Search

Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io
Welcome back, my aspiring cyberwarriors! Oftentimes, as cyberwarriors, we need to check to see whether our systems or others' are...
3 min read
14,466 views


SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
For those who are coming from a traditional IT or IT security background, SCADA/ICS systems security can prove prove daunting. Many of...
4 min read
19,313 views

Crashing (DoS) Russian Servers with the Bluekeep Vulnerability
Welcome back, my aspiring cyberwarriors! Putin's brutal invasion of Ukraine must be stopped. While the Ukrainian people are having bombs...
2 min read
7,876 views


Getting Started Bug Bounty Hunting, March 15-17
If you ever dreamed of becoming a Bug Bounty Hunter, this is the course for you! Bounty hunting has grown dramatically in recent years...
1 min read
4,389 views


Web App Hacking: Fuzzing Web Apps to Find Bugs with BurpSuite
Welcome back, my aspiring cyberwarriors! In previous tutorials here on Hackers-Arise, we have used the BurpSuite for a number of purposes...
3 min read
7,644 views

Network Basics for Hackers: Domain Name Service (DNS) and BIND. How it Works and How it Breaks
Welcome back, my aspiring cyber warriors! The Domain Name System or DNS is one of those network protocols that makes the world go round....
11 min read
32,579 views

OSINT: Google Hacking and Dorks to Find Key Information
As all of us know, Google operates the most widely used Internet search engine on the planet. Google crawls nearly every web page, of...
3 min read
17,937 views

Open Source Intelligence (OSINT): Reverse Image Searches for Investigations
Welcome back, my aspiring OSINT experts! There is SO much data on the Internet that just about anything can be found, if you know how and...
3 min read
12,899 views

Open Source Intelligence (OSINT), Spyse, Part 1: Finding Critical Information about a Domain
Welcome back, my open source intelligence (OSINT) investigators. In previous tutorials, we have examined numerous web services that...
3 min read
6,827 views

Wi-Fi Hacking, Part 17: Wi-Fi Hacking with Bettercap
Welcome back my aspiring cyberwarriors! In this series on Wi-Fi (802.11) hacking, we have examined a multitude of approaches to Wi-Fi...
4 min read
19,176 views


Software Defined Radio (SDR) for Hackers, Part 4: Intercepting International Space Station Signals
Welcome back, my aspiring RF hackers! In this series, we are exploring how we can use a simple and inexpensive rtl-sdr dongle, in...
3 min read
5,248 views

Reverse Engineering Malware, Part 1: Getting Started
In my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware....
5 min read
31,341 views


Anatomy of Ransomware, Part 1: Chimera
Ransomware is a type of malware that has become almost epidemic in recent years. Consumers and businesses are being hit with this...
5 min read
14,036 views


Confessions of a Professional Hacker: How Russian Hackers Compromised the 2016 U.S. Presidential Ele
On July 13, 2018, the U.S. Justice Department handed down a 29-page indictment against 12 intelligence officers of the GRU, Russia's...
5 min read
10,150 views

Network Basics for Hackers, TCP/IP: Part 1
Welcome back, my aspiring cyberwarriors! Many of you who aspire to a career in cybersecurity have written me asking whether networking is...
5 min read
69,862 views


BlueTooth Hacking, Part 2: BlueTooth Reconnaissance
The beauty of Bluetooth hacking is that it gives you a clear window into the world of the target. Nearly every device has Bluetooth...
5 min read
40,574 views

Network Basics for Hackers, TCP/IP: Part 2
Welcome back, my aspiring cyberwarriors! In the first part of this series, I introduced you to the basics of networking including IP...
5 min read
19,586 views

Web App Hacking: XXE Vulnerabilities and Attacks
Welcome back, my aspiring Web App cyberwarriors! Among the most important types of web app attacks is the XXE attack. This is the XML...
3 min read
3,111 views

Open Source Intelligence(OSINT), Part 4: Google Hacking to Find Unsecured Web Cams
Welcome back, my aspiring OSINT cyber warriors! The Internet is the largest and deepest repository of data in the history of the world....
2 min read
27,137 views

Network Basics for Hackers: Server Message Block (SMB) and Samba
Welcome back, my aspiring cyber warriors! This series is intended to provide the aspiring cyber warrior with all the information you need...
5 min read
18,987 views