top of page
3 min read
Satellite Hacking: How Russia Knocked out the ViaSat System at the Outset of the Ukraine War
Welcome back, my aspirational cyberwarriors! Satellite hacking is the new frontier in cyber warfare! Satellites are an essential...
1,446 views
4 min read
Mr Robot Hacks: How Elliot and f/society Cloned the Key Card to Enter Steel Mountain
Welcome back, my Mr. Robot aficionados! As you know, Mr. Robot is my favorite TV show even though the show last aired nearly a decade...
1,071 views
6 min read
Physical Security: Lock Picking Basics for Hackers
Welcome back, my aspiring cyberwarriors! Physical perimeter security is just a important as your IT perimeter security. If the hacker can...
1,356 views
4 min read
Satellite Hacking: An Introduction to Satellites and Satellite Systems
Welcome back, my aspiring cyberwarriors! Satellites and the communication they engender have become a crucial element in our modern...
1,137 views
5 min read
Linux Firewalls: The Modern NFTable Firewall
Welcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
797 views
8 min read
Cyberwar Mission #3: Turning Your Adversary's Strength Against Them
Welcome back, aspiring cyberwarriors. In this article, one of our fighters in Ukraine (Sierra) demonstrates how they use social...
921 views
4 min read
Satellite Hacking: Hacking the Iridium Satellite System
Welcome back, my aspiring cyberwarriors! In our modern digital era, satellites have been used for numerous essential services, such as:...
1,339 views
3 min read
Hacker Legend Profiles: The Very Strange Case of Jeremy Hammond
Welcome back, my aspiring cyberwarriors! In this new series, I want to profile some the most important hackers in history. I'm hoping...
2,021 views
1 min read
Internet of Things (IoT) Hacking, October 8-10
The Internet of Things is growing exponentially! These devices represent an incredible cybersecurity threat to every organization and...
1,142 views
4 min read
Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets
Welcome back my cyberwarriors! One of the key tasks for those defending a country's, institution's, or corporation's assets is to...
1,991 views
2 min read
Cyberwar Mission 2: Reconnaissance in the Adversary's Docker Images
Welcome back, my aspiring cyberwarriors! In this series, Aircorridor, our man in Ukraine, takes you along on his real-life cyberwar...
872 views
6 min read
Python Basics: Programming Concepts
Welcome back, my aspiring cyberwarriors! To ascend to the status of cyberwarrior, you must have some basic programming capabilities. In...
1,558 views
3 min read
Ransomware: Build Your Own Ransomware, Part 1
Welcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital...
64,130 views
4 min read
SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Welcome back, my aspiring SCADA Hackers! The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS...
6,075 views
3 min read
Hacking the Cloud: Privilege Escalation in AWS
In the previous tutorial, we learned about cloud technologies and how to conduct data gathering. It's not always the case that the user...
856 views
2 min read
Satellite Hacking, Part 1: Getting Started
Welcome back, my aspiring radio satellite hackers! In this series of tutorials, we will be exploring hacking satellites from a multitude...
5,167 views
4 min read
Anti-Forensics: Using Veracrypt to Hide Your Most Sensitive Data
Welcome back, my aspiring cyberwarriors! In our industry, we often carry around some very valuable and sensitive data. This might include...
2,027 views
4 min read
DDoS Attacks: Flooding Russian Sites with Fragmented UDP Packets
Welcome back, my aspiring cyberwarriors! At the beginning of the cyberwar between Russia and Ukraine, Hackers-Arise, the IT Army of...
15,481 views
1 min read
50% off Subscriber and Subscriber Pro for those in non-industrialized Nations!
We recognize that incomes vary dramatically from one nation to the next and we don't want to exclude anyone from the best cybersecurity...
2,510 views
5 min read
SCADA Hacking: The Most Important SCADA/ICS Attacks in History
Welcome back, my aspiring SCADA/ICS cyberwarriors! SCADA and ICS are the most important cybersecurity issues in this decade. Although...
14,419 views
bottom of page