Search

Wi-Fi Hacking, Part 11: The PMKID Attack
Welcome back, my aspiring cyber warriors! As you know, the key to hacking the WPA2-PSK is to capture the PSK (pre-shared key or...
4 min read
103,532 views


Strategies for Password Cracking in Cybersecurity
Welcome back, my aspiring cyberwarriors! People often ask, how do I crack passwords? The answer is that there are many ways and it is...
3 min read
503 views

IP Camera Hacking: The FFmpeg Tool for Streaming Camera Video
Welcome back, aspiring cyberwarriors! As you know, Hackers-Arise has been deeply involved in the cyberwar to help save Ukraine from the...
3 min read
3,810 views


X's Artificial Intelligence, Grok, Got it Right!
Welcome back, my aspiring cyberwarriors! We are in the age of artificial intelligence! It will change our daily lives and work lives in...
1 min read
326 views


Is Hacking IP Cameras Just for Voyeurs or Does it Have Strategic and National Security Implications?
Welcome back, my aspiring cyberwarriors! Hacking IP cameras has always had a bit of voyeuristic appeal to the aspiring cyberwarrior. Many...
3 min read
819 views

Bypassing Next Generation Firewalls with fragtunnel
Welcome back, my aspiring cyberwarriors! A firewall is a critical component of network security that acts as a barrier between trusted...
4 min read
4,230 views

Software Defined Radio (SDR) for Hackers: Setting Up Your HackRF One
Welcome back, my aspiring SDR hackers! In the previous tutorials in this series, we used the inexpensive but capable RTL-SDR for our...
3 min read
59,922 views


Mobile Telecom Networks for Hackers, Part 2
Welcome back, my aspiring cyberwarriors! In our modern digital era, mobile or cellular networks are the dominant mode of communication....
5 min read
1,035 views


Mobile Telecom Networks for Hackers, Part 1: Getting Started with Mobile Networks
Welcome back, my aspiring cyberwarriors! The world is rapidly becoming dominated by mobile cellular networks. Not long ago, telecom...
5 min read
1,469 views


Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics
Welcome back, my aspiring cyberwarriors! As our digital world progresses toward a circumstance where data analytics and artificial...
5 min read
604 views

SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
2 min read
2,393 views

Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning
Welcome back, my aspiring cyberwarriors! Nuclei is an advanced, open-source vulnerability scanner that has gained significant popularity...
5 min read
1,759 views


Python Basics for Hacker is Now Available for Pre-Order
Due to overwhelming demand from our students and readers, Python Basics for Hackers is now available for preorder. We estimate a...
1 min read
2,286 views

The SQLite Database: The Ubiquitous Database that Few Understand
Welcome back, my aspiring cyberwarriors! While most IT and cybersecurity professionals are familiar with the big database management...
4 min read
832 views


Mr Robot Hacks: How Elliot and f/society Cloned the Key Card to Enter Steel Mountain
Welcome back, my Mr. Robot aficionados! As you know, Mr. Robot is my favorite TV show even though the show last aired nearly a decade...
4 min read
1,445 views

Physical Security: Lock Picking Basics for Hackers
Welcome back, my aspiring cyberwarriors! Physical perimeter security is just a important as your IT perimeter security. If the hacker can...
6 min read
1,591 views


Satellite Hacking: An Introduction to Satellites and Satellite Systems
Welcome back, my aspiring cyberwarriors! Satellites and the communication they engender have become a crucial element in our modern...
4 min read
1,436 views


Linux Firewalls: The Modern NFTable Firewall
Welcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
5 min read
1,020 views


Satellite Hacking: Hacking the Iridium Satellite System
Welcome back, my aspiring cyberwarriors! In our modern digital era, satellites have been used for numerous essential services, such as:...
4 min read
1,464 views


Hacker Legend Profiles: The Very Strange Case of Jeremy Hammond
Welcome back, my aspiring cyberwarriors! In this new series, I want to profile some the most important hackers in history. I'm hoping...
3 min read
2,110 views