Search

3 min read
Clogging, Saturating and DoSing Russia's Internet with zmap
Welcome back, my cyberwarriors! Stopping Russia's naked and brutal aggression is paramount. If we can't join the front lines to defend...
10,963 views


1 min read
What is a White Hat Hacker?
Welcome back, my cyberwarriors! Hackers-Arise is a white-hat hacker training site. This means that we use our skills for good. Obviously,...
3,697 views


2 min read
The App That May Save Ukraine!
Welcome back, my cyberwarriors! I truly appreciate all of the work you have done to support the brave people of Ukraine. You are all...
2,718 views

4 min read
Open Source Intelligence (OSINT): Using Google Earth Pro Satellite Imagery for Investigations
Welcome back, my aspiring investigators! Open Source Intelligence (OSINT) is a very broad field with a multitude of applications...
5,538 views

4 min read
Network Forensics, Part 5: Wi-Fi (802.11) Forensics
Welcome back my aspiring DFIR analysts! In recent recent years, Wi-Fi has become ubiquitous throughout our home and working environments....
3,745 views


4 min read
Python Scripting for Hackers, Part 1: Getting Started
Welcome back, my hacker novitiates! I began this series on scripting a while back to teach all aspiring hackers how to write some basic...
60,472 views


5 min read
SCADA Hacking: Anatomy of a SCADA Malware, BlackEnergy 3 Attack on the Ukraine Grid
Welcome back to this series on SCADA Hacking and Security! SCADA/ICS security is critical for SO many reasons. Among the most important...
11,816 views


2 min read
Evading Antivirus: How Antivirus Works
Welcome back my aspiring cyberwarriors! Before beginning on the journey to learn to how to evade AV, it is critical to first understand...
3,712 views

5 min read
How To Study and Pass the Certified Whitehat Hacker Associate (CWA) Exam
Many of you have been asking me, "How can I study for the CWA certification exam, and what material is covered on the exam?" Here is the ...
15,754 views


2 min read
Software Defined Radio (SDR) for Hackers: Radio Frequency Attack Methods
Welcome back, my aspiring radio hackers! With the advent of inexpensive radio devices such as the RTL-SDR, HackRF, LimeSDR and bladeRF,...
10,900 views

3 min read
Reverse Engineering Malware: Reversing and Disassembly Tools
Welcome back, my aspiring malware analysts! In previous tutorials here, I have demonstrated the power of such reversing and disassembly...
4,528 views

4 min read
Password Cracking: Creating a Custom Wordlist with crunch
Welcome back, my aspiring cyberwarriors! In this series on password cracking, I have been attempting to develop your skills in the...
29,805 views

3 min read
Open Source Intelligence (OSINT), Spyse, Part 1: Finding Critical Information about a Domain
Welcome back, my open source intelligence (OSINT) investigators. In previous tutorials, we have examined numerous web services that...
6,518 views


5 min read
SCADA Hacking: Developing Zero-Day SCADA Exploits
As white-hat hackers, ultimately we want to be able to develop exploits for SCADA/ICS systems. In this way, we can find vulnerabilities...
6,621 views

5 min read
Reverse Engineering Malware, Part 1: Getting Started
In my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware....
31,161 views

3 min read
Software Defined Radio(SDR) for Hackers, Part 4: Intercepting and Decoding Confidential Pager Data
Welcome back, my aspiring RF hackers! Although few people still use pagers, they were once a common communication device used by many...
4,381 views


6 min read
Advice from a Professional Hacker: How Hackers Are Stealing Your Bitcoin and Other Cryptocurrencies
As the price of the cryptocurrencies has skyrocketed over the last few years, the theft of cryptocurrencies has soared right along with...
3,904 views


1 min read
Dreaming of Becoming a Cyber Warrior? You can join our team NOW by becoming a Hackers-Arise MEMBER!
You can become a Hackers-Arise MEMBER and receive the following; 1. "Linux Basics for Hackers v2" Video Companion ($99 value). 2. "CWA...
5,507 views


5 min read
Confessions of a Professional Hacker: How Russian Hackers Compromised the 2016 U.S. Presidential Ele
On July 13, 2018, the U.S. Justice Department handed down a 29-page indictment against 12 intelligence officers of the GRU, Russia's...
10,049 views


3 min read
SCADA Hacking: The Triton Malware Threat to SCADA/ICS Infrastructure
Welcome back, my aspiring SCADA cyber warriors! SCADA/ICS infrastructure is under continuous threat. These systems are crucial to any...
2,796 views