Latest articles
Hacking Active Directory
Agent, your mission—code-named “Digital Lockpick”—is set within the cyber walls of Active Directory, the nexus…
Bluetooth Hacking: Injecting Commands into a Bluetooth Device with BlueDucky
Welcome back, my aspiring cyberwarriors! Bluetooth is a nearly ubiquitous protocol used to communicate between…
Command & Control Series Part II (Operating your own C2 Server)
Introduction. We already know what a C2, or Command and Control server is and, if…
Software Defined Radio (SDR) for Hackers: Radio Frequency Attack Methods
Welcome back, my aspiring radio hackers! With the advent of inexpensive radio devices such as…
Hackers-Arise Announces a New Training Program: Digital Forensics and Incident Response (DFIR)!
Many of our aspiring cyberwarriors have been asking for a separate digital forensics and incident…
SCADA Hacking: Sending Random Inputs into the Russian Industrial Systems
Welcome back, my aspiring cyberwarriors! SCADA hacking and security is different from traditional hacking in…