Become a Cyber Warrior.png
Return to Home
Reverse Engineering Malware, Part 2: Assembler Language Basics
otw
  • Jul 3, 2020
  • 5 min

Reverse Engineering Malware, Part 2: Assembler Language Basics

Most of the work we will be doing in reverse engineering will be with assembler language. This simple and sometimes tedious language can ...
5,5131
Splunk for Security Monitoring, Part 3: Creating a Real-Time Alert
otw
  • Jul 1, 2020
  • 3 min

Splunk for Security Monitoring, Part 3: Creating a Real-Time Alert

Welcome back, my aspiring cyber warriors! In earlier posts here at Hackers-Arise, I introduced you to Splunk, an excellent tool for manag...
6170
OSINT, Part 6: Open-Source Flight and Aircraft Tracking  Data
otw
  • Jun 30, 2020
  • 3 min

OSINT, Part 6: Open-Source Flight and Aircraft Tracking Data

Welcome back, my aspiring cyber warrior! There is SO much data on the Internet that the issue not IF the data is available, but rather wh...
3,8030
Open Source Intelligence(OSINT), Part 4: Google Hacking to Find Unsecured Web Cams
OTW
  • Jun 18, 2020
  • 2 min

Open Source Intelligence(OSINT), Part 4: Google Hacking to Find Unsecured Web Cams

Welcome back, my aspiring OSINT cyber warriors! The Internet is the largest and deepest repository of data in the history of the world. W...
7,0121
Password Cracking Strategy: Using pipal to Determine Common Password Patterns
otw
  • Jun 3, 2020
  • 3 min

Password Cracking Strategy: Using pipal to Determine Common Password Patterns

Welcome back, my aspiring cyber warriors! In my book "Getting Started Becoming a Master Hacker" and an earlier post, I encouraged you to ...
1,5100
OSINT: How to Use the DNS Cache to Determine the Target's AV Software
OTW
  • May 28, 2020
  • 4 min

OSINT: How to Use the DNS Cache to Determine the Target's AV Software

Welcome back, my greenhorn hackers! In previous tutorials, we have looked at ways to re-encode your payloads and other malware to evade A...
5,2810
Digital Forensics, Part 5: Analyzing the Windows Registry for Evidence
OTW
  • May 19, 2020
  • 7 min

Digital Forensics, Part 5: Analyzing the Windows Registry for Evidence

Although nearly all Microsoft Windows users are aware that their system has a registry, few understand what it does, and even fewer under...
22,9000
Reverse Engineering Malware, Part 5: OllyDbg Basics
OTW
  • May 15, 2020
  • 5 min

Reverse Engineering Malware, Part 5: OllyDbg Basics

In this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and esp...
18,6460
Mr. Robot Hacks, Part 8: How Darlene Hacks the Car in Season 4
otw
  • May 9, 2020
  • 2 min

Mr. Robot Hacks, Part 8: How Darlene Hacks the Car in Season 4

Welcome back, my Mr Robot fans! As many of you already know, Mr.Robot is my favorite TV show and if it were a movie, it would be the BEST...
1,8520
BASH Scripting for Hackers, Part 2: Building a Continuous Wi-Fi Denial of Service Tool
otw
  • May 6, 2020
  • 3 min

BASH Scripting for Hackers, Part 2: Building a Continuous Wi-Fi Denial of Service Tool

Welcome back, my aspiring cyberwarriors! Now that you understand a bit of BASH scripting, let's try to use our BASH scripting skills in c...
1,5770
Python Scripting for Hackers, Part 3: Building an FTP Password Cracking Tool
OTW
  • May 5, 2020
  • 4 min

Python Scripting for Hackers, Part 3: Building an FTP Password Cracking Tool

This is the third installment of my Python scripting series. If you haven't read the previous two articles, take some time now to go back...
3,8580
Automobile Hacking, Part 4: How to Hack the Keyless Entry System
OTW
  • May 5, 2020
  • 3 min

Automobile Hacking, Part 4: How to Hack the Keyless Entry System

Welcome back, my aspiring cyber warriors! As automobiles become increasingly complex and digital, the opportunities for hacking these tra...
10,7403
Mr. Robot Hacks, Part 7: How Elliot Hacks Everyone's Password
OTW
  • Apr 24, 2020
  • 7 min

Mr. Robot Hacks, Part 7: How Elliot Hacks Everyone's Password

Welcome back, my Mr. Robot fans! In the television show, Mr. Robot on FX (past episodes are on Amazon Prime), Elliot seems to be able to ...
11,9892
Automobile Hacking: The ICS Simulator, Part 2
otw
  • Apr 20, 2020
  • 3 min

Automobile Hacking: The ICS Simulator, Part 2

Welcome back, my aspiring automobile cyber warriors! In part 1 of the series on the ICS simulator, we installed the can-utils and the ICS...
6650
Android Hacking, Part 2: How to Embed a Backdoor into an Android APK
OTW
  • Apr 17, 2020
  • 3 min

Android Hacking, Part 2: How to Embed a Backdoor into an Android APK

Welcome back, my fledgling hackers! Mobile devices--smartphones and tablets--are proliferating around the world and slowly overtaking des...
16,2161
Automobile Hacking: The ICS Simulator, Part 1
otw
  • Apr 16, 2020
  • 2 min

Automobile Hacking: The ICS Simulator, Part 1

Welcome back, my aspiring automobile cyber warriors! Automobile hacking is the cutting edge of the hacking discipline! Automobile and oth...
1,4361
Open Source Intelligence (OSINT): Reverse Image Searches for Investigations
otw
  • Apr 1, 2020
  • 3 min

Open Source Intelligence (OSINT): Reverse Image Searches for Investigations

Welcome back, my aspiring OSINT experts! There is SO much data on the Internet that just about anything can be found, if you know how and...
2,4570
Open-Source Intelligence (OSINT): Gathering Open- Source  Security Data using Censys
otw
  • Mar 28, 2020
  • 4 min

Open-Source Intelligence (OSINT): Gathering Open- Source Security Data using Censys

Welcome back, my aspiring OSINT cyber warriors! John Matherly began Shodan in 2009 to collect banner information from nearly early IP add...
2,0982
{"items":["5dc633be38affa0017f34eba","5efc9102fa79090017c5d8fd","5e794a04902f3f002d7ae232","5dc633b2867a2600174cc675","5ec02cec8f707600174d7656","5dc633b25fbe210017667677","5dc633b238affa0017f34eab","5dc633b4cfaabb0017b73f90","5dd6e5ef727644001718ceee","5eb2da6d7d24d6001811edf6","5dc633b982e20400179f0bc0","5dc633b20a33a500177fbf63","5dc633b49e3929001786ffc3","5e9893466c9317001783a7a6","5dc633b2dd4ef40017d075b6","5e973283ea73170017bedcdd","5e8372cf1cb1a700171e00f7","5e7d1b3bd13bee0017901ddd"],"styles":{"galleryType":"Columns","groupSize":1,"showArrows":true,"cubeImages":true,"cubeType":"fill","cubeRatio":1.3333333333333333,"isVertical":true,"gallerySize":30,"collageAmount":0,"collageDensity":0,"groupTypes":"1","oneRow":false,"imageMargin":14,"galleryMargin":0,"scatter":0,"rotatingScatter":"","chooseBestGroup":true,"smartCrop":false,"hasThumbnails":false,"enableScroll":true,"isGrid":true,"isSlider":false,"isColumns":false,"isSlideshow":false,"cropOnlyFill":false,"fixedColumns":0,"enableInfiniteScroll":true,"isRTL":false,"minItemSize":50,"rotatingGroupTypes":"","rotatingCropRatios":"","columnWidths":"","gallerySliderImageRatio":1.7777777777777777,"numberOfImagesPerRow":3,"numberOfImagesPerCol":1,"groupsPerStrip":0,"borderRadius":0,"boxShadow":0,"gridStyle":0,"mobilePanorama":false,"placeGroupsLtr":true,"viewMode":"preview","thumbnailSpacings":4,"galleryThumbnailsAlignment":"bottom","isMasonry":false,"isAutoSlideshow":false,"slideshowLoop":false,"autoSlideshowInterval":4,"bottomInfoHeight":0,"titlePlacement":"SHOW_BELOW","galleryTextAlign":"center","scrollSnap":false,"itemClick":"nothing","fullscreen":true,"videoPlay":"hover","scrollAnimation":"NO_EFFECT","slideAnimation":"SCROLL","scrollDirection":0,"scrollDuration":400,"overlayAnimation":"FADE_IN","arrowsPosition":0,"arrowsSize":23,"watermarkOpacity":40,"watermarkSize":40,"useWatermark":true,"watermarkDock":{"top":"auto","left":"auto","right":0,"bottom":0,"transform":"translate3d(0,0,0)"},"loadMoreAmount":"all","defaultShowInfoExpand":1,"allowLinkExpand":true,"expandInfoPosition":0,"allowFullscreenExpand":true,"fullscreenLoop":false,"galleryAlignExpand":"left","addToCartBorderWidth":1,"addToCartButtonText":"","slideshowInfoSize":200,"playButtonForAutoSlideShow":false,"allowSlideshowCounter":false,"hoveringBehaviour":"NEVER_SHOW","thumbnailSize":120,"magicLayoutSeed":1,"imageHoverAnimation":"NO_EFFECT","imagePlacementAnimation":"NO_EFFECT","calculateTextBoxWidthMode":"PERCENT","textBoxHeight":203,"textBoxWidth":200,"textBoxWidthPercent":50,"textImageSpace":10,"textBoxBorderRadius":0,"textBoxBorderWidth":0,"loadMoreButtonText":"","loadMoreButtonBorderWidth":1,"loadMoreButtonBorderRadius":0,"imageInfoType":"ATTACHED_BACKGROUND","itemBorderWidth":1,"itemBorderRadius":0,"itemEnableShadow":false,"itemShadowBlur":20,"itemShadowDirection":135,"itemShadowSize":10,"imageLoadingMode":"BLUR","expandAnimation":"NO_EFFECT","imageQuality":90,"usmToggle":false,"usm_a":0,"usm_r":0,"usm_t":0,"videoSound":false,"videoSpeed":"1","videoLoop":true,"jsonStyleParams":"","gallerySizeType":"px","gallerySizePx":292,"allowTitle":true,"allowContextMenu":true,"textsHorizontalPadding":-30,"itemBorderColor":{"themeName":"color_12","value":"rgba(202,221,230,1)"},"showVideoPlayButton":true,"galleryLayout":2,"calculateTextBoxHeightMode":"MANUAL","textsVerticalPadding":-15,"targetItemSize":292,"selectedLayout":"2|bottom|1|fill|true|0|true","layoutsVersion":2,"selectedLayoutV2":2,"isSlideshowFont":true,"externalInfoHeight":203,"externalInfoWidth":0},"container":{"width":956,"galleryWidth":970,"galleryHeight":0,"scrollBase":0,"height":null}}
23
4
56
pentester.png
  • Subscribers
    • GETTING STARTED
      • SCADA Hacking
        • Online Store
          • Online Courses
            • Web App Hacking Course
              • Security+
                • Linux Firewalls
                  • Advanced Linux
                    • OSINT Course
                      • Network Basics for Hackers
                        • Scripting for Hackers
                          • Advanced SCADA Hacking and Security
                            • Automobile Hacking
                              • Linux Basics for Hackers
                                • CISSP Prep
                                  • Introduction to Snort (IDS)
                                    • Cyber Warrior Training
                                      • Metasploit Basics for Hackers
                                        • CWA Prep Course
                                          • SCADA/ICS Security
                                            • Digital Forensics
                                              • Wi-Fi Hacking
                                                • Mobile Hacking
                                                  • Reverse Engineering Malware
                                                    • Network Forensics
                                                    • Training Schedule
                                                      • Course Registration
                                                      • OSINT
                                                        • MEMBERS
                                                          • OTW's New Book
                                                            • OTW's Book Shipping US
                                                              • OTW's Book Shipping Outside US
                                                                • Subscriber PRO
                                                                  • Metasploit
                                                                    • Part 1, Getting Started with Metasploit
                                                                      • Part 2, Metasploit Modules
                                                                        • Part 3, Metasploit Payloads
                                                                          • Part 4, Connecting postgresql
                                                                            • Part 5: Recon with Metasploit
                                                                              • Part 6: Armitage
                                                                                • Part 7, Adding a Module
                                                                                  • Part 8, Exploitation with EternalBlue
                                                                                    • Part 9, msfvenom for Custom Payloads
                                                                                      • Part 10: Pivoting to Control the Network
                                                                                        • Part 11: Exploiting MS Office Fileformat
                                                                                          • Part 12: Creating RC Scripts
                                                                                            • Part 13: Exploiting Android Devices
                                                                                              • Part 14: Updating the msfconsole
                                                                                                • Part 15: Post-Exploitation Fun!
                                                                                                  • Part 16: SCADA Hacking with Metasploit
                                                                                                    • Part 17: Automobile Hacking
                                                                                                      • Part 18: AutoSploit
                                                                                                        • Part 19: Web Delivery for Windows
                                                                                                          • Part 20: Creating a Fake SMB Server
                                                                                                            • Part 21: mimikatz
                                                                                                              • Part 22: Owning with Physical Access
                                                                                                                • Part 23: Remote Forensics
                                                                                                                  • Part 24: Evasion Modules
                                                                                                                    • Part 25: Web Delivery Linux/Unix
                                                                                                                      • Car Hacking with Metasploit
                                                                                                                        • Create a Fake SMB Server with Metasploi
                                                                                                                          • SCADA/ICS Metasploit Modules
                                                                                                                            • Metasploit Basics
                                                                                                                              • msfvenom
                                                                                                                                • Metasploit's autopwn
                                                                                                                                  • Using Metasploit's psexec
                                                                                                                                    • Metasploit Web Delivery for Windows
                                                                                                                                      • How to Make the Meterpreter Persistent
                                                                                                                                        • Ultimate List of Meterpreter scripts
                                                                                                                                          • Ultimate List of Meterpreter Command
                                                                                                                                            • Web Delivery for Linux/UNIX
                                                                                                                                              • Mimikatz
                                                                                                                                                • Metasploit Resource Scripts
                                                                                                                                                  • Metsploit Keywords and Commands
                                                                                                                                                  • Praise for Linux Basics for Hackers
                                                                                                                                                    • Who Is Master OTW?
                                                                                                                                                      • Mr. Robot
                                                                                                                                                        • How Elliot Covered his Tracks
                                                                                                                                                          • Mr. Robot Hacks: Hiding Data in Audio Fi
                                                                                                                                                            • How Elliot Traces the Dark Army
                                                                                                                                                              • How f/society Hacked Smarthome
                                                                                                                                                                • How Elliot Hacked the Prison
                                                                                                                                                                  • How Angela Stole Boss's Password
                                                                                                                                                                    • How Elliot Made his Hacks Untraceable
                                                                                                                                                                      • How f/society Ransomed Evil Corp
                                                                                                                                                                        • How Elliot Created a Hacking Raspberry P
                                                                                                                                                                        • Hackers For Hire
                                                                                                                                                                          • Hackers for Hire Request
                                                                                                                                                                          • Confessions of a Professional Hacker
                                                                                                                                                                            • How Russian Hackers Compromised Election
                                                                                                                                                                              • How Hackers Obtained the Panama Papers
                                                                                                                                                                              • Linux for Hackers
                                                                                                                                                                                • Why Every Hacker Should Know and Use Lin
                                                                                                                                                                                  • Why Every Hacker Should Know and Use Lin
                                                                                                                                                                                    • Part 1, Getting Started
                                                                                                                                                                                      • Part 2, Finding Stuff
                                                                                                                                                                                        • Part 3, Creating, Removing and Renaming
                                                                                                                                                                                          • Part 4, Networking
                                                                                                                                                                                            • Part 5, Adding and Removing Software
                                                                                                                                                                                              • Part 6, Managing Permssions
                                                                                                                                                                                                • Part 7, BASH Basics
                                                                                                                                                                                                  • Part 8, Managing the User Environment
                                                                                                                                                                                                    • Part 9, Text manipulation
                                                                                                                                                                                                      • Part 10, Loadable Kernel Modules
                                                                                                                                                                                                      • Digital Forensic Investigator for Hire
                                                                                                                                                                                                        • Digital Forensic Investigator Request
                                                                                                                                                                                                        • Training Packages
                                                                                                                                                                                                          • Hack Like the NSA
                                                                                                                                                                                                            • The Quantum Insert
                                                                                                                                                                                                              • EXTRABACON of Cisco Firewalls
                                                                                                                                                                                                                • EternalBlue
                                                                                                                                                                                                                  • Shadow Brokers Exploits
                                                                                                                                                                                                                  • Wireless Hacks
                                                                                                                                                                                                                    • Wireless Hacking Strategies
                                                                                                                                                                                                                      • Getting Started with aircrack-ng
                                                                                                                                                                                                                        • Cracking the WPS PIN with Reaver
                                                                                                                                                                                                                          • Getting Started with aircrack-ng
                                                                                                                                                                                                                            • Cracking WPA2-PSK with aircrack-ng
                                                                                                                                                                                                                              • Cracking WPS on Wifi
                                                                                                                                                                                                                                • Evading Wireless Authentication
                                                                                                                                                                                                                                  • Continuous DoSing a Wireless AP
                                                                                                                                                                                                                                    • Wireless Hacking with Wifiphisher
                                                                                                                                                                                                                                      • Wi-Fi Hacking without Cracking Passwords
                                                                                                                                                                                                                                      • Hack to Spy
                                                                                                                                                                                                                                        • Part 1: Building a Raspberry Spy Pi
                                                                                                                                                                                                                                          • Part 3: Building a Raspberry Spy Pi
                                                                                                                                                                                                                                            • Part 2, Building a Raspberry Spy Pi
                                                                                                                                                                                                                                              • Part 4: Adding Listening Capability
                                                                                                                                                                                                                                                • Spy on Anyone's Smartphone
                                                                                                                                                                                                                                                  • Listen to Anyone's Conversation
                                                                                                                                                                                                                                                    • How to Catch a Terrorist
                                                                                                                                                                                                                                                      • How to Hack Web cams
                                                                                                                                                                                                                                                      • WebApp Hacking
                                                                                                                                                                                                                                                        • Part 5:Enumerating Usernames & Passwords
                                                                                                                                                                                                                                                          • Part 6: Brute Force WP using XMLRPC
                                                                                                                                                                                                                                                            • Part 7: Creating a Backdoor with weevely
                                                                                                                                                                                                                                                              • Part 8: Cloning a Web Site
                                                                                                                                                                                                                                                                • Part 9: XSS
                                                                                                                                                                                                                                                                  • Part 10: Directory or Path Traversal
                                                                                                                                                                                                                                                                    • Part 11: Local File Inclusion (LFI)
                                                                                                                                                                                                                                                                      • Part 12: CSRF
                                                                                                                                                                                                                                                                        • Part 13, Comprehensive Recon with TiDOS
                                                                                                                                                                                                                                                                          • Part 14: OS Command Injection
                                                                                                                                                                                                                                                                            • Part 15: Fingerprinting with whatweb
                                                                                                                                                                                                                                                                              • Finding Hidden Directories with dirb
                                                                                                                                                                                                                                                                                • Web Technologies, Part 1
                                                                                                                                                                                                                                                                                  • Overview and Strategy for Beginners
                                                                                                                                                                                                                                                                                    • Spidering a Website with Scarab
                                                                                                                                                                                                                                                                                      • Finding Vulnerable WordPress Sites
                                                                                                                                                                                                                                                                                        • Finding Vulnerabilities in WordPress
                                                                                                                                                                                                                                                                                          • Finding Web Vulnerabilities: Wikto
                                                                                                                                                                                                                                                                                            • Hacking Form Authentication with Burp Su
                                                                                                                                                                                                                                                                                              • Getting Started with OWASP-ZAP
                                                                                                                                                                                                                                                                                              • Network Forensics
                                                                                                                                                                                                                                                                                                • Wireshark Basics
                                                                                                                                                                                                                                                                                                  • Part 1: Analyzing an Intrusion
                                                                                                                                                                                                                                                                                                    • Part 2: Analyzing a SCADA Attack
                                                                                                                                                                                                                                                                                                      • Part 3: Packet Analysis EternalBlue
                                                                                                                                                                                                                                                                                                      • Networks Basics for Hackers
                                                                                                                                                                                                                                                                                                        • Digital Forensics
                                                                                                                                                                                                                                                                                                          • Network Forensics
                                                                                                                                                                                                                                                                                                            • Recovery of Deleted Files
                                                                                                                                                                                                                                                                                                              • Part 1, Capturing the Image
                                                                                                                                                                                                                                                                                                                • Part 2, Live Memory Acquisition
                                                                                                                                                                                                                                                                                                                  • Part 3, Recovering Deleted Files
                                                                                                                                                                                                                                                                                                                    • Part 4, Finding key Evidence
                                                                                                                                                                                                                                                                                                                      • Part 5, Analyzing the Registry
                                                                                                                                                                                                                                                                                                                        • Part 6: Pre-Fetch Files
                                                                                                                                                                                                                                                                                                                          • Part 7: Browser Forensics
                                                                                                                                                                                                                                                                                                                            • Part 8: Live Analysis with Sysinternals
                                                                                                                                                                                                                                                                                                                              • Part 9: Extracting EXIF from Graphics
                                                                                                                                                                                                                                                                                                                              • Automobile Hacking
                                                                                                                                                                                                                                                                                                                                • Hacking the Mitsubishi Outlander
                                                                                                                                                                                                                                                                                                                                  • Part 1, The CAN Protocol
                                                                                                                                                                                                                                                                                                                                    • Part 2, can-utils for Linux
                                                                                                                                                                                                                                                                                                                                      • Part 3: Car Hacking with Metasploit
                                                                                                                                                                                                                                                                                                                                        • Part 4: Hacking the Key Fob
                                                                                                                                                                                                                                                                                                                                          • Part 5: Hacking the Remote Alarm
                                                                                                                                                                                                                                                                                                                                            • Part 6: Installing the ICS Simulator
                                                                                                                                                                                                                                                                                                                                            • Confidantes
                                                                                                                                                                                                                                                                                                                                              • Evading AV
                                                                                                                                                                                                                                                                                                                                                • Evading AV with shellter
                                                                                                                                                                                                                                                                                                                                                  • Evading AV with OWASP-ZSC
                                                                                                                                                                                                                                                                                                                                                    • Anatomy of ClamAV
                                                                                                                                                                                                                                                                                                                                                      • Evading AV with Veil-Evasion
                                                                                                                                                                                                                                                                                                                                                      • DataBase Hacking
                                                                                                                                                                                                                                                                                                                                                        • Part 1: Getting Started
                                                                                                                                                                                                                                                                                                                                                          • Part 2: Basics of SQL Injection
                                                                                                                                                                                                                                                                                                                                                            • Part 3, Using sqlmap against MySQL
                                                                                                                                                                                                                                                                                                                                                              • Part 4, Extracting Data with sqlmap
                                                                                                                                                                                                                                                                                                                                                              • Password Cracking
                                                                                                                                                                                                                                                                                                                                                                • Scraping Potential Passwords with CeWL
                                                                                                                                                                                                                                                                                                                                                                  • Password Cracking Strategy
                                                                                                                                                                                                                                                                                                                                                                    • Online Password Cracking
                                                                                                                                                                                                                                                                                                                                                                      • Online Password Cracking with Hydra
                                                                                                                                                                                                                                                                                                                                                                        • Cracking Passwords with hashcat
                                                                                                                                                                                                                                                                                                                                                                          • Creating a Custom Wordlist with Crunch
                                                                                                                                                                                                                                                                                                                                                                            • Cracking Passwords with hashcat
                                                                                                                                                                                                                                                                                                                                                                            • Welcome
                                                                                                                                                                                                                                                                                                                                                                              • About
                                                                                                                                                                                                                                                                                                                                                                                • Contact
                                                                                                                                                                                                                                                                                                                                                                                • HoneyPot
                                                                                                                                                                                                                                                                                                                                                                                  • Dionaea Part 1
                                                                                                                                                                                                                                                                                                                                                                                    • Dionaea Part 2
                                                                                                                                                                                                                                                                                                                                                                                    • PowerSploit
                                                                                                                                                                                                                                                                                                                                                                                      • Reconnaissance
                                                                                                                                                                                                                                                                                                                                                                                        • Operating System Fingerprinting with p0F
                                                                                                                                                                                                                                                                                                                                                                                          • Recon with unicornscan
                                                                                                                                                                                                                                                                                                                                                                                            • How to Use Maltego, Part 1
                                                                                                                                                                                                                                                                                                                                                                                              • Maltego, Part 2: Recon on a Person
                                                                                                                                                                                                                                                                                                                                                                                                • Google Hacking
                                                                                                                                                                                                                                                                                                                                                                                                  • Email Scraping and Maltego
                                                                                                                                                                                                                                                                                                                                                                                                    • Finding Website Vulnerabilities with Nik
                                                                                                                                                                                                                                                                                                                                                                                                      • Abusing DNS for Recon
                                                                                                                                                                                                                                                                                                                                                                                                        • nmap for recon and DoS
                                                                                                                                                                                                                                                                                                                                                                                                          • hping for Reconnaissance
                                                                                                                                                                                                                                                                                                                                                                                                          • Hacking Bluetooth
                                                                                                                                                                                                                                                                                                                                                                                                            • Part 1, Getting Started
                                                                                                                                                                                                                                                                                                                                                                                                              • Part 2, Blutooth Recon
                                                                                                                                                                                                                                                                                                                                                                                                                • Part 3, The Bluebourne Exploit
                                                                                                                                                                                                                                                                                                                                                                                                                  • Using MultiBlue to Hack a Mobile Device
                                                                                                                                                                                                                                                                                                                                                                                                                  • Working with Exploits
                                                                                                                                                                                                                                                                                                                                                                                                                    • Hacking Facebook
                                                                                                                                                                                                                                                                                                                                                                                                                      • Getting Facebook Credentials without Hac
                                                                                                                                                                                                                                                                                                                                                                                                                        • Facebook Password Extractor
                                                                                                                                                                                                                                                                                                                                                                                                                        • Hacking Fundamentals
                                                                                                                                                                                                                                                                                                                                                                                                                          • Cryptography Basics
                                                                                                                                                                                                                                                                                                                                                                                                                            • Netcat, the All-Powerful
                                                                                                                                                                                                                                                                                                                                                                                                                              • The Hacker Methodology
                                                                                                                                                                                                                                                                                                                                                                                                                                • Basics of XORing
                                                                                                                                                                                                                                                                                                                                                                                                                                  • Basics of Hexadecimal
                                                                                                                                                                                                                                                                                                                                                                                                                                    • Introduction to Regular Expressions
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Networking Basics, Part 1
                                                                                                                                                                                                                                                                                                                                                                                                                                        • Networking Basics, Part 2
                                                                                                                                                                                                                                                                                                                                                                                                                                        • Exploit Development
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 1, Anatomy of Buffer Overflow
                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 2, Writing a Simple Buffer Overflow
                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 3, Fuzzing with Spike
                                                                                                                                                                                                                                                                                                                                                                                                                                              • Reverse Engineering Malware
                                                                                                                                                                                                                                                                                                                                                                                                                                                • Anatomy of Ransomware
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Part 1, Reverse Engineering Malware
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 2, Assembler Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 3, Intro to IDA Pro
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 4, Windows Internals
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 5, OllyDbg Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Why Study Reverse Engineering
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Vulnerability Scanning
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Vulnerability Scanning with Nexpose
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Snort
                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Snort, Part1: Installing Snort
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Snort, Part 2: Configuration
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Snort, Part 3: Sending Alerts to MySQL
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Snort, Part 4: Snort Rules
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Snort, Part 5: Testing Known Exploits
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Hack Like OTW
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Anti-Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • How Elliot Covered his Tracks: shred
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • BASH Shell Anti-Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Removing Evidence with BleachBit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Raspberry Pi
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Information Security Concepts
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Android Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Setting Up an Android Hacking Lab
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Android Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Android Hacking: BlueBoune Exploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Embedding a Backdoor
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Shodan
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Scripting for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Powershell for Hackers,Part 1
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Perl, Part 1:Intro
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Perl, Part 2: Port Scanner
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • BASH Scripting
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Python 1: Getting Started
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Python 2: Building a Banner Grabber
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Python 3: Building a FTP Password Crack
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • How to Become a Hacker
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • What it Takes to Become a Hacker
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Why Hacking is the Most Valuable Skills
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Essential Skills of a Master Hacker
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • MiTM
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Hacking DNS to Re-Direct on your LAN
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • MitM with Ettercap
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • MitM with arpspoof
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Viewing Graphic Files with driftnet
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Advertising with Hackers-Arise
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • OTW Recommended Products
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Hackers Needed
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • password-lists
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Blog
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Cyber Law
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Software Defined Radio for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Python Basics for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • New Item
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • New Item
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • SDR for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • MEMBERS ONLY
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Subscribers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • GETTING STARTED
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • SCADA Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Online Store
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Online Courses
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Web App Hacking Course
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Security+
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Linux Firewalls
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Advanced Linux
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • OSINT Course
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Network Basics for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Scripting for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Advanced SCADA Hacking and Security
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Automobile Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Linux Basics for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • CISSP Prep
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Introduction to Snort (IDS)
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Cyber Warrior Training
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Metasploit Basics for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • CWA Prep Course
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • SCADA/ICS Security
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Digital Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Wi-Fi Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Mobile Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Reverse Engineering Malware
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Network Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Training Schedule
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Course Registration
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • OSINT
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • MEMBERS
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • OTW's New Book
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • OTW's Book Shipping US
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • OTW's Book Shipping Outside US
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Subscriber PRO
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Metasploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 1, Getting Started with Metasploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 2, Metasploit Modules
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 3, Metasploit Payloads
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 4, Connecting postgresql
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 5: Recon with Metasploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 6: Armitage
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Part 7, Adding a Module
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Part 8, Exploitation with EternalBlue
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 9, msfvenom for Custom Payloads
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 10: Pivoting to Control the Network
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 11: Exploiting MS Office Fileformat
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 12: Creating RC Scripts
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 13: Exploiting Android Devices
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 14: Updating the msfconsole
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Part 15: Post-Exploitation Fun!
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Part 16: SCADA Hacking with Metasploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 17: Automobile Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 18: AutoSploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 19: Web Delivery for Windows
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 20: Creating a Fake SMB Server
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 21: mimikatz
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 22: Owning with Physical Access
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Part 23: Remote Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Part 24: Evasion Modules
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 25: Web Delivery Linux/Unix
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Car Hacking with Metasploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Create a Fake SMB Server with Metasploi
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • SCADA/ICS Metasploit Modules
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Metasploit Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • msfvenom
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Metasploit's autopwn
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Using Metasploit's psexec
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Metasploit Web Delivery for Windows
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • How to Make the Meterpreter Persistent
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Ultimate List of Meterpreter scripts
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Ultimate List of Meterpreter Command
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Web Delivery for Linux/UNIX
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Mimikatz
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Metasploit Resource Scripts
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Metsploit Keywords and Commands
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Praise for Linux Basics for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Who Is Master OTW?
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Mr. Robot
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • How Elliot Covered his Tracks
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Mr. Robot Hacks: Hiding Data in Audio Fi
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • How Elliot Traces the Dark Army
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • How f/society Hacked Smarthome
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • How Elliot Hacked the Prison
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • How Angela Stole Boss's Password
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • How Elliot Made his Hacks Untraceable
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • How f/society Ransomed Evil Corp
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • How Elliot Created a Hacking Raspberry P
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Hackers For Hire
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Hackers for Hire Request
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Confessions of a Professional Hacker
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • How Russian Hackers Compromised Election
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • How Hackers Obtained the Panama Papers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Linux for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Why Every Hacker Should Know and Use Lin
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Why Every Hacker Should Know and Use Lin
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 1, Getting Started
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 2, Finding Stuff
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 3, Creating, Removing and Renaming
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 4, Networking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 5, Adding and Removing Software
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 6, Managing Permssions
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Part 7, BASH Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Part 8, Managing the User Environment
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 9, Text manipulation
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 10, Loadable Kernel Modules
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Digital Forensic Investigator for Hire
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Digital Forensic Investigator Request
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Training Packages
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Hack Like the NSA
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • The Quantum Insert
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • EXTRABACON of Cisco Firewalls
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • EternalBlue
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Shadow Brokers Exploits
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Wireless Hacks
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Wireless Hacking Strategies
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Getting Started with aircrack-ng
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Cracking the WPS PIN with Reaver
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Getting Started with aircrack-ng
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Cracking WPA2-PSK with aircrack-ng
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Cracking WPS on Wifi
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Evading Wireless Authentication
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Continuous DoSing a Wireless AP
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Wireless Hacking with Wifiphisher
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Wi-Fi Hacking without Cracking Passwords
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Hack to Spy
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 1: Building a Raspberry Spy Pi
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 3: Building a Raspberry Spy Pi
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 2, Building a Raspberry Spy Pi
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 4: Adding Listening Capability
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Spy on Anyone's Smartphone
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Listen to Anyone's Conversation
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • How to Catch a Terrorist
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • How to Hack Web cams
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • WebApp Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 5:Enumerating Usernames & Passwords
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 6: Brute Force WP using XMLRPC
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 7: Creating a Backdoor with weevely
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 8: Cloning a Web Site
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Part 9: XSS
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Part 10: Directory or Path Traversal
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 11: Local File Inclusion (LFI)
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 12: CSRF
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 13, Comprehensive Recon with TiDOS
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 14: OS Command Injection
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 15: Fingerprinting with whatweb
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Finding Hidden Directories with dirb
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Web Technologies, Part 1
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Overview and Strategy for Beginners
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Spidering a Website with Scarab
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Finding Vulnerable WordPress Sites
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Finding Vulnerabilities in WordPress
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Finding Web Vulnerabilities: Wikto
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Hacking Form Authentication with Burp Su
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Getting Started with OWASP-ZAP
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Network Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Wireshark Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Part 1: Analyzing an Intrusion
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 2: Analyzing a SCADA Attack
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 3: Packet Analysis EternalBlue
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Networks Basics for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Digital Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Network Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Recovery of Deleted Files
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 1, Capturing the Image
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Part 2, Live Memory Acquisition
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Part 3, Recovering Deleted Files
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 4, Finding key Evidence
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 5, Analyzing the Registry
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 6: Pre-Fetch Files
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 7: Browser Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 8: Live Analysis with Sysinternals
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 9: Extracting EXIF from Graphics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Automobile Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Hacking the Mitsubishi Outlander
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Part 1, The CAN Protocol
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 2, can-utils for Linux
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 3: Car Hacking with Metasploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 4: Hacking the Key Fob
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 5: Hacking the Remote Alarm
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 6: Installing the ICS Simulator
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Confidantes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Evading AV
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Evading AV with shellter
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Evading AV with OWASP-ZSC
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Anatomy of ClamAV
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Evading AV with Veil-Evasion
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • DataBase Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 1: Getting Started
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 2: Basics of SQL Injection
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 3, Using sqlmap against MySQL
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 4, Extracting Data with sqlmap
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Password Cracking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Scraping Potential Passwords with CeWL
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Password Cracking Strategy
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Online Password Cracking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Online Password Cracking with Hydra
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Cracking Passwords with hashcat
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Creating a Custom Wordlist with Crunch
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Cracking Passwords with hashcat
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Welcome
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • About
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Contact
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • HoneyPot
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Dionaea Part 1
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Dionaea Part 2
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • PowerSploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Reconnaissance
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Operating System Fingerprinting with p0F
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Recon with unicornscan
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • How to Use Maltego, Part 1
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Maltego, Part 2: Recon on a Person
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Google Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Email Scraping and Maltego
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Finding Website Vulnerabilities with Nik
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Abusing DNS for Recon
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • nmap for recon and DoS
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • hping for Reconnaissance
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Hacking Bluetooth
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 1, Getting Started
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 2, Blutooth Recon
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Part 3, The Bluebourne Exploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Using MultiBlue to Hack a Mobile Device
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Working with Exploits
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Hacking Facebook
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Getting Facebook Credentials without Hac
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Facebook Password Extractor
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Hacking Fundamentals
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Cryptography Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Netcat, the All-Powerful
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • The Hacker Methodology
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Basics of XORing
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Basics of Hexadecimal
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Introduction to Regular Expressions
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Networking Basics, Part 1
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Networking Basics, Part 2
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Exploit Development
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 1, Anatomy of Buffer Overflow
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Part 2, Writing a Simple Buffer Overflow
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Part 3, Fuzzing with Spike
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Reverse Engineering Malware
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Anatomy of Ransomware
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Part 1, Reverse Engineering Malware
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Part 2, Assembler Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Part 3, Intro to IDA Pro
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Part 4, Windows Internals
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Part 5, OllyDbg Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Why Study Reverse Engineering
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Vulnerability Scanning
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Vulnerability Scanning with Nexpose
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Snort
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Snort, Part1: Installing Snort
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Snort, Part 2: Configuration
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Snort, Part 3: Sending Alerts to MySQL
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Snort, Part 4: Snort Rules
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Snort, Part 5: Testing Known Exploits
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Hack Like OTW
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Anti-Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • How Elliot Covered his Tracks: shred
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • BASH Shell Anti-Forensics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Removing Evidence with BleachBit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Raspberry Pi
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Information Security Concepts
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Android Hacking
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Setting Up an Android Hacking Lab
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Android Basics
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Android Hacking: BlueBoune Exploit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Embedding a Backdoor
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Shodan
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Scripting for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Powershell for Hackers,Part 1
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Perl, Part 1:Intro
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Perl, Part 2: Port Scanner
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • BASH Scripting
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Python 1: Getting Started
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Python 2: Building a Banner Grabber
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Python 3: Building a FTP Password Crack
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • How to Become a Hacker
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • What it Takes to Become a Hacker
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Why Hacking is the Most Valuable Skills
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Essential Skills of a Master Hacker
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • MiTM
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Hacking DNS to Re-Direct on your LAN
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • MitM with Ettercap
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • MitM with arpspoof
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Viewing Graphic Files with driftnet
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Advertising with Hackers-Arise
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • OTW Recommended Products
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Hackers Needed
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • password-lists
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Blog
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Cyber Law
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Software Defined Radio for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Python Basics for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • New Item
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • New Item
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • SDR for Hackers
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • MEMBERS ONLY
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  pentester.png