. For a review...
3 min read
4,142 views

Remaining Anonymous: Getting Started with Tails
This article is from our Ukraine intern _aircorridor. He lays out how to install one of the most secure Linux OSés, Tails. Getting...
2 min read
3,627 views


Python Basics for Hackers, Part 5: Creating a Web Site Scraper to Find Potential Passwords
Welcome back, my aspiring cyberwarriors! Creating password lists is a key element of a successful password cracking strategy. In nearly...
4 min read
6,979 views

Password Cracking: Creating Custom Password List with cupp
Welcome back, my aspiring cyberwarriors! If the hacker can obtain or crack the target's password, in many cases, this can lead to...
3 min read
7,004 views


What is a CyberWarrior? The Hackers-Arise Cyberwarrior Philosophy
If you are reading this, you are very likely interested in the field of cybersecurity. You may also be considering studying...
2 min read
5,370 views


Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain
Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital...
6 min read
2,085 views

We Have Successfully Accessed Many IP Cameras in Ukrainian Territory to Spy on Russian Activities
Welcome back, my cyberwarriors! At the request of the IT Army of Ukraine, we were asked to help the war efforts by hacking a large...
1 min read
39,928 views

Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Welcome back, my aspiring RF hackers! Before embarking upon the study of SDR for Hackers it is good idea to take a close look at the...
3 min read
40,143 views


Radio Basics for Hackers, Part 1: Electromagnetic Radiation, Frequency and Wavelength
Welcome back, my aspiring cyberwarriors! As you already know, radio hacking is the leading edge of cybersecurity! So many things in our...
6 min read
10,650 views

Software Defined Radio for Hackers, Part 5: How to Track Aircraft with SDR
Welcome back, my aspiring radio hackers! Nearly every vehicle in the world gives off/sends out a radio signal of one type or another....
3 min read
10,579 views

Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege's of the...
3 min read
5,690 views

OSINT: Finding Email Passwords in Dumps with h8mail
Welcome back, my aspiring OSINT Investigators! Often as OSINT investigators, pentesters and hackers, we need to determine if a email...
3 min read
55,995 views

Wi-Fi Hacking: Creating a Wi-Fi Scanner with Python and Scapy
Welcome back, my aspiring cyber warriors! Although there are numerous tools to hack Wi-Fi (802.11), to create your own tools you will...
4 min read
50,971 views


Hackers-Arise is Seeking an Editor!
Hackers-Arise is a rapidly growing cybersecurity and training company. With our rapid expansion, we are in need a skilled editor. This...
1 min read
1,766 views


Bluetooth Hacking, Part 1: Getting Started with Bluetooth
Welcome back, my aspiring cyberwarriors! Today, Bluetooth is built into nearly all our devices and gadgets. These include our ...
4 min read
76,577 views