4 minDDoS Attacks: Flooding Russian Sites with Fragmented UDP PacketsWelcome back, my aspiring cyberwarriors! At the beginning of the cyberwar between Russia and Ukraine, Hackers-Arise, the IT Army of...
2 minDatabase Hacking: Common SQL Injection CommandsWelcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...
2 minRadio Basics for Hackers, Part 3: Sampling Welcome back my aspiring cyber warriors! Sampling is the process of converting a continuous signal into a discrete signal. In the context...
3 minSCADA Hacking: Sending Random Inputs into the Russian Industrial SystemsWelcome back, my aspiring cyberwarriors! SCADA hacking and security is different from traditional hacking in numerous ways. For a review...