Search


Data Science Analytics for Cybersecurity, January 28-30
Welcome back, my cyberwarriors! Right now, we are on the advent of the Age of Artificial Intelligence ! You will either embrace this new...
1 min read
593 views

IoT Hacking: RFID Basics for Hackers
Welcome back, my aspirational cyberwarriors! IoT devices are increasing at an exponential rate in our digital world. These IoT devices...
5 min read
2,340 views


IoT Hacking: How We Hacked the Dahua Cameras In Ukraine and Russia
Welcome back, my aspiring cyberwarriors! As you know, Hackers-Arise played a key role in the Ukrainian resistance to Russia's brutal...
3 min read
2,542 views

The SQLite Database: The Ubiquitous Database that Few Understand
Welcome back, my aspiring cyberwarriors! While most IT and cybersecurity professionals are familiar with the big database management...
4 min read
780 views


Mr Robot Hacks: How Elliot and f/society Cloned the Key Card to Enter Steel Mountain
Welcome back, my Mr. Robot aficionados! As you know, Mr. Robot is my favorite TV show even though the show last aired nearly a decade...
4 min read
1,389 views

Physical Security: Lock Picking Basics for Hackers
Welcome back, my aspiring cyberwarriors! Physical perimeter security is just a important as your IT perimeter security. If the hacker can...
6 min read
1,527 views


Satellite Hacking: An Introduction to Satellites and Satellite Systems
Welcome back, my aspiring cyberwarriors! Satellites and the communication they engender have become a crucial element in our modern...
4 min read
1,402 views


Linux Firewalls: The Modern NFTable Firewall
Welcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
5 min read
1,003 views


Satellite Hacking: Hacking the Iridium Satellite System
Welcome back, my aspiring cyberwarriors! In our modern digital era, satellites have been used for numerous essential services, such as:...
4 min read
1,446 views


Hacker Legend Profiles: The Very Strange Case of Jeremy Hammond
Welcome back, my aspiring cyberwarriors! In this new series, I want to profile some the most important hackers in history. I'm hoping...
3 min read
2,091 views


Internet of Things (IoT) Hacking, October 8-10
The Internet of Things is growing exponentially! These devices represent an incredible cybersecurity threat to every organization and...
1 min read
1,161 views

Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets
Welcome back my cyberwarriors! One of the key tasks for those defending a country's, institution's, or corporation's assets is to...
4 min read
2,295 views


Cyberwar Mission 2: Reconnaissance in the Adversary's Docker Images
Welcome back, my aspiring cyberwarriors! In this series, Aircorridor, our man in Ukraine, takes you along on his real-life cyberwar...
2 min read
991 views

Python Basics: Programming Concepts
Welcome back, my aspiring cyberwarriors! To ascend to the status of cyberwarrior, you must have some basic programming capabilities. In...
6 min read
1,726 views


Ransomware: Build Your Own Ransomware, Part 1
Welcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital...
3 min read
65,641 views


SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Welcome back, my aspiring SCADA Hackers! The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS...
4 min read
6,178 views

Hacking the Cloud: Privilege Escalation in AWS
In the previous tutorial, we learned about cloud technologies and how to conduct data gathering. It's not always the case that the user...
3 min read
889 views

Satellite Hacking, Part 1: Getting Started
Welcome back, my aspiring radio satellite hackers! In this series of tutorials, we will be exploring hacking satellites from a multitude...
2 min read
5,399 views


Anti-Forensics: Using Veracrypt to Hide Your Most Sensitive Data
Welcome back, my aspiring cyberwarriors! In our industry, we often carry around some very valuable and sensitive data. This might include...
4 min read
2,490 views

DDoS Attacks: Flooding Russian Sites with Fragmented UDP Packets
Welcome back, my aspiring cyberwarriors! At the beginning of the cyberwar between Russia and Ukraine, Hackers-Arise, the IT Army of...
4 min read
15,600 views