Search

3 min read
NEW No-Click Critical Vulnerability in Microsoft Windows: CVE-2025-21298
Welcome back, my aspiring cyberwarriors! Over the years, Microsoft Windows operating system, the world's most widely used OS, has been...
1,942 views


3 min read
Is Hacking IP Cameras Just for Voyeurs or Does it Have Strategic and National Security Implications?
Welcome back, my aspiring cyberwarriors! Hacking IP cameras has always had a bit of voyeuristic appeal to the aspiring cyberwarrior. Many...
553 views

4 min read
Bypassing Next Generation Firewalls with fragtunnel
Welcome back, my aspiring cyberwarriors! A firewall is a critical component of network security that acts as a barrier between trusted...
3,847 views

3 min read
Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
364 views


5 min read
Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics
Welcome back, my aspiring cyberwarriors! As our digital world progresses toward a circumstance where data analytics and artificial...
426 views

2 min read
SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
2,158 views

5 min read
Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning
Welcome back, my aspiring cyberwarriors! Nuclei is an advanced, open-source vulnerability scanner that has gained significant popularity...
1,527 views

4 min read
The SQLite Database: The Ubiquitous Database that Few Understand
Welcome back, my aspiring cyberwarriors! While most IT and cybersecurity professionals are familiar with the big database management...
639 views

6 min read
Physical Security: Lock Picking Basics for Hackers
Welcome back, my aspiring cyberwarriors! Physical perimeter security is just a important as your IT perimeter security. If the hacker can...
1,468 views

4 min read
Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets
Welcome back my cyberwarriors! One of the key tasks for those defending a country's, institution's, or corporation's assets is to...
2,113 views


3 min read
Ransomware: Build Your Own Ransomware, Part 1
Welcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital...
64,714 views

3 min read
Hacking the Cloud: Privilege Escalation in AWS
In the previous tutorial, we learned about cloud technologies and how to conduct data gathering. It's not always the case that the user...
883 views

2 min read
Database Hacking: Common SQL Injection Commands
Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...
3,906 views

3 min read
Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege's of the...
5,596 views

3 min read
Bug Bounty Hunting, Part 2: Stealthy Parameter Detection with ParamSpider
Welcome back, my aspiring cyberwarriors! When attempting to hack/pentest a website, it can be extremely useful to get the parameters of...
4,756 views

3 min read
Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io
Welcome back, my aspiring cyberwarriors! Oftentimes, as cyberwarriors, we need to check to see whether our systems or others' are...
14,410 views


4 min read
SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
For those who are coming from a traditional IT or IT security background, SCADA/ICS systems security can prove prove daunting. Many of...
19,171 views

2 min read
Crashing (DoS) Russian Servers with the Bluekeep Vulnerability
Welcome back, my aspiring cyberwarriors! Putin's brutal invasion of Ukraine must be stopped. While the Ukrainian people are having bombs...
7,857 views


1 min read
Getting Started Bug Bounty Hunting, March 15-17
If you ever dreamed of becoming a Bug Bounty Hunter, this is the course for you! Bounty hunting has grown dramatically in recent years...
4,275 views


3 min read
Web App Hacking: Fuzzing Web Apps to Find Bugs with BurpSuite
Welcome back, my aspiring cyberwarriors! In previous tutorials here on Hackers-Arise, we have used the BurpSuite for a number of purposes...
7,432 views