Search
4 min read
Wi-Fi Hacking, Part 11: The PMKID Attack
Welcome back, my aspiring cyber warriors! As you know, the key to hacking the WPA2-PSK is to capture the PSK (pre-shared key or...
101,850 views
4 min read
Bypassing Next Generation Firewalls with fragtunnel
Welcome back, my aspiring cyberwarriors! A firewall is a critical component of network security that acts as a barrier between trusted...
3,546 views
1 min read
Data Science Analytics for Cybersecurity, January 28-30
Welcome back, my cyberwarriors! Right now, we are on the advent of the Age of Artificial Intelligence ! You will either embrace this new...
584 views
4 min read
Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets
Welcome back my cyberwarriors! One of the key tasks for those defending a country's, institution's, or corporation's assets is to...
2,053 views
2 min read
Cyberwar Mission 2: Reconnaissance in the Adversary's Docker Images
Welcome back, my aspiring cyberwarriors! In this series, Aircorridor, our man in Ukraine, takes you along on his real-life cyberwar...
880 views
2 min read
Database Hacking: Common SQL Injection Commands
Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...
3,809 views
2 min read
What is a CyberWarrior? The Hackers-Arise Cyberwarrior Philosophy
If you are reading this, you are very likely interested in the field of cybersecurity. You may also be considering studying...
5,345 views
3 min read
Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Welcome back, my aspiring RF hackers! Before embarking upon the study of SDR for Hackers it is good idea to take a close look at the...
39,109 views
3 min read
OSINT: Finding Email Passwords in Dumps with h8mail
Welcome back, my aspiring OSINT Investigators! Often as OSINT investigators, pentesters and hackers, we need to determine if a email...
55,230 views
3 min read
Open Source Intelligence (OSINT): OSINT Tools for Bitcoin Investigations
Welcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency...
12,965 views
8 min read
Metasploit Basics for Hackers, Part 1: Getting Started with Metasploit
Welcome back, my aspiring cyber warriors! In this series, I will introduce you to the world's most popular hacking/pentesting platform,...
68,881 views
3 min read
Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io
Welcome back, my aspiring cyberwarriors! Oftentimes, as cyberwarriors, we need to check to see whether our systems or others' are...
14,386 views
3 min read
Social Engineering Attacks: Creating a Fake SMS Message
Welcome back, my aspiring cyber warriors! Social engineering is a key feature of some of the biggest hacks in history! Many novice...
50,167 views
1 min read
What is a White Hat Hacker?
Welcome back, my cyberwarriors! Hackers-Arise is a white-hat hacker training site. This means that we use our skills for good. Obviously,...
3,694 views
3 min read
Reverse Engineering Malware: Getting Started with Ghidra, Part 1
Welcome back, my aspiring cyber warriors! There are a number of excellent tools available to use in the field of reverse engineering (see...
18,987 views
3 min read
Linux Basics for Hackers, Part 13: Running Kali Linux in Windows (WSL)
Welcome back my aspiring cyber warriors! As most of you know, I am the author of the best-selling book, Linux Basics for Hackers from No...
10,939 views
2 min read
Evading Antivirus: How Antivirus Works
Welcome back my aspiring cyberwarriors! Before beginning on the journey to learn to how to evade AV, it is critical to first understand...
3,667 views
4 min read
Linux Basics for Hackers, Part 12: The Linux Philosophy
Welcome back my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have...
1,428 views
5 min read
How To Study and Pass the Certified Whitehat Hacker Associate (CWA) Exam
Many of you have been asking me, "How can I study for the CWA certification exam, and what material is covered on the exam?" Here is the ...
15,721 views
4 min read
Linux Firewalls: Uncomplicated Firewall (ufw)
Welcome back, my aspiring security engineers! There are a multitude of reasons for using Linux but one of the most overlooked is its...
7,497 views