top of page
3 min read
Software Defined Radio (SDR) for Hackers, Part 4: Intercepting International Space Station Signals
Welcome back, my aspiring RF hackers! In this series, we are exploring how we can use a simple and inexpensive rtl-sdr dongle, in...
4,985 views
5 min read
Reverse Engineering Malware, Part 1: Getting Started
In my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware....
31,063 views
4 min read
OSINT: Tracking the Suspect's Precise Location Using Wigle.net
Welcome back, my aspiring OSINT investigators! There is SO much information available to us on the Internet that sometimes it can be...
47,585 views
4 min read
Hacker Fundamentals: The Basics of XOR-ing
Welcome back, my aspiring cyber warriors! In a recent tutorial in my Metasploit series, I showed you how to use shikata_ga_nai to change...
1,478 views
6 min read
Advice from a Professional Hacker: How Hackers Are Stealing Your Bitcoin and Other Cryptocurrencies
As the price of the cryptocurrencies has skyrocketed over the last few years, the theft of cryptocurrencies has soared right along with...
3,893 views
1 min read
Dreaming of Becoming a Cyber Warrior? You can join our team NOW by becoming a Hackers-Arise MEMBER!
You can become a Hackers-Arise MEMBER and receive the following; 1. "Linux Basics for Hackers v2" Video Companion ($99 value). 2. "CWA...
5,505 views
3 min read
SCADA Hacking: The Triton Malware Threat to SCADA/ICS Infrastructure
Welcome back, my aspiring SCADA cyber warriors! SCADA/ICS infrastructure is under continuous threat. These systems are crucial to any...
2,785 views
5 min read
BlueTooth Hacking, Part 2: BlueTooth Reconnaissance
The beauty of Bluetooth hacking is that it gives you a clear window into the world of the target. Nearly every device has Bluetooth...
40,299 views
5 min read
Network Basics for Hackers, TCP/IP: Part 2
Welcome back, my aspiring cyberwarriors! In the first part of this series, I introduced you to the basics of networking including IP...
19,333 views
3 min read
Web App Hacking: XXE Vulnerabilities and Attacks
Welcome back, my aspiring Web App cyberwarriors! Among the most important types of web app attacks is the XXE attack. This is the XML...
2,973 views
5 min read
Web App Hacking, Part 9: Cross Site Scripting (XSS)
Welcome back, my fledgling hackers! The next tutorial in this Web App Hacking series involves among the most critical vulnerabilities in...
14,425 views
3 min read
Wi-Fi Hacking: Using wifite for Multiple Attack Strategies against Wi-Fi AP's
Welcome back, my aspiring cyberwarriors! Often, when doing a pentest, we have multiple Wi-Fi access points to test for security. Rather...
85,532 views
7 min read
Cryptography Basics for Hackers, Part 1
Welcome back, my aspiring cyberwarriors! As cyberwarriors, we are often faced with the hurdle or promise of cryptography and encryption....
2,828 views
4 min read
Why Hackers Make the Best InfoSec Engineers
At first blush, the idea of putting a hacker in charge of your information security might seem absurd or, at least, ill-advised. Who...
2,533 views
5 min read
Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)
Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
70,292 views
4 min read
Wi-Fi (802.11) Hacking: How to Hack the WPS PIN with Reaver
Welcome back, my budding hackers! One of the most popular areas for those starting out in this discipline is hacking Wi-Fi. Wi-Fi has...
50,977 views
6 min read
Web App Hacking: Online Password Cracking with Burp Suite (Web App Authentication)
Welcome back, my aspiring cyber warriors! In this series, we are exploring the myriad of ways to hack web applications. As you know, web...
22,583 views
3 min read
Android Hacking, Part 2: How to Embed a Backdoor into an Android APK
Welcome back, my fledgling hackers! Mobile devices--smartphones and tablets--are proliferating around the world and slowly overtaking...
46,193 views
5 min read
Online Password Cracking with THC-Hydra and BurpSuite
Welcome back, my fledgling hackers! In an earlier tutorial, I had introduced you to two essential tools for cracking online...
15,714 views
5 min read
Database Hacking, Part 3: Using sqlmap for SQL Injection Against MySQL and WordPress
SQL Injection is one of the most important and common attacks on web sites. Nearly every website has a database behind it containing...
78,183 views
bottom of page