Search


Internet of Things (IoT) Hacking, October 8-10
The Internet of Things is growing exponentially! These devices represent an incredible cybersecurity threat to every organization and...
1 min read
1,161 views


Cyberwar Mission 2: Reconnaissance in the Adversary's Docker Images
Welcome back, my aspiring cyberwarriors! In this series, Aircorridor, our man in Ukraine, takes you along on his real-life cyberwar...
2 min read
991 views

Python Basics: Programming Concepts
Welcome back, my aspiring cyberwarriors! To ascend to the status of cyberwarrior, you must have some basic programming capabilities. In...
6 min read
1,726 views


Ransomware: Build Your Own Ransomware, Part 1
Welcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital...
3 min read
65,641 views


SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Welcome back, my aspiring SCADA Hackers! The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS...
4 min read
6,178 views

Hacking the Cloud: Privilege Escalation in AWS
In the previous tutorial, we learned about cloud technologies and how to conduct data gathering. It's not always the case that the user...
3 min read
889 views


Anti-Forensics: Using Veracrypt to Hide Your Most Sensitive Data
Welcome back, my aspiring cyberwarriors! In our industry, we often carry around some very valuable and sensitive data. This might include...
4 min read
2,490 views

Database Hacking: Common SQL Injection Commands
Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...
2 min read
3,996 views

50% off Subscriber and Subscriber Pro for those in non-industrialized Nations!
We recognize that incomes vary dramatically from one nation to the next and we don't want to exclude anyone from the best cybersecurity...
1 min read
2,619 views


SCADA Hacking: The Most Important SCADA/ICS Attacks in History
Welcome back, my aspiring SCADA/ICS cyberwarriors! SCADA and ICS are the most important cybersecurity issues in this decade. Although...
5 min read
14,994 views

Remaining Anonymous: Getting Started with Tails
This article is from our Ukraine intern _aircorridor. He lays out how to install one of the most secure Linux OSés, Tails. Getting...
2 min read
3,623 views


Python Basics for Hackers, Part 5: Creating a Web Site Scraper to Find Potential Passwords
Welcome back, my aspiring cyberwarriors! Creating password lists is a key element of a successful password cracking strategy. In nearly...
4 min read
6,974 views

Password Cracking: Creating Custom Password List with cupp
Welcome back, my aspiring cyberwarriors! If the hacker can obtain or crack the target's password, in many cases, this can lead to...
3 min read
7,001 views


What is a CyberWarrior? The Hackers-Arise Cyberwarrior Philosophy
If you are reading this, you are very likely interested in the field of cybersecurity. You may also be considering studying...
2 min read
5,369 views

Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Welcome back, my aspiring RF hackers! Before embarking upon the study of SDR for Hackers it is good idea to take a close look at the...
3 min read
40,083 views

Software Defined Radio for Hackers, Part 5: How to Track Aircraft with SDR
Welcome back, my aspiring radio hackers! Nearly every vehicle in the world gives off/sends out a radio signal of one type or another....
3 min read
10,555 views

Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege's of the...
3 min read
5,683 views

Bug Bounty Hunting, Part 2: Stealthy Parameter Detection with ParamSpider
Welcome back, my aspiring cyberwarriors! When attempting to hack/pentest a website, it can be extremely useful to get the parameters of...
3 min read
4,763 views

OSINT: Finding Email Passwords in Dumps with h8mail
Welcome back, my aspiring OSINT Investigators! Often as OSINT investigators, pentesters and hackers, we need to determine if a email...
3 min read
55,974 views

Wi-Fi Hacking: Creating a Wi-Fi Scanner with Python and Scapy
Welcome back, my aspiring cyber warriors! Although there are numerous tools to hack Wi-Fi (802.11), to create your own tools you will...
4 min read
50,961 views