Search

Wi-Fi Hacking, Part 11: The PMKID Attack
Welcome back, my aspiring cyber warriors! As you know, the key to hacking the WPA2-PSK is to capture the PSK (pre-shared key or...
4 min read
103,182 views

Bypassing Next Generation Firewalls with fragtunnel
Welcome back, my aspiring cyberwarriors! A firewall is a critical component of network security that acts as a barrier between trusted...
4 min read
4,088 views


Data Science Analytics for Cybersecurity, January 28-30
Welcome back, my cyberwarriors! Right now, we are on the advent of the Age of Artificial Intelligence ! You will either embrace this new...
1 min read
592 views

Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets
Welcome back my cyberwarriors! One of the key tasks for those defending a country's, institution's, or corporation's assets is to...
4 min read
2,286 views


Cyberwar Mission 2: Reconnaissance in the Adversary's Docker Images
Welcome back, my aspiring cyberwarriors! In this series, Aircorridor, our man in Ukraine, takes you along on his real-life cyberwar...
2 min read
989 views

Database Hacking: Common SQL Injection Commands
Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...
2 min read
3,990 views


What is a CyberWarrior? The Hackers-Arise Cyberwarrior Philosophy
If you are reading this, you are very likely interested in the field of cybersecurity. You may also be considering studying...
2 min read
5,369 views

Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Welcome back, my aspiring RF hackers! Before embarking upon the study of SDR for Hackers it is good idea to take a close look at the...
3 min read
40,019 views

OSINT: Finding Email Passwords in Dumps with h8mail
Welcome back, my aspiring OSINT Investigators! Often as OSINT investigators, pentesters and hackers, we need to determine if a email...
3 min read
55,946 views


Open Source Intelligence (OSINT): OSINT Tools for Bitcoin Investigations
Welcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency...
3 min read
13,144 views


Metasploit Basics for Hackers, Part 1: Getting Started with Metasploit
Welcome back, my aspiring cyber warriors! In this series, I will introduce you to the world's most popular hacking/pentesting platform,...
8 min read
69,445 views

Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io
Welcome back, my aspiring cyberwarriors! Oftentimes, as cyberwarriors, we need to check to see whether our systems or others' are...
3 min read
14,440 views

Social Engineering Attacks: Creating a Fake SMS Message
Welcome back, my aspiring cyber warriors! Social engineering is a key feature of some of the biggest hacks in history! Many novice...
3 min read
50,849 views


What is a White Hat Hacker?
Welcome back, my cyberwarriors! Hackers-Arise is a white-hat hacker training site. This means that we use our skills for good. Obviously,...
1 min read
3,697 views

Reverse Engineering Malware: Getting Started with Ghidra, Part 1
Welcome back, my aspiring cyber warriors! There are a number of excellent tools available to use in the field of reverse engineering (see...
3 min read
19,160 views

Linux Basics for Hackers, Part 13: Running Kali Linux in Windows (WSL)
Welcome back my aspiring cyber warriors! As most of you know, I am the author of the best-selling book, Linux Basics for Hackers from No...
3 min read
11,135 views


Evading Antivirus: How Antivirus Works
Welcome back my aspiring cyberwarriors! Before beginning on the journey to learn to how to evade AV, it is critical to first understand...
2 min read
3,775 views


Linux Basics for Hackers, Part 12: The Linux Philosophy
Welcome back my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have...
4 min read
1,469 views

How To Study and Pass the Certified Whitehat Hacker Associate (CWA) Exam
Many of you have been asking me, "How can I study for the CWA certification exam, and what material is covered on the exam?" Here is the ...
5 min read
15,793 views


Linux Firewalls: Uncomplicated Firewall (ufw)
Welcome back, my aspiring security engineers! There are a multitude of reasons for using Linux but one of the most overlooked is its...
4 min read
7,665 views