Search

3 min read
Hacking the Cloud: Privilege Escalation in AWS
In the previous tutorial, we learned about cloud technologies and how to conduct data gathering. It's not always the case that the user...
886 views


4 min read
Anti-Forensics: Using Veracrypt to Hide Your Most Sensitive Data
Welcome back, my aspiring cyberwarriors! In our industry, we often carry around some very valuable and sensitive data. This might include...
2,292 views

2 min read
Database Hacking: Common SQL Injection Commands
Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...
3,914 views

1 min read
50% off Subscriber and Subscriber Pro for those in non-industrialized Nations!
We recognize that incomes vary dramatically from one nation to the next and we don't want to exclude anyone from the best cybersecurity...
2,568 views


5 min read
SCADA Hacking: The Most Important SCADA/ICS Attacks in History
Welcome back, my aspiring SCADA/ICS cyberwarriors! SCADA and ICS are the most important cybersecurity issues in this decade. Although...
14,690 views

2 min read
Remaining Anonymous: Getting Started with Tails
This article is from our Ukraine intern _aircorridor. He lays out how to install one of the most secure Linux OSés, Tails. Getting...
3,598 views


4 min read
Python Basics for Hackers, Part 5: Creating a Web Site Scraper to Find Potential Passwords
Welcome back, my aspiring cyberwarriors! Creating password lists is a key element of a successful password cracking strategy. In nearly...
6,920 views

3 min read
Password Cracking: Creating Custom Password List with cupp
Welcome back, my aspiring cyberwarriors! If the hacker can obtain or crack the target's password, in many cases, this can lead to...
6,958 views


2 min read
What is a CyberWarrior? The Hackers-Arise Cyberwarrior Philosophy
If you are reading this, you are very likely interested in the field of cybersecurity. You may also be considering studying...
5,359 views

3 min read
Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Welcome back, my aspiring RF hackers! Before embarking upon the study of SDR for Hackers it is good idea to take a close look at the...
39,461 views

3 min read
Software Defined Radio for Hackers, Part 5: How to Track Aircraft with SDR
Welcome back, my aspiring radio hackers! Nearly every vehicle in the world gives off/sends out a radio signal of one type or another....
10,312 views

3 min read
Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege's of the...
5,617 views

3 min read
Bug Bounty Hunting, Part 2: Stealthy Parameter Detection with ParamSpider
Welcome back, my aspiring cyberwarriors! When attempting to hack/pentest a website, it can be extremely useful to get the parameters of...
4,758 views

3 min read
OSINT: Finding Email Passwords in Dumps with h8mail
Welcome back, my aspiring OSINT Investigators! Often as OSINT investigators, pentesters and hackers, we need to determine if a email...
55,694 views

4 min read
Wi-Fi Hacking: Creating a Wi-Fi Scanner with Python and Scapy
Welcome back, my aspiring cyber warriors! Although there are numerous tools to hack Wi-Fi (802.11), to create your own tools you will...
50,816 views


3 min read
Software Defined Radio for Hacker: How to Spoof your Global Position (GPS) to Hide Your Location
Welcome back, my aspiring cyberwarrior! As you already know, it is possible to spoof both your IP address and MAC address, but can you...
24,072 views

5 min read
Networking Basics for Hackers, Part 1
With our dramatic growth over the last year, we have added many new aspiring hackers who are still lacking in the basics of network and...
15,959 views


8 min read
Metasploit Basics for Hackers, Part 1: Getting Started with Metasploit
Welcome back, my aspiring cyber warriors! In this series, I will introduce you to the world's most popular hacking/pentesting platform,...
69,182 views

3 min read
Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io
Welcome back, my aspiring cyberwarriors! Oftentimes, as cyberwarriors, we need to check to see whether our systems or others' are...
14,419 views

6 min read
Digital Forensics, Part 8: Live Analysis with sysinternals
Welcome back, my aspiring forensic investigators! In this tutorial, we will use another tool that can be used in for live system...
17,196 views