top of page
![](https://static.wixstatic.com/media/6a4a49_2a69f51cbb32483594fd834bf1aa4f27~mv2_d_1600_1200_s_2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6a4a49_2a69f51cbb32483594fd834bf1aa4f27~mv2_d_1600_1200_s_2.webp)
![Linux Basics for the Aspiring Hacker, Part 2 (Finding stuff)](https://static.wixstatic.com/media/6a4a49_2a69f51cbb32483594fd834bf1aa4f27~mv2_d_1600_1200_s_2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6a4a49_2a69f51cbb32483594fd834bf1aa4f27~mv2_d_1600_1200_s_2.webp)
4 min read
Linux Basics for the Aspiring Hacker, Part 2 (Finding stuff)
In many cases, the greatest hurdle to becoming a white hat hacker is proficiency with the command line (cli) Linux. This series is...
20,799 views
![The Cyber Most Wanted List](https://static.wixstatic.com/media/6a4a49_88f9aebcf6614d63a880b4fd5be07a6b~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/6a4a49_88f9aebcf6614d63a880b4fd5be07a6b~mv2.webp)
1 min read
The Cyber Most Wanted List
The FBI has posted a "Most Wanted Cyber Criminal" list. I hope you aren't on it. OTW
410 views
![](https://static.wixstatic.com/media/6a4a49_794d817ea56f4648b929245bc9cb8d32.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/6a4a49_794d817ea56f4648b929245bc9cb8d32.webp)
![Community Posts: Installing Kali in Virtual Box](https://static.wixstatic.com/media/6a4a49_794d817ea56f4648b929245bc9cb8d32.jpg/v1/fill/w_248,h_203,fp_0.50_0.50,q_90,enc_auto/6a4a49_794d817ea56f4648b929245bc9cb8d32.webp)
2 min read
Community Posts: Installing Kali in Virtual Box
We have our first community post on Hackers-Arise. G was gracious and generous enough to offer this short tutorial on installing Kali 2.0...
2,044 views
![](https://static.wixstatic.com/media/6a4a49_578211c536754190938ec70d8849b639~mv2.jpg/v1/fill/w_235,h_235,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/6a4a49_578211c536754190938ec70d8849b639~mv2.webp)
![Mr. Robot Hacks: How f/society Hacked of the SmartHome of The Evil Corp Exec](https://static.wixstatic.com/media/6a4a49_578211c536754190938ec70d8849b639~mv2.jpg/v1/fill/w_300,h_168,fp_0.50_0.50,q_90,enc_auto/6a4a49_578211c536754190938ec70d8849b639~mv2.webp)
4 min read
Mr. Robot Hacks: How f/society Hacked of the SmartHome of The Evil Corp Exec
Welcome back, Mr. Robot fans! In the first episode of season 2 of Mr. Robot (eps2.0_unm4sk-pt1.tc), the hackers of f/society took...
7,051 views
![SCADA Hacking: Monitoring SCADA Sites with Splunk](https://static.wixstatic.com/media/6a4a49_d9bc0aa1fea645ed9bfafec042ccd507~mv2.png/v1/fill/w_454,h_246,fp_0.50_0.50,q_95,enc_auto/6a4a49_d9bc0aa1fea645ed9bfafec042ccd507~mv2.webp)
3 min read
SCADA Hacking: Monitoring SCADA Sites with Splunk
SCADA sites are among the most vulnerable sites on the planet. These sites include industrial control systems, water treatment...
8,732 views
![](https://static.wixstatic.com/media/6a4a49_e4cf2400be964a01a91318d608d0e23b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6a4a49_e4cf2400be964a01a91318d608d0e23b~mv2.webp)
![SCADA Hacking: Finding and Enumerating SCADA sites with nmap and nmap scripts](https://static.wixstatic.com/media/6a4a49_e4cf2400be964a01a91318d608d0e23b~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6a4a49_e4cf2400be964a01a91318d608d0e23b~mv2.webp)
4 min read
SCADA Hacking: Finding and Enumerating SCADA sites with nmap and nmap scripts
Welcome back, my hacker novitiates! With this lab, we will conduct recon on a SCADA target using port scanning and nmap scripts. Up until...
13,763 views
![](https://static.wixstatic.com/media/6a4a49_7b79c087e53f47edafa7783aa8482aa8~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6a4a49_7b79c087e53f47edafa7783aa8482aa8~mv2.webp)
![SCADA Hacking: Finding SCADA Systems using Shodan](https://static.wixstatic.com/media/6a4a49_7b79c087e53f47edafa7783aa8482aa8~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6a4a49_7b79c087e53f47edafa7783aa8482aa8~mv2.webp)
5 min read
SCADA Hacking: Finding SCADA Systems using Shodan
Welcome back, my aspiring cyber warriors! Previously, I wrote a tutorial on using Shodan--the world's most dangerous search engine--to...
39,347 views
![Splunk for Security Monitoring, Part 2 (Splunk Processing Language Basics)](https://static.wixstatic.com/media/6a4a49_7d7903bc1218479f8a237f5a958866ed~mv2.png/v1/fill/w_381,h_132,fp_0.50_0.50,q_95,enc_auto/6a4a49_7d7903bc1218479f8a237f5a958866ed~mv2.webp)
4 min read
Splunk for Security Monitoring, Part 2 (Splunk Processing Language Basics)
Welcome back, my greenhorn hackers! In an earlier tutorial, I introduced you to Splunk for Security Monitoring. In this installment, we...
1,106 views
![](https://static.wixstatic.com/media/6a4a49_e7ad62bef9784345a5384e4b330d3e85~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6a4a49_e7ad62bef9784345a5384e4b330d3e85~mv2.webp)
![Using Shodan: The World's Most Dangerous Search Engine](https://static.wixstatic.com/media/6a4a49_e7ad62bef9784345a5384e4b330d3e85~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6a4a49_e7ad62bef9784345a5384e4b330d3e85~mv2.webp)
6 min read
Using Shodan: The World's Most Dangerous Search Engine
Welcome back, my aspiring cyber warriors! Nearly all of us have used a search engine such as Google or Bing to find material on the web....
50,186 views
![](https://static.wixstatic.com/media/6a4a49_736d0aa4f31e472eb39a5ce87b991fe5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6a4a49_736d0aa4f31e472eb39a5ce87b991fe5~mv2.webp)
![Covering your BASH Shell Tracks- Anti-Forensics](https://static.wixstatic.com/media/6a4a49_736d0aa4f31e472eb39a5ce87b991fe5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6a4a49_736d0aa4f31e472eb39a5ce87b991fe5~mv2.webp)
4 min read
Covering your BASH Shell Tracks- Anti-Forensics
Those of us who use the BASH shell regularly, love the fact that our history can be recovered simply by using the up and down arrows....
8,306 views
bottom of page