Search
5 min read
Can Artificial Intelligence Be Used to Track Your Location?
Welcome back, my aspiring cyberwarriors! We all know that when pictures are taken, they contain Exif data. This EXIF data includes such...
43 views
1 min read
X's Artificial Intelligence, Grok, Got it Right!
Welcome back, my aspiring cyberwarriors! We are in the age of artificial intelligence! It will change our daily lives and work lives in...
117 views
3 min read
Is Hacking IP Cameras Just for Voyeurs or Does it Have Strategic and National Security Implications?
Welcome back, my aspiring cyberwarriors! Hacking IP cameras has always had a bit of voyeuristic appeal to the aspiring cyberwarrior. Many...
274 views
5 min read
The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will be detailing how an individual or small group of cyberwarriors can impact global...
938 views
5 min read
Chinese State-Sponsored Hackers Inside the US Mobile Telecom System: Mobile Telecom Companies Vulnerable to SS7 Vulnerability
Welcome back, my rookie cyberwarriors! In recent weeks, a series of sophisticated cyber attacks has once again exposed critical...
336 views
1 min read
The Default Passwords of Nearly Every IP Camera
Welcome back, my aspiring camera hackers! As you know, at the beginning of the Russian invasion of Ukraine, the Ukrainian Army asked for...
17,372 views
5 min read
Mobile Telecom Networks for Hackers, Part 2
Welcome back, my aspiring cyberwarriors! In our modern digital era, mobile or cellular networks are the dominant mode of communication....
519 views
5 min read
Mobile Telecom Networks for Hackers, Part 1: Getting Started with Mobile Networks
Welcome back, my aspiring cyberwarriors! The world is rapidly becoming dominated by mobile cellular networks. Not long ago, telecom...
824 views
5 min read
Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
449 views
6 min read
Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance
Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. Most novices focus on the handset, but in reality, there are...
5,278 views
4 min read
Python Basics for Hackers, Part 4: Building a Simple Encryption Algorithm in Python
Welcome back, my aspiring cyberwarriors! Cryptography is one of foundational technologies of cybersecurity. It helps to keep our...
582 views
3 min read
Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
277 views
2 min read
SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
2,054 views
5 min read
Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning
Welcome back, my aspiring cyberwarriors! Nuclei is an advanced, open-source vulnerability scanner that has gained significant popularity...
1,412 views
5 min read
What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
753 views
5 min read
IoT Hacking: RFID Basics for Hackers
Welcome back, my aspirational cyberwarriors! IoT devices are increasing at an exponential rate in our digital world. These IoT devices...
1,968 views
3 min read
IoT Hacking: How We Hacked the Dahua Cameras In Ukraine and Russia
Welcome back, my aspiring cyberwarriors! As you know, Hackers-Arise played a key role in the Ukrainian resistance to Russia's brutal...
2,108 views
4 min read
The SQLite Database: The Ubiquitous Database that Few Understand
Welcome back, my aspiring cyberwarriors! While most IT and cybersecurity professionals are familiar with the big database management...
570 views
4 min read
Mr Robot Hacks: How Elliot and f/society Cloned the Key Card to Enter Steel Mountain
Welcome back, my Mr. Robot aficionados! As you know, Mr. Robot is my favorite TV show even though the show last aired nearly a decade...
1,086 views
6 min read
Physical Security: Lock Picking Basics for Hackers
Welcome back, my aspiring cyberwarriors! Physical perimeter security is just a important as your IT perimeter security. If the hacker can...
1,373 views