Search


Why YOU Should Study Software Defined Radio (Signals Intelligence) for Hackers!
Hacking radio signals (RF) IS the leading edge of cybersecurity ! So many applications in our modern life use radio frequency elements...
2 min read
15,747 views


Command & Control Series Part I (Installing your own C2 Server on Kali Linux)
This series of posts is designed to guide you through setting up your own Command and Control (C2) server, specifically using the Havoc...
4 min read
17,232 views


The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will detail how an individual or small group of cyberwarriors can impact global...
5 min read
4,280 views


Hackers-Arise Now Offers Key Cybersecurity Services!
All of you know about the excellent cybersecurity training Hackers-Arise offers but now we are expanding to offer your business the...
1 min read
74 views


CyberWar: The Breach at Avtodor – Inside a Russian Government Infrastructure Network, Part 1
Welcome back, my aspiring cyberwarriors! The conflict between Russia and Ukraine should be a warning bell to all of you of the importance...
5 min read
188 views


NymVPN Setup & Testing: A Hands-On Walkthrough
Welcome back, aspiring cyberwarriors! In recent years, VPN's have been marketed as a sure-fire way to keep your safe from...
3 min read
135 views


Database Hacking: SQLite Essentials and Attack Strategies
Welcome back, aspiring cyberwarriors! SQLite is one of the most commonly used database engines, embedded in countless applications,...
5 min read
131 views


The Default Passwords of Nearly Every IP Camera
Welcome back, my aspiring camera hackers! As you know, at the beginning of the Russian invasion of Ukraine, the Ukrainian Army asked for...
1 min read
19,259 views


SDR (Signals Intelligence) for Hackers: Soon, all Cellphones will be Connected by Satellites
Welcome back, my aspiring cyberwarriors! In earlier posts here, we have described hacking satellite communication systems. While many...
6 min read
547 views


Cyber Threat Intelligence (CTI) and Network Defenses: Getting Started with CrowdSec
Welcome back, aspiring cyberwarriors! In the ever-evolving landscape of cybersecurity, new tools and approaches are constantly emerging...
5 min read
511 views


The Medusa Ransomware Threat: Anatomy of a Cybercrime Operation
Welcome back, aspiring cyberwarriors! In Greek mythology, Medusa was once a beautiful woman until Athena’s curse transformed her into a...
8 min read
984 views


Vulnerability Scanning: Automatic Search For Known CVEs With CVEScannerV2
Welcome back, aspiring cyberwarriors! During reconnaissance, our goal is to identify vulnerable services within our target’s network. To...
3 min read
1,309 views


Open Source Intelligence (OSINT): Mosint, The Versatile Email Address Search Tool
Welcome back, aspiring cyberwarriors and OSINT investigators! In our digital age, email addresses have become the keys to our online...
3 min read
2,188 views


Cyberwar Mission #3: Using QRCodes in Phishing and Social Media Attacks
Welcome back, aspiring cyberwarriors. In this article, one of our fighters in Ukraine (Sierra) demonstrates how they use social...
8 min read
1,596 views


It's Time to Elevate Your Cybersecurity Game! Earn the Crown Jewel of Cybersecurity Certifications!
The CISSP is widely considered to be the premier cybersecurity certifications. The average salary in the US is almost $150,000 and I'll...
1 min read
175 views


VPN Hacking: How VPN's Work and How They Break Our Security
Welcome back, my aspiring cyberwarriors! In recent posts, I have emphasized the risks inherent in VPN's. Virtual Private Networks or...
34 min read
1,656 views


Malware Analysis: Process Injection in the REMCOS RAT
Process injection is one of those stealthy techniques malware loves to use to stay under the radar. By injecting malicious code into...
6 min read
734 views


OSINT: Tracking US Spy Planes Surveilling the Mexican Cartels
Welcome back, aspiring cyberwarriors! OSINT has applications in so many fields including pentesting, investigations, cybersecurity,...
3 min read
1,000 views


Introduction to the IoT/Embedded Linux: The OpenWRT Project
Welcome back, my aspiring cyberwarriors! As you know, the various mobile carriers around the world sell a device they often refer to as a...
3 min read
4,706 views


The Art and Science of Social Engineering in the Age of AI, February 11-13
Many novices to cybersecurity underestimate the importance of social engineering. More experienced hands understand that social...
1 min read
1,201 views