Search
3 min read
Social Engineering Attacks: Creating a Fake SMS Message
Welcome back, my aspiring cyber warriors! Social engineering is a key feature of some of the biggest hacks in history! Many novice...
50,167 views
5 min read
Software Defined Radio, Part 6: Building a Cellphone IMSI Catcher (Stingray)
Welcome back, my aspiring RF hackers! Among the multitude of radio signals swirling around us everyday are the mobile telephone signals...
64,276 views
4 min read
Mr Robot Hacks: How Elliot Used a Raspberry Pi to Hack Steel Mountain
Welcome back, my Mr Robot afacionados! A number of you have written me telling me how much you enjoy the Mr. Robot series on USA Network...
12,050 views
4 min read
Ukraine/Russia War: Mobile Phones and Networks Weaponized to Target on Both Sides
Welcome back, my cyberwarriors! In our digital age, we are blessed with many digital wonders. Among these is the mobile phone. The mobile...
4,059 views
5 min read
Mr. Robot Hacks: How f/society Ransomed Evil Corp for $5.9 million
Welcome back, my greenhorn cyberwarriors! For those of you who are new to Mr. Robot, Elliot Alderson is an asocial IT security engineer...
9,517 views
1 min read
SCADA Hacking: "Mysterious" Explosions and Fires at Russian Industrial Sites
Welcome back, my cyberwarrior heroes! As I mentioned in my second interview with David Bombal, the second round of the Ukraine/Russia...
3,437 views
5 min read
Essentials Skills of a Professional Hacker
Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good, professional hacker?" As the...
62,247 views
4 min read
SCADA Hacking and Security: This is How the World Ends!
As the cyberwar to save Ukraine enters Round 2, SCADA/ICS is likely to become the target of both sides. In this article, I simply try to...
12,931 views
2 min read
Finding the Location of the Russian Oligarch's Mega Yachts. U.S. Now Offering Up to $5M Reward!
Welcome back, my cyberwarriors! We all stand in solidarity against the naked aggression of the Putin regime against Ukraine. The...
8,456 views
3 min read
Clogging, Saturating and DoSing Russia's Internet with zmap
Welcome back, my cyberwarriors! Stopping Russia's naked and brutal aggression is paramount. If we can't join the front lines to defend...
10,948 views
1 min read
What is a White Hat Hacker?
Welcome back, my cyberwarriors! Hackers-Arise is a white-hat hacker training site. This means that we use our skills for good. Obviously,...
3,694 views
2 min read
The App That May Save Ukraine!
Welcome back, my cyberwarriors! I truly appreciate all of the work you have done to support the brave people of Ukraine. You are all...
2,709 views
4 min read
Open Source Intelligence (OSINT): Using Google Earth Pro Satellite Imagery for Investigations
Welcome back, my aspiring investigators! Open Source Intelligence (OSINT) is a very broad field with a multitude of applications...
5,473 views
4 min read
Network Forensics, Part 5: Wi-Fi (802.11) Forensics
Welcome back my aspiring DFIR analysts! In recent recent years, Wi-Fi has become ubiquitous throughout our home and working environments....
3,678 views
4 min read
Python Scripting for Hackers, Part 1: Getting Started
Welcome back, my hacker novitiates! I began this series on scripting a while back to teach all aspiring hackers how to write some basic...
60,371 views
5 min read
SCADA Hacking: Anatomy of a SCADA Malware, BlackEnergy 3 Attack on the Ukraine Grid
Welcome back to this series on SCADA Hacking and Security! SCADA/ICS security is critical for SO many reasons. Among the most important...
11,714 views
2 min read
Evading Antivirus: How Antivirus Works
Welcome back my aspiring cyberwarriors! Before beginning on the journey to learn to how to evade AV, it is critical to first understand...
3,667 views
5 min read
How To Study and Pass the Certified Whitehat Hacker Associate (CWA) Exam
Many of you have been asking me, "How can I study for the CWA certification exam, and what material is covered on the exam?" Here is the ...
15,721 views
2 min read
Software Defined Radio (SDR) for Hackers: Radio Frequency Attack Methods
Welcome back, my aspiring radio hackers! With the advent of inexpensive radio devices such as the RTL-SDR, HackRF, LimeSDR and bladeRF,...
10,810 views
3 min read
Reverse Engineering Malware: Reversing and Disassembly Tools
Welcome back, my aspiring malware analysts! In previous tutorials here, I have demonstrated the power of such reversing and disassembly...
4,491 views