Search


Mr Robot Hacks: How Elliot and f/society Cloned the Key Card to Enter Steel Mountain
Welcome back, my Mr. Robot aficionados! As you know, Mr. Robot is my favorite TV show even though the show last aired nearly a decade...
4 min read
1,459 views

Physical Security: Lock Picking Basics for Hackers
Welcome back, my aspiring cyberwarriors! Physical perimeter security is just a important as your IT perimeter security. If the hacker can...
6 min read
1,603 views


Satellite Hacking: An Introduction to Satellites and Satellite Systems
Welcome back, my aspiring cyberwarriors! Satellites and the communication they engender have become a crucial element in our modern...
4 min read
1,518 views


Linux Firewalls: The Modern NFTable Firewall
Welcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
5 min read
1,021 views


Satellite Hacking: Hacking the Iridium Satellite System
Welcome back, my aspiring cyberwarriors! In our modern digital era, satellites have been used for numerous essential services, such as:...
4 min read
1,468 views


Hacker Legend Profiles: The Very Strange Case of Jeremy Hammond
Welcome back, my aspiring cyberwarriors! In this new series, I want to profile some the most important hackers in history. I'm hoping...
3 min read
2,122 views


Internet of Things (IoT) Hacking, October 8-10
The Internet of Things is growing exponentially! These devices represent an incredible cybersecurity threat to every organization and...
1 min read
1,167 views

Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets
Welcome back my cyberwarriors! One of the key tasks for those defending a country's, institution's, or corporation's assets is to...
4 min read
2,375 views


Cyberwar Mission 2: Reconnaissance in the Adversary's Docker Images
Welcome back, my aspiring cyberwarriors! In this series, Aircorridor, our man in Ukraine, takes you along on his real-life cyberwar...
2 min read
1,029 views


SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Welcome back, my aspiring SCADA Hackers! The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS...
4 min read
6,191 views

Hacking the Cloud: Privilege Escalation in AWS
In the previous tutorial, we learned about cloud technologies and how to conduct data gathering. It's not always the case that the user...
3 min read
894 views

Satellite Hacking, Part 1: Getting Started
Welcome back, my aspiring radio satellite hackers! In this series of tutorials, we will be exploring hacking satellites from a multitude...
2 min read
5,465 views


Radio Basics for Hackers, Part 3: Sampling
Welcome back my aspiring cyber warriors! Sampling is the process of converting a continuous signal into a discrete signal. In the context...
2 min read
1,746 views

SCADA Hacking: Sending Random Inputs into the Russian Industrial Systems
Welcome back, my aspiring cyberwarriors! SCADA hacking and security is different from traditional hacking in numerous ways. For a review...
3 min read
4,166 views


Hackers-Arise Featured in Norway Public Television Documentary on the Cyberwar in Ukraine
The war in Ukraine began February 24, 2022 when Putin marched his troops from Belorussia to invade Ukraine and attempt to capture the...
2 min read
2,574 views

Password Cracking: Creating Custom Password List with cupp
Welcome back, my aspiring cyberwarriors! If the hacker can obtain or crack the target's password, in many cases, this can lead to...
3 min read
7,038 views


Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain
Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital...
6 min read
2,096 views

We Have Successfully Accessed Many IP Cameras in Ukrainian Territory to Spy on Russian Activities
Welcome back, my cyberwarriors! At the request of the IT Army of Ukraine, we were asked to help the war efforts by hacking a large...
1 min read
40,037 views

Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Welcome back, my aspiring RF hackers! Before embarking upon the study of SDR for Hackers it is good idea to take a close look at the...
3 min read
40,603 views


Radio Basics for Hackers, Part 1: Electromagnetic Radiation, Frequency and Wavelength
Welcome back, my aspiring cyberwarriors! As you already know, radio hacking is the leading edge of cybersecurity! So many things in our...
6 min read
10,705 views