4 minAnti-Forensics: Using Veracrypt to Hide Your Most Sensitive DataWelcome back, my aspiring cyberwarriors! In our industry, we often carry around some very valuable and sensitive data. This might include...
3 minBluetooth Hacking: Injecting Commands into a Bluetooth Device with BlueDuckyWelcome back, my aspiring cyberwarriors! Bluetooth is a nearly ubiquitous protocol used to communicate between devices in close proximity...
2 minSDR for Hackers: The DragonOS for Software Defined RadioWelcome back, my aspiring radio hackers! Radio hacking using inexpensive SDR's is the state-of-the art in hacking. So many communication...
4 minDDoS Attacks: Flooding Russian Sites with Fragmented UDP PacketsWelcome back, my aspiring cyberwarriors! At the beginning of the cyberwar between Russia and Ukraine, Hackers-Arise, the IT Army of...