Search

3 min read
OSINT: Tracking US Spy Planes Surveilling the Mexican Cartels
Welcome back, aspiring cyberwarriors! OSINT has applications in so many fields including pentesting, investigations, cybersecurity,...
351 views

3 min read
Introduction to the IoT/Embedded Linux: The OpenWRT Project
Welcome back, my aspiring cyberwarriors! As you know, the various mobile carriers around the world sell a device they often refer to as a...
3,433 views

1 min read
The Art and Science of Social Engineering in the Age of AI, February 11-13
Many novices to cybersecurity underestimate the importance of social engineering. More experienced hands understand that social...
821 views


2 min read
Hackers-Arise Announces a New Training Program: The Path to Cyberwarrior!
In our continuing efforts to offer the best cybersecurity training on the planet, we are announcing new training program in 2025! Many of...
639 views

5 min read
The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will detail how an individual or small group of cyberwarriors can impact global...
1,865 views

5 min read
Password Spraying: An Often Effective Technique for Finding the Weakest Password in the Organization
Welcome back, my aspiring cyberwarriors! At the dawn of the Information Age, passwords emerged as the preeminent method for verifying...
327 views


6 min read
Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance
Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. Most novices focus on the handset, but in reality, there are...
6,472 views

4 min read
Wi-Fi Hacking, Part 11: The PMKID Attack
Welcome back, my aspiring cyber warriors! As you know, the key to hacking the WPA2-PSK is to capture the PSK (pre-shared key or...
102,276 views


3 min read
Strategies for Password Cracking in Cybersecurity
Welcome back, my aspiring cyberwarriors! People often ask, how do I crack passwords? The answer is that there are many ways and it is...
301 views

5 min read
Can Artificial Intelligence Be Used to Track Your Location?
Welcome back, my aspiring cyberwarriors! We all know that when pictures are taken, they contain Exif data. This EXIF data includes such...
502 views


1 min read
X's Artificial Intelligence, Grok, Got it Right!
Welcome back, my aspiring cyberwarriors! We are in the age of artificial intelligence! It will change our daily lives and work lives in...
235 views


3 min read
Is Hacking IP Cameras Just for Voyeurs or Does it Have Strategic and National Security Implications?
Welcome back, my aspiring cyberwarriors! Hacking IP cameras has always had a bit of voyeuristic appeal to the aspiring cyberwarrior. Many...
498 views


5 min read
Chinese State-Sponsored Hackers Inside the US Mobile Telecom System: Mobile Telecom Companies Vulnerable to SS7 Vulnerability
Welcome back, my rookie cyberwarriors! In recent weeks, a series of sophisticated cyber attacks has once again exposed critical...
527 views

1 min read
The Default Passwords of Nearly Every IP Camera
Welcome back, my aspiring camera hackers! As you know, at the beginning of the Russian invasion of Ukraine, the Ukrainian Army asked for...
18,319 views


5 min read
Mobile Telecom Networks for Hackers, Part 2
Welcome back, my aspiring cyberwarriors! In our modern digital era, mobile or cellular networks are the dominant mode of communication....
664 views


5 min read
Mobile Telecom Networks for Hackers, Part 1: Getting Started with Mobile Networks
Welcome back, my aspiring cyberwarriors! The world is rapidly becoming dominated by mobile cellular networks. Not long ago, telecom...
929 views


5 min read
Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
566 views


4 min read
Python Basics for Hackers, Part 4: Building a Simple Encryption Algorithm in Python
Welcome back, my aspiring cyberwarriors! Cryptography is one of foundational technologies of cybersecurity. It helps to keep our...
701 views

3 min read
Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
343 views

2 min read
SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
2,125 views