Search
4 min read
Hacker Fundamentals: The Basics of XOR-ing
Welcome back, my aspiring cyber warriors! In a recent tutorial in my Metasploit series, I showed you how to use shikata_ga_nai to change...
1,486 views
2 min read
OSINT: Track the Crisis in Belarus with Ryanair Flight with RadarBox
Welcome back, my aspiring OSINT Investigators! Open Source Intelligence or OSINT offers some of the best ways to track real-time crises...
3,162 views
5 min read
Reconnaissance: Scanning and DoSing with Scapy
Welcome back, my aspiring cyberwarriors! We have explored a number of packet manipulation tools here on Hackers-Arise that can be very...
2,877 views
1 min read
Dreaming of Becoming a Cyber Warrior? You can join our team NOW by becoming a Hackers-Arise MEMBER!
You can become a Hackers-Arise MEMBER and receive the following; 1. "Linux Basics for Hackers v2" Video Companion ($99 value). 2. "CWA...
5,506 views
5 min read
Confessions of a Professional Hacker: How Russian Hackers Compromised the 2016 U.S. Presidential Ele
On July 13, 2018, the U.S. Justice Department handed down a 29-page indictment against 12 intelligence officers of the GRU, Russia's...
10,016 views
5 min read
BlueTooth Hacking, Part 2: BlueTooth Reconnaissance
The beauty of Bluetooth hacking is that it gives you a clear window into the world of the target. Nearly every device has Bluetooth...
40,336 views
4 min read
SCADA Hacking: Attacking SCADA/ICS Systems through the Human Machine Interface (HMI)
Welcome back, my aspiring SCADA/ICS cyberwarriors! Let's begin by congratulating you on your foresight in committing to study SCADA/ICS...
5,317 views
5 min read
Web App Hacking, Part 9: Cross Site Scripting (XSS)
Welcome back, my fledgling hackers! The next tutorial in this Web App Hacking series involves among the most critical vulnerabilities in...
14,450 views
5 min read
Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)
Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
70,341 views
4 min read
Wi-Fi (802.11) Hacking: How to Hack the WPS PIN with Reaver
Welcome back, my budding hackers! One of the most popular areas for those starting out in this discipline is hacking Wi-Fi. Wi-Fi has...
51,015 views
3 min read
Android Hacking, Part 2: How to Embed a Backdoor into an Android APK
Welcome back, my fledgling hackers! Mobile devices--smartphones and tablets--are proliferating around the world and slowly overtaking...
46,255 views
5 min read
Online Password Cracking with THC-Hydra and BurpSuite
Welcome back, my fledgling hackers! In an earlier tutorial, I had introduced you to two essential tools for cracking online...
15,736 views
5 min read
Database Hacking, Part 3: Using sqlmap for SQL Injection Against MySQL and WordPress
SQL Injection is one of the most important and common attacks on web sites. Nearly every website has a database behind it containing...
78,212 views
7 min read
Metasploit Basics, Part 15: Post- Exploitation Fun (Web Cam, Microphone, Passwords and more)
Welcome back, my fledgling hackers! As we have progressed through this series on Metasploit Basics, we have used numerous techniques to...
39,668 views
2 min read
Metasploit Basics, Part 14: Updating the msfconsole
Welcome back my novice hackers! Recently, I have received numerous questions regarding how to update the msfconsole built into Kali....
97,392 views
3 min read
Digital Forensics, Part 3: Recovering Deleted Files
In the first two parts of this series, we captured a forensically sound image of the hard drive or other storage device and an image of...
37,766 views