Search


Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain
Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital...
6 min read
2,085 views

Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Welcome back, my aspiring RF hackers! Before embarking upon the study of SDR for Hackers it is good idea to take a close look at the...
3 min read
40,083 views


Software Defined Radio for Hacker: How to Spoof your Global Position (GPS) to Hide Your Location
Welcome back, my aspiring cyberwarrior! As you already know, it is possible to spoof both your IP address and MAC address, but can you...
3 min read
24,215 views


The Brief History of Russian Cyberattacks Against Ukraine and the Risks they Pose to the West
Welcome back, my cyber warriors! As the war in Ukraine rages on, it's important to keep in mind that this war didn't begin in February of...
6 min read
4,603 views


Round 2 of the Great Cyberwar of 2022: Attacking Russia's Schneider Electric SCADA/ICS Sites
Welcome back, my cyber warriors! Round 1 of the Great Cyberwar of 2022 went to Ukraine and its allies from around the world. Among the...
3 min read
13,531 views


SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
For those who are coming from a traditional IT or IT security background, SCADA/ICS systems security can prove prove daunting. Many of...
4 min read
19,258 views

Software Defined Radio, Part 6: Building a Cellphone IMSI Catcher (Stingray)
Welcome back, my aspiring RF hackers! Among the multitude of radio signals swirling around us everyday are the mobile telephone signals...
5 min read
66,704 views


Mr Robot Hacks: How Elliot Used a Raspberry Pi to Hack Steel Mountain
Welcome back, my Mr Robot afacionados! A number of you have written me telling me how much you enjoy the Mr. Robot series on USA Network...
4 min read
12,295 views


SCADA Hacking: "Mysterious" Explosions and Fires at Russian Industrial Sites
Welcome back, my cyberwarrior heroes! As I mentioned in my second interview with David Bombal, the second round of the Ukraine/Russia...
1 min read
3,451 views

Essentials Skills of a Professional Hacker
Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good, professional hacker?" As the...
5 min read
63,176 views

SCADA Hacking and Security: This is How the World Ends!
As the cyberwar to save Ukraine enters Round 2, SCADA/ICS is likely to become the target of both sides. In this article, I simply try to...
4 min read
12,997 views

Network Basics for Hackers! Networks--How they work, and how they can be broken
Did you love Linux Basics for Hackers? Then you will love this book! Once again, Master OTW--in his inimical style of making the complex...
1 min read
13,842 views


What is a White Hat Hacker?
Welcome back, my cyberwarriors! Hackers-Arise is a white-hat hacker training site. This means that we use our skills for good. Obviously,...
1 min read
3,697 views

Ransomware, Part 1: History and Evolution of Ransomware and Ransomware Attacks
Welcome back, my aspiring cyberwarriors! Recent events have once again emphasized the importance of SCADA security! On May 7, 2021,...
6 min read
1,407 views


SCADA Hacking: Anatomy of a SCADA Malware, BlackEnergy 3 Attack on the Ukraine Grid
Welcome back to this series on SCADA Hacking and Security! SCADA/ICS security is critical for SO many reasons. Among the most important...
5 min read
12,010 views


Linux Basics for Hackers, Part 12: The Linux Philosophy
Welcome back my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have...
4 min read
1,470 views


Linux Firewalls: Uncomplicated Firewall (ufw)
Welcome back, my aspiring security engineers! There are a multitude of reasons for using Linux but one of the most overlooked is its...
4 min read
7,681 views


SCADA Hacking: Developing Zero-Day SCADA Exploits
As white-hat hackers, ultimately we want to be able to develop exploits for SCADA/ICS systems. In this way, we can find vulnerabilities...
5 min read
6,648 views


SCADA Hacking: The Triton Malware Threat to SCADA/ICS Infrastructure
Welcome back, my aspiring SCADA cyber warriors! SCADA/ICS infrastructure is under continuous threat. These systems are crucial to any...
3 min read
2,806 views


SCADA Hacking: Attacking SCADA/ICS Systems through the Human Machine Interface (HMI)
Welcome back, my aspiring SCADA/ICS cyberwarriors! Let's begin by congratulating you on your foresight in committing to study SCADA/ICS...
4 min read
5,425 views