top of page
HACKERS
ARISE
Sign in
Store
About
About Hackers Arise
FAQ
Who Is Master OTW?
Master OTW on Youtube
Learn
Getting Started
Linux Basics for Hackers Articles
Network Basics for Hackers Articles
Hacking Fundamentals Articles
Python Basics for Hackers Articles
Training Packages
Compare Training Packages
Member Gold
Subscriber
Subscriber PRO
Member
DFIR
SDR
Training Schedule
Courses
Hacking by Topic
VPN
Python Basics for Hackers
Database Hacking
Wireless Hacks
Hack Like the NSA
Anti-Forensics
Power Sploit
Reverse Engineering Malware
SDR for Hackers
Confessions of a Pro Hacker
Metasploit
SCADA
Linux for Hackers
Hacking Fundamentals
Digital Forensics
OSINT
Car Hacking
Reconnaissance
Recovery of Deleted Files
Cyber Law
MiTM
Vulnerability Scanning
Network Hacking
Linux Firewalls
Mobile Hacking
Hack to Spy
Evading AV
Hacking Facebook
Mobile or Cellular Hacking
Snort
Satellite Hacking
Bluetooth Hacking
Password Cracking
Scripting for Hackers
Mr. Robot
WebApp Hacking
HoneyPot
Exploit Development
Android Hacking
How to Become a Hacker
Linux Basics for Hackers
START HACKING
Welcome
About
Who Is Master OTW?
FAQ
Getting Started
SCADA Hacking
Courses
Web App Hacking Course
Security+
Linux Firewalls
Advanced Linux
OSINT Course
Network Basics for Hackers
Scripting for Hackers
Advanced SCADA Hacking and Security
Automobile Hacking
Linux Basics for Hackers
CISSP Prep
Introduction to Snort (IDS)
Cyber Warrior Training
Metasploit Basics for Hackers
CWA Prep Course
SCADA/ICS Security
Digital Forensics
Wi-Fi Hacking
Mobile Hacking
Reverse Engineering Malware
Network Forensics
Course Registration
Store
Compare Training Packages
Member
Subscriber
Subscriber PRO
Training Schedule
Books
Praise for Linux Basics
OTW's Book Shipping US
OTW's Book Shipping Outside US
OTW on Youtube
Home
Confessions of a Pro Hacker
How Russian Hackers Compromised Election
How Hackers Obtained the Panama Papers
EternalBlue
Hackers For Hire
Hackers for Hire Request
Hackers Needed
How to Become a Hacker
What it Takes to Become a Hacker
Why Hacking is the Most Valuable Skills
Essential Skills of a Master Hacker
Hacking Fundamentals
Linux for Hackers
Why Every Hacker Should Know and Use Lin
Why Every Hacker Should Know and Use Lin
Part 1, Getting Started
Part 2, Finding Stuff
Part 3, Creating, Removing and Renaming
Part 4, Networking
Part 5, Adding and Removing Software
Part 6, Managing Permssions
Part 7, BASH Basics
Part 8, Managing the User Environment
Part 9, Text manipulation
Part 10, Loadable Kernel Modules
Networks Basics for Hackers
Wireless Hacks
Getting Started with aircrack-ng
Cracking the WPS PIN with Reaver
Cracking WPA2-PSK with aircrack-ng
Evading Wireless Authentication
Continuous DoSing a Wireless AP
Wi-Fi Hacking without Cracking Passwords
Mr. Robot
Mr. Robot Hacks: Elliot Builds a Hacking
How Elliot Covered his Tracks
Mr. Robot Hacks: Hiding Data in Audio Fi
How Elliot Traces the Dark Army
How f/society Hacked Smarthome
How Elliot Hacked the Prison
How Angela Stole Boss's Password
How f/society Ransomed Evil Corp
How Elliot Created a Hacking Raspberry P
Hack Like the NSA
The Quantum Insert
EXTRABACON of Cisco Firewalls
Shadow Brokers Exploits
OSINT
OSINT:Case Studies
Metasploit
Part 1, Getting Started with Metasploit
Part 2, Metasploit Modules
Part 3, Metasploit Payloads
Part 4, Connecting postgresql
Part 5: Recon with Metasploit
Part 6: Armitage
Part 7, Adding a Module
Part 8, Exploitation with EternalBlue
Part 9, msfvenom for Custom Payloads
Part 10: Pivoting to Control the Network
Part 11: Exploiting MS Office Fileformat
Part 12: Creating RC Scripts
Part 13: Exploiting Android Devices
Part 14: Updating the msfconsole
Part 15: Post-Exploitation Fun!
Part 16: SCADA Hacking with Metasploit
Part 17: Automobile Hacking
Part 18: AutoSploit
Part 19: Web Delivery for Windows
Part 20: Creating a Fake SMB Server
Part 21: mimikatz
Part 22: Owning with Physical Access
Part 23: Remote Forensics
Part 24: Evasion Modules
Part 25: Web Delivery Linux/Unix
Car Hacking with Metasploit
Create a Fake SMB Server with Metasploi
SCADA/ICS Metasploit Modules
Metasploit Basics
msfvenom
Metasploit's autopwn
Using Metasploit's psexec
Metasploit Web Delivery for Windows
How to Make the Meterpreter Persistent
Ultimate List of Meterpreter scripts
Ultimate List of Meterpreter Command
Web Delivery for Linux/UNIX
Mimikatz
Metasploit Resource Scripts
Metsploit Keywords and Commands
Hack to Spy
Part 1: Building a Raspberry Spy Pi
Part 2, Building a Raspberry Spy Pi
Part 3: Building a Raspberry Spy Pi
Part 4: Adding Listening Capability
Spy on Anyone's Smartphone
Listen to Anyone's Conversation
How to Catch a Terrorist
How to Hack Web cams
WebApp Hacking
Part 5:Enumerating Usernames & Passwords
Part 6: Brute Force WP using XMLRPC
Part 7: Creating a Backdoor with weevely
Part 8: Cloning a Web Site
Part 9: XSS
Part 10: Directory or Path Traversal
Part 11: Local File Inclusion (LFI)
Part 12: CSRF
Part 13, Comprehensive Recon with TiDOS
Part 14: OS Command Injection
Part 15: Fingerprinting with whatweb
Finding Hidden Directories with dirb
Web Technologies, Part 1
Overview and Strategy for Beginners
Spidering a Website with Scarab
Finding Vulnerable WordPress Sites
Finding Vulnerabilities in WordPress
Finding Web Vulnerabilities: Wikto
Hacking Form Authentication with Burp Su
Getting Started with OWASP-ZAP
Training
Digital Forensics
Forensic Investigator for Hire
Network Forensics
Part 1, Capturing the Image
Part 2, Live Memory Acquisition
Part 3, Recovering Deleted Files
Part 4, Finding key Evidence
Part 5, Analyzing the Registry
Part 6: Pre-Fetch Files
Part 7: Browser Forensics
Part 8: Live Analysis with Sysinternals
Part 9: Extracting EXIF from Graphics
Network Forensics
Wireshark Basics
Part 1: Analyzing an Intrusion
Part 2: Analyzing a SCADA Attack
Part 3: Packet Analysis EternalBlue
Anti-Forensics
How Elliot Covered his Tracks: shred
BASH Shell Anti-Forensics
Removing Evidence with BleachBit
Automobile Hacking
Hacking the Mitsubishi Outlander
Part 1, The CAN Protocol
Part 2, can-utils for Linux
Part 3: Car Hacking with Metasploit
Part 4: Hacking the Key Fob
Part 5: Hacking the Remote Alarm
Part 6: Installing the ICS Simulator
Confidantes
Evading AV
Evading AV with OWASP-ZSC
Anatomy of ClamAV
Evading AV with Veil-Evasion
DataBase Hacking
Part 1: Getting Started
Part 2: Basics of SQL Injection
Part 3, Using sqlmap against MySQL
Part 4, Extracting Data with sqlmap
Password Cracking
Scraping Potential Passwords with CeWL
Password Cracking Strategy
Online Password Cracking
Online Password Cracking with Hydra
Cracking Passwords with hashcat
Cracking Passwords with hashcat
password-lists
HoneyPot
PowerSploit
Reconnaissance
Operating System Fingerprinting with p0F
Recon with unicornscan
How to Use Maltego, Part 1
Maltego, Part 2: Recon on a Person
Google Hacking
Email Scraping and Maltego
Finding Website Vulnerabilities with Nik
Abusing DNS for Recon
nmap for recon and DoS
hping for Reconnaissance
Hacking Bluetooth
Part 2, Blutooth Recon
Part 3, The Bluebourne Exploit
Hacking Facebook
Getting Facebook Credentials without Hac
Facebook Password Extractor
Exploit Development
Part 1, Anatomy of Buffer Overflow
Part 2, Writing a Simple Buffer Overflow
Part 3, Fuzzing with Spike
Reverse Engineering Malware
Anatomy of Ransomware
Part 1, Reverse Engineering Malware
Part 2, Assembler Basics
Part 3, Intro to IDA Pro
Part 4, Windows Internals
Part 5, OllyDbg Basics
Why Study Reverse Engineering
Vulnerability Scanning
Vulnerability Scanning with Nexpose
Snort
Snort, Part1: Installing Snort
Snort, Part 2: Configuration
Snort, Part 3: Sending Alerts to MySQL
Snort, Part 4: Snort Rules
Snort, Part 5: Testing Known Exploits
Android Hacking
Setting Up an Android Hacking Lab
Android Basics
Android Hacking: BlueBoune Exploit
Embedding a Backdoor
Shodan
Scripting for Hackers
Powershell for Hackers,Part 1
Perl, Part 1:Intro
Perl, Part 2: Port Scanner
BASH Scripting
Python 2: Building a Banner Grabber
Python 3: Building a FTP Password Crack
MiTM
Hacking DNS to Re-Direct on your LAN
MitM with Ettercap
MitM with arpspoof
Viewing Graphic Files with driftnet
OTW Recommended Products
Cyber Law
SDR for Hackers
Python Basics for Hackers
Python 1: Getting Started
SDR for Hackers
Ransomware
Linux Firewalls
Advertising with Hackers-Arise
Job Board
Podcast by OTW
Forum
Members
Mobile or Cellular Hacking
Categories
Categories
Items 1
Collections
Welcome
About
Who Is Master OTW?
FAQ
Getting Started
SCADA Hacking
Courses
Web App Hacking Course
Security+
Linux Firewalls
Advanced Linux
OSINT Course
Network Basics for Hackers
Scripting for Hackers
Advanced SCADA Hacking and Security
Automobile Hacking
Linux Basics for Hackers
CISSP Prep
Introduction to Snort (IDS)
Cyber Warrior Training
Metasploit Basics for Hackers
CWA Prep Course
SCADA/ICS Security
Digital Forensics
Wi-Fi Hacking
Mobile Hacking
Reverse Engineering Malware
Network Forensics
Course Registration
Store
Compare Training Packages
Member
Subscriber
Subscriber PRO
Training Schedule
Books
Praise for Linux Basics
OTW's Book Shipping US
OTW's Book Shipping Outside US
OTW on Youtube
Home
Confessions of a Pro Hacker
How Russian Hackers Compromised Election
How Hackers Obtained the Panama Papers
EternalBlue
Hackers For Hire
Hackers for Hire Request
Hackers Needed
How to Become a Hacker
What it Takes to Become a Hacker
Why Hacking is the Most Valuable Skills
Essential Skills of a Master Hacker
Hacking Fundamentals
Linux for Hackers
Why Every Hacker Should Know and Use Lin
Why Every Hacker Should Know and Use Lin
Part 1, Getting Started
Part 2, Finding Stuff
Part 3, Creating, Removing and Renaming
Part 4, Networking
Part 5, Adding and Removing Software
Part 6, Managing Permssions
Part 7, BASH Basics
Part 8, Managing the User Environment
Part 9, Text manipulation
Part 10, Loadable Kernel Modules
Networks Basics for Hackers
Wireless Hacks
Getting Started with aircrack-ng
Cracking the WPS PIN with Reaver
Cracking WPA2-PSK with aircrack-ng
Evading Wireless Authentication
Continuous DoSing a Wireless AP
Wi-Fi Hacking without Cracking Passwords
Mr. Robot
Mr. Robot Hacks: Elliot Builds a Hacking
How Elliot Covered his Tracks
Mr. Robot Hacks: Hiding Data in Audio Fi
How Elliot Traces the Dark Army
How f/society Hacked Smarthome
How Elliot Hacked the Prison
How Angela Stole Boss's Password
How f/society Ransomed Evil Corp
How Elliot Created a Hacking Raspberry P
Hack Like the NSA
The Quantum Insert
EXTRABACON of Cisco Firewalls
Shadow Brokers Exploits
OSINT
OSINT:Case Studies
Metasploit
Part 1, Getting Started with Metasploit
Part 2, Metasploit Modules
Part 3, Metasploit Payloads
Part 4, Connecting postgresql
Part 5: Recon with Metasploit
Part 6: Armitage
Part 7, Adding a Module
Part 8, Exploitation with EternalBlue
Part 9, msfvenom for Custom Payloads
Part 10: Pivoting to Control the Network
Part 11: Exploiting MS Office Fileformat
Part 12: Creating RC Scripts
Part 13: Exploiting Android Devices
Part 14: Updating the msfconsole
Part 15: Post-Exploitation Fun!
Part 16: SCADA Hacking with Metasploit
Part 17: Automobile Hacking
Part 18: AutoSploit
Part 19: Web Delivery for Windows
Part 20: Creating a Fake SMB Server
Part 21: mimikatz
Part 22: Owning with Physical Access
Part 23: Remote Forensics
Part 24: Evasion Modules
Part 25: Web Delivery Linux/Unix
Car Hacking with Metasploit
Create a Fake SMB Server with Metasploi
SCADA/ICS Metasploit Modules
Metasploit Basics
msfvenom
Metasploit's autopwn
Using Metasploit's psexec
Metasploit Web Delivery for Windows
How to Make the Meterpreter Persistent
Ultimate List of Meterpreter scripts
Ultimate List of Meterpreter Command
Web Delivery for Linux/UNIX
Mimikatz
Metasploit Resource Scripts
Metsploit Keywords and Commands
Hack to Spy
Part 1: Building a Raspberry Spy Pi
Part 2, Building a Raspberry Spy Pi
Part 3: Building a Raspberry Spy Pi
Part 4: Adding Listening Capability
Spy on Anyone's Smartphone
Listen to Anyone's Conversation
How to Catch a Terrorist
How to Hack Web cams
WebApp Hacking
Part 5:Enumerating Usernames & Passwords
Part 6: Brute Force WP using XMLRPC
Part 7: Creating a Backdoor with weevely
Part 8: Cloning a Web Site
Part 9: XSS
Part 10: Directory or Path Traversal
Part 11: Local File Inclusion (LFI)
Part 12: CSRF
Part 13, Comprehensive Recon with TiDOS
Part 14: OS Command Injection
Part 15: Fingerprinting with whatweb
Finding Hidden Directories with dirb
Web Technologies, Part 1
Overview and Strategy for Beginners
Spidering a Website with Scarab
Finding Vulnerable WordPress Sites
Finding Vulnerabilities in WordPress
Finding Web Vulnerabilities: Wikto
Hacking Form Authentication with Burp Su
Getting Started with OWASP-ZAP
Training
Digital Forensics
Forensic Investigator for Hire
Network Forensics
Part 1, Capturing the Image
Part 2, Live Memory Acquisition
Part 3, Recovering Deleted Files
Part 4, Finding key Evidence
Part 5, Analyzing the Registry
Part 6: Pre-Fetch Files
Part 7: Browser Forensics
Part 8: Live Analysis with Sysinternals
Part 9: Extracting EXIF from Graphics
Network Forensics
Wireshark Basics
Part 1: Analyzing an Intrusion
Part 2: Analyzing a SCADA Attack
Part 3: Packet Analysis EternalBlue
Anti-Forensics
How Elliot Covered his Tracks: shred
BASH Shell Anti-Forensics
Removing Evidence with BleachBit
Automobile Hacking
Hacking the Mitsubishi Outlander
Part 1, The CAN Protocol
Part 2, can-utils for Linux
Part 3: Car Hacking with Metasploit
Part 4: Hacking the Key Fob
Part 5: Hacking the Remote Alarm
Part 6: Installing the ICS Simulator
Confidantes
Evading AV
Evading AV with OWASP-ZSC
Anatomy of ClamAV
Evading AV with Veil-Evasion
DataBase Hacking
Part 1: Getting Started
Part 2: Basics of SQL Injection
Part 3, Using sqlmap against MySQL
Part 4, Extracting Data with sqlmap
Password Cracking
Scraping Potential Passwords with CeWL
Password Cracking Strategy
Online Password Cracking
Online Password Cracking with Hydra
Cracking Passwords with hashcat
Cracking Passwords with hashcat
password-lists
HoneyPot
PowerSploit
Reconnaissance
Operating System Fingerprinting with p0F
Recon with unicornscan
How to Use Maltego, Part 1
Maltego, Part 2: Recon on a Person
Google Hacking
Email Scraping and Maltego
Finding Website Vulnerabilities with Nik
Abusing DNS for Recon
nmap for recon and DoS
hping for Reconnaissance
Hacking Bluetooth
Part 2, Blutooth Recon
Part 3, The Bluebourne Exploit
Hacking Facebook
Getting Facebook Credentials without Hac
Facebook Password Extractor
Exploit Development
Part 1, Anatomy of Buffer Overflow
Part 2, Writing a Simple Buffer Overflow
Part 3, Fuzzing with Spike
Reverse Engineering Malware
Anatomy of Ransomware
Part 1, Reverse Engineering Malware
Part 2, Assembler Basics
Part 3, Intro to IDA Pro
Part 4, Windows Internals
Part 5, OllyDbg Basics
Why Study Reverse Engineering
Vulnerability Scanning
Vulnerability Scanning with Nexpose
Snort
Snort, Part1: Installing Snort
Snort, Part 2: Configuration
Snort, Part 3: Sending Alerts to MySQL
Snort, Part 4: Snort Rules
Snort, Part 5: Testing Known Exploits
Android Hacking
Setting Up an Android Hacking Lab
Android Basics
Android Hacking: BlueBoune Exploit
Embedding a Backdoor
Shodan
Scripting for Hackers
Powershell for Hackers,Part 1
Perl, Part 1:Intro
Perl, Part 2: Port Scanner
BASH Scripting
Python 2: Building a Banner Grabber
Python 3: Building a FTP Password Crack
MiTM
Hacking DNS to Re-Direct on your LAN
MitM with Ettercap
MitM with arpspoof
Viewing Graphic Files with driftnet
OTW Recommended Products
Cyber Law
SDR for Hackers
Python Basics for Hackers
Python 1: Getting Started
SDR for Hackers
Ransomware
Linux Firewalls
Advertising with Hackers-Arise
Job Board
Podcast by OTW
Forum
Members
Mobile or Cellular Hacking
4 min read
Hacker Fundamentals: The Basics of XOR-ing
Welcome back, my aspiring cyber warriors! In a recent tutorial in my Metasploit series, I showed you how to use shikata_ga_nai to change...
bottom of page