Search

2 min read
Crashing (DoS) Russian Servers with the Bluekeep Vulnerability
Welcome back, my aspiring cyberwarriors! Putin's brutal invasion of Ukraine must be stopped. While the Ukrainian people are having bombs...
7,865 views


1 min read
Getting Started Bug Bounty Hunting, March 15-17
If you ever dreamed of becoming a Bug Bounty Hunter, this is the course for you! Bounty hunting has grown dramatically in recent years...
4,327 views


3 min read
Web App Hacking: Fuzzing Web Apps to Find Bugs with BurpSuite
Welcome back, my aspiring cyberwarriors! In previous tutorials here on Hackers-Arise, we have used the BurpSuite for a number of purposes...
7,548 views

11 min read
Network Basics for Hackers: Domain Name Service (DNS) and BIND. How it Works and How it Breaks
Welcome back, my aspiring cyber warriors! The Domain Name System or DNS is one of those network protocols that makes the world go round....
32,348 views

3 min read
OSINT: Google Hacking and Dorks to Find Key Information
As all of us know, Google operates the most widely used Internet search engine on the planet. Google crawls nearly every web page, of...
17,843 views

3 min read
Open Source Intelligence (OSINT): Reverse Image Searches for Investigations
Welcome back, my aspiring OSINT experts! There is SO much data on the Internet that just about anything can be found, if you know how and...
12,703 views

3 min read
Open Source Intelligence (OSINT), Spyse, Part 1: Finding Critical Information about a Domain
Welcome back, my open source intelligence (OSINT) investigators. In previous tutorials, we have examined numerous web services that...
6,673 views

4 min read
Wi-Fi Hacking, Part 17: Wi-Fi Hacking with Bettercap
Welcome back my aspiring cyberwarriors! In this series on Wi-Fi (802.11) hacking, we have examined a multitude of approaches to Wi-Fi...
19,066 views


3 min read
Software Defined Radio (SDR) for Hackers, Part 4: Intercepting International Space Station Signals
Welcome back, my aspiring RF hackers! In this series, we are exploring how we can use a simple and inexpensive rtl-sdr dongle, in...
5,170 views

5 min read
Reverse Engineering Malware, Part 1: Getting Started
In my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware....
31,247 views


5 min read
Anatomy of Ransomware, Part 1: Chimera
Ransomware is a type of malware that has become almost epidemic in recent years. Consumers and businesses are being hit with this malware...
14,029 views


5 min read
Confessions of a Professional Hacker: How Russian Hackers Compromised the 2016 U.S. Presidential Ele
On July 13, 2018, the U.S. Justice Department handed down a 29-page indictment against 12 intelligence officers of the GRU, Russia's...
10,117 views

5 min read
Network Basics for Hackers, TCP/IP: Part 1
Welcome back, my aspiring cyberwarriors! Many of you who aspire to a career in cybersecurity have written me asking whether networking is...
69,470 views


5 min read
BlueTooth Hacking, Part 2: BlueTooth Reconnaissance
The beauty of Bluetooth hacking is that it gives you a clear window into the world of the target. Nearly every device has Bluetooth...
40,493 views

5 min read
Network Basics for Hackers, TCP/IP: Part 2
Welcome back, my aspiring cyberwarriors! In the first part of this series, I introduced you to the basics of networking including IP...
19,427 views

3 min read
Web App Hacking: XXE Vulnerabilities and Attacks
Welcome back, my aspiring Web App cyberwarriors! Among the most important types of web app attacks is the XXE attack. This is the XML...
3,077 views

2 min read
Open Source Intelligence(OSINT), Part 4: Google Hacking to Find Unsecured Web Cams
Welcome back, my aspiring OSINT cyber warriors! The Internet is the largest and deepest repository of data in the history of the world....
26,948 views

5 min read
Network Basics for Hackers: Server Message Block (SMB) and Samba
Welcome back, my aspiring cyber warriors! This series is intended to provide the aspiring cyber warrior with all the information you need...
18,859 views

3 min read
Web App Hacking: BurpSuite, Part 2: Bypass Weak Input Validation to Upload Malware to a Website
Welcome back, my aspiring cyber warriors! In general, we can say that the solution to many injection attacks in web applications is...
4,366 views


3 min read
Wi-Fi Hacking: Using wifite for Multiple Attack Strategies against Wi-Fi AP's
Welcome back, my aspiring cyberwarriors! Often, when doing a pentest, we have multiple Wi-Fi access points to test for security. Rather...
86,039 views