Search


SCADA Hacking: Anatomy of a SCADA Malware, BlackEnergy 3 Attack on the Ukraine Grid
Welcome back to this series on SCADA Hacking and Security! SCADA/ICS security is critical for SO many reasons. Among the most important...
5 min read
12,136 views


Evading Antivirus: How Antivirus Works
Welcome back my aspiring cyberwarriors! Before beginning on the journey to learn to how to evade AV, it is critical to first understand...
2 min read
3,844 views


Certified Cloud Security Professional (CCSP) Earn the Most Respected Cloud Security Certification!
Welcome back, my aspiring cyberwarrior! The Certified Cloud Security Professional (CCSP) from ISC2 is the world's most respected and...
1 min read
1,175 views


Linux Basics for Hackers, Part 12: The Linux Philosophy
Welcome back my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have...
4 min read
1,489 views


How To Study and Pass the Certified Whitehat Hacker Associate (CWA) Exam
Many of you have been asking me, "How can I study for the CWA certification exam, and what material is covered on the exam?" Here is the ...
5 min read
15,835 views


Linux Firewalls: Uncomplicated Firewall (ufw)
Welcome back, my aspiring security engineers! There are a multitude of reasons for using Linux but one of the most overlooked is its...
4 min read
7,798 views


Web App Hacking: Fuzzing Web Apps to Find Bugs with BurpSuite
Welcome back, my aspiring cyberwarriors! In previous tutorials here on Hackers-Arise, we have used the BurpSuite for a number of purposes...
3 min read
7,691 views


Linux Basics for Hackers, Part 11: Linux Firewalls (iptables)
Welcome back, my aspiring cyber warriors! A firewall is one of the key security measures necessary for a secure network. Linux has a...
4 min read
15,916 views


Zmap for Scanning the Internet: Scan the Entire Internet in 45 minutes
Welcome back my aspiring cyber warriors! Most of you are aware of the power of nmap and nmap scripts for reconnaissance on a target and...
4 min read
23,350 views


Android Hacking, Part 4: A Compendium of Android Remote Administration Trojans (RATS)
Welcome back, my aspiring cyberwarriors! In light of the recent revelations regarding Israel's NSO group and their cellphone malware...
3 min read
19,329 views


Network Basics for Hackers: Domain Name Service (DNS) and BIND. How it Works and How it Breaks
Welcome back, my aspiring cyber warriors! The Domain Name System or DNS is one of those network protocols that makes the world go round....
11 min read
32,702 views


Open Source Intelligence (OSINT): Facial Recognition for Investigations
Welcome back, my aspiring OSINT investigators! Very often in an investigation, we have a picture and we are trying to identify the...
3 min read
20,933 views


Reverse Engineering Malware, Part 5: OllyDbg Basics
In this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and...
5 min read
30,366 views


Metasploit Basics, Part 5: Using Metasploit for Reconnaissance (nmap, EternalBlue, SCADA, and MS SQL
Welcome back, my rookie hackers! As you know, reconnaissance is a crucial part of the hacker/pentester's job. Without good...
4 min read
16,913 views


Open Source Intelligence (OSINT): Reverse Image Searches for Investigations
Welcome back, my aspiring OSINT experts! There is SO much data on the Internet that just about anything can be found, if you know how and...
3 min read
12,999 views


Password Cracking: Creating a Custom Wordlist with crunch
Welcome back, my aspiring cyberwarriors! In this series on password cracking, I have been attempting to develop your skills in the...
4 min read
30,346 views


Reverse Engineering Malware, Ghidra Part 3: Analyzing the WannaCry Ransomware
Welcome back, my aspiring cyber warriors! Reverse engineering is one of the most highly sought and most valuable cybersecurity/infosec...
4 min read
7,819 views


Software Defined Radio (SDR) for Hackers, Part 4: Intercepting International Space Station Signals
Welcome back, my aspiring RF hackers! In this series, we are exploring how we can use a simple and inexpensive rtl-sdr dongle, in...
3 min read
5,304 views


SCADA Hacking: Developing Zero-Day SCADA Exploits
As white-hat hackers, ultimately we want to be able to develop exploits for SCADA/ICS systems. In this way, we can find vulnerabilities...
5 min read
6,672 views


Software Defined Radio(SDR) for Hackers, Part 4: Intercepting and Decoding Confidential Pager Data
Welcome back, my aspiring RF hackers! Although few people still use pagers, they were once a common communication device used by many...
3 min read
4,550 views