Search


Mr. Robot Hacks: How Elliot Hacked the FBI Cellphones
Welcome back, my Mr. Robot aficianados! In Season 2 of Mr. Robot, the FBI is on the trail of Elliot and f/society for the 5/9 hacks that...
3 min read
17,747 views


Open Source Intelligence (OSINT), Part 2: recon-ng to Identify the Same User on Multiple Platforms
Welcome back, my aspiring cyber warriors! The Internet is the largest data repository the world has ever known! Open Source Intelligence...
3 min read
23,972 views


Hacker Fundamentals: The Basics of XOR-ing
Welcome back, my aspiring cyber warriors! In a recent tutorial in my Metasploit series, I showed you how to use shikata_ga_nai to change...
4 min read
1,576 views


OSINT: Track the Crisis in Belarus with Ryanair Flight with RadarBox
Welcome back, my aspiring OSINT Investigators! Open Source Intelligence or OSINT offers some of the best ways to track real-time crises...
2 min read
3,212 views


Advice from a Professional Hacker: How Hackers Are Stealing Your Bitcoin and Other Cryptocurrencies
As the price of the cryptocurrencies has skyrocketed over the last few years, the theft of cryptocurrencies has soared right along with...
6 min read
3,922 views


Reconnaissance: Scanning and DoSing with Scapy
Welcome back, my aspiring cyberwarriors! We have explored a number of packet manipulation tools here on Hackers-Arise that can be very...
5 min read
2,985 views


Dreaming of Becoming a Cyber Warrior? You can join our team NOW by becoming a Hackers-Arise MEMBER!
You can become a Hackers-Arise MEMBER and receive the following; 1. "Linux Basics for Hackers v2" Video Companion ($99 value). 2. "CWA...
1 min read
5,507 views


Anatomy of Ransomware, Part 1: Chimera
Ransomware is a type of malware that has become almost epidemic in recent years. Consumers and businesses are being hit with this...
5 min read
14,044 views


Confessions of a Professional Hacker: How Russian Hackers Compromised the 2016 U.S. Presidential Ele
On July 13, 2018, the U.S. Justice Department handed down a 29-page indictment against 12 intelligence officers of the GRU, Russia's...
5 min read
10,172 views


Network Basics for Hackers, TCP/IP: Part 1
Welcome back, my aspiring cyberwarriors! Many of you who aspire to a career in cybersecurity have written me asking whether networking is...
5 min read
70,081 views


Open Source Intelligence (OSINT): Tracking Marine Traffic Around the World
Welcome back, my aspiring OSINT investigators! The Internet is the largest repository of data in the history of the world! Learn how and...
3 min read
6,087 views


OSINT: Harvesting Venmo Transactions
Welcome back, my aspiring OSINT cyber warriors! The Internet is the Largest Data Repository in the History of the World! Imagine how much...
3 min read
5,551 views


Network Basics for Hackers, TCP/IP: Part 2
Welcome back, my aspiring cyberwarriors! In the first part of this series, I introduced you to the basics of networking including IP...
5 min read
19,658 views


Web App Hacking: XXE Vulnerabilities and Attacks
Welcome back, my aspiring Web App cyberwarriors! Among the most important types of web app attacks is the XXE attack. This is the XML...
3 min read
3,132 views


Open Source Intelligence(OSINT), Part 4: Google Hacking to Find Unsecured Web Cams
Welcome back, my aspiring OSINT cyber warriors! The Internet is the largest and deepest repository of data in the history of the world....
2 min read
27,187 views


Network Basics for Hackers: Server Message Block (SMB) and Samba
Welcome back, my aspiring cyber warriors! This series is intended to provide the aspiring cyber warrior with all the information you need...
5 min read
19,031 views


Web App Hacking, Part 9: Cross Site Scripting (XSS)
Welcome back, my fledgling hackers! The next tutorial in this Web App Hacking series involves among the most critical vulnerabilities in...
5 min read
14,753 views


Web App Hacking: BurpSuite, Part 2: Bypass Weak Input Validation to Upload Malware to a Website
Welcome back, my aspiring cyber warriors! In general, we can say that the solution to many injection attacks in web applications is...
3 min read
4,433 views


Wi-Fi Hacking: Using wifite for Multiple Attack Strategies against Wi-Fi AP's
Welcome back, my aspiring cyberwarriors! Often, when doing a pentest, we have multiple Wi-Fi access points to test for security. Rather...
3 min read
86,594 views


OSINT: Scraping email Addresses with TheHarvester
Welcome back, my aspiring OSINT investigators! There are a multitude of tools to scrape email addresses from various locations, but...
3 min read
25,370 views