Search

3 min read
Introduction to the IoT/Embedded Linux: The OpenWRT Project
Welcome back, my aspiring cyberwarriors! As you know, the various mobile carriers around the world sell a device they often refer to as a...
4,431 views


2 min read
Hackers-Arise Announces a New Training Program: The Path to Cyberwarrior!
In our continuing efforts to offer the best cybersecurity training on the planet, we are announcing new training program in 2025! Many of...
774 views

5 min read
The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will detail how an individual or small group of cyberwarriors can impact global...
2,824 views


5 min read
Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
744 views

5 min read
What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?
Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital...
905 views


5 min read
Linux Firewalls: The Modern NFTable Firewall
Welcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
975 views

6 min read
Python Basics: Programming Concepts
Welcome back, my aspiring cyberwarriors! To ascend to the status of cyberwarrior, you must have some basic programming capabilities. In...
1,690 views

4 min read
Getting Started with PGP for email
Welcome back, my aspiring cyberwarriors! Pretty Good Privacy or PGP has been around for over 30 years and has proven that it is pretty...
4,535 views

2 min read
Remaining Anonymous: Getting Started with Tails
This article is from our Ukraine intern _aircorridor. He lays out how to install one of the most secure Linux OSés, Tails. Getting...
3,609 views


6 min read
Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain
Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital...
2,071 views

3 min read
Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege's of the...
5,644 views

5 min read
Networking Basics for Hackers, Part 1
With our dramatic growth over the last year, we have added many new aspiring hackers who are still lacking in the basics of network and...
16,251 views

3 min read
Linux Basics for Hackers, Part 14: Using the curl command to Download Web Site Source Code
Welcome back my aspiring cyber warriors! Now that you have mastered the Basics of Linux, let's begin looking at some of the more esoteric...
7,083 views

3 min read
Linux Firewalls: Creating an Application Layer IDS/IPS with fwsnort
Welcome back, my aspiring cyberwarriors! In a previous tutorial here, I introduced you to the Linux firewall, iptables. iptables enables...
4,966 views

3 min read
Linux Basics for Hackers, Part 13: Running Kali Linux in Windows (WSL)
Welcome back my aspiring cyber warriors! As most of you know, I am the author of the best-selling book, Linux Basics for Hackers from No...
11,086 views


4 min read
Linux Basics for Hackers, Part 12: The Linux Philosophy
Welcome back my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have...
1,463 views


4 min read
Linux Firewalls: Uncomplicated Firewall (ufw)
Welcome back, my aspiring security engineers! There are a multitude of reasons for using Linux but one of the most overlooked is its...
7,606 views


5 min read
Linux Basics for the Aspiring Hacker, Part 3 (Creating, Removing and Renaming Files and Directories)
Welcome back, my aspiring hackers! In part 1 of this series, I introduced you to the file system, the cd or change directory command and...
7,847 views


4 min read
Linux Basics for Hackers, Part 11: Linux Firewalls (iptables)
Welcome back, my aspiring cyber warriors! A firewall is one of the key security measures necessary for a secure network. Linux has a...
15,789 views