HACKERS ARISE

  • About Us
    • About
    • OTW on Twitter
    • Master OTW on Youtube
  • Blog
  • Getting Started
  • Books
  • Store
    • Training Platform
    • Autographed Books
  • Training
    • Courses
      • List of Courses
      • Live Training Schedule
    • Training Packages
      • Compare Packages
      • Member Gold
      • Subscriber
      • Subscriber PRO
      • Member
      • DFIR
      • SDR
  • Services
    • Advertising
    • Hackers for Hire
    • Digital Forensics Investigator for Hire
  • F.A.Q.
  • About Us
    • About
    • OTW on Twitter
    • Master OTW on Youtube
  • Blog
  • Getting Started
  • Books
  • Store
    • Training Platform
    • Autographed Books
  • Training
    • Courses
      • List of Courses
      • Live Training Schedule
    • Training Packages
      • Compare Packages
      • Member Gold
      • Subscriber
      • Subscriber PRO
      • Member
      • DFIR
      • SDR
  • Services
    • Advertising
    • Hackers for Hire
    • Digital Forensics Investigator for Hire
  • F.A.Q.
Start Hacking

Author: Occupy The Web

Vulnerability Scanning, Part 1: Nexpose

December 9, 2023January 2, 2024Occupy The Web

Welcome back, my aspiring cyberwarriors! One of the keys to being successful as a hacker, pentester, or cyber warrior is the ability to find vulnerabilities or flaws in the target system. Vulnerabilities are holes or weaknesses that can be exploited (hacked). We have looked at several ways to do that including various Web application vulnerability […]

Continue Reading

Web App Hacking: BurpSuite, Part 4: Remote File Inclusion (RFI)

December 9, 2023January 2, 2024Occupy The Web

Welcome back, my aspiring web app hackers! In this series on Web App Hacking, we are exploring the multitude of ways of hacking web applications. Here, we are delving into the most widely used Web App Hacking tools, BurpSuite (BurpSuite is on my essential hacking tools list here). In an earlier post here at Hackers-Arise, […]

Continue Reading

Web App Hacking: BurpSuite, Part 3: Testing for Persistent XSS

December 9, 2023January 2, 2024Occupy The Web

Welcome back, my aspiring cyberwarriors! Cross Site Scripting or XSS is one of the most problematic vulnerabilities in web applications. It ranks among the OWASP Top 10 website vulnerabilities nearly every year. For more on cross-site scripting, check out my post here. In this tutorial, I will demonstrate how to use the BurpSuite to test […]

Continue Reading

Why Hackers Make the Best InfoSec Engineers

December 9, 2023January 2, 2024Occupy The Web

At first blush, the idea of putting a hacker in charge of your information security might seem absurd or, at least, ill-advised. Who would even think of putting someone who is skilled and knowledgeable in how to breach my network in charge of protecting it? Isn’t that comparable to the proverbial fox guarding the hen […]

Continue Reading

Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)

December 9, 2023December 28, 2023Occupy The Web

Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007 with the advent of the Apple phone, mobile devices now comprise over 50% of all web traffic in 2020. There are 5B mobile devices on the planet or about one […]

Continue Reading

Reverse Engineering Malware: Getting Started with Ghidra, Part 2

December 9, 2023January 2, 2024Occupy The Web

Welcome back, my aspiring cyber warriors! Reverse engineering malware is among the highest-level skill sets in our discipline and it’s salaries reflect elevated position in the cyber security ecosystem. It requires years of diligent study to become proficient and this is good place to start. If you have not yet done so, go back and […]

Continue Reading

Wi-Fi (802.11) Hacking: How to Hack the WPS PIN with Reaver

December 9, 2023January 2, 2024Occupy The Web

Welcome back, my budding hackers! One of the most popular areas for those starting out in this discipline is hacking Wi-Fi. Wi-Fi has been rife with vulnerabilities and insecurities over the years and nearly everyone wants to take advantage of this. When Wi-Fi was first developed in the late 90’s, the original encryption/security standard, Wired […]

Continue Reading

Web App Hacking: Online Password Cracking with Burp Suite (Web App Authentication)

December 8, 2023January 2, 2024Occupy The Web

Welcome back, my aspiring cyber warriors! In this series, we are exploring the myriad of ways to hack web applications. As you know, web applications are those apps that run the websites of everything from your next door neighbor’s website, to the all-powerful financial institutions that run the world. Each of these applications is vulnerable […]

Continue Reading

Getting Started with Kali Linux 2020

December 8, 2023December 8, 2023Occupy The Web

Welcome back, my aspiring cyber warriors! Kali Linux is the operating system of choice for aspiring hackers and advanced hackers as well. Developed by Offensive Security, it contains many of the tools a hacker needs to get started. Recently, Offensive Security released a new version of Kali Linux nominally known as Kali Linux 2020.2. They […]

Continue Reading

Digital Forensics, Part 2: Live Memory Acquisition and Analysis

December 8, 2023January 2, 2024Occupy The Web

In some cases, the forensic investigator will need to grab an image of the live memory. Remember, RAM is volatile and once the system is turned off, any information in RAM will be likely lost. This information may include passwords, processes running, sockets open, clipboard contents, etc. All of this information must be captured before […]

Continue Reading

Posts navigation

Older posts
Newer posts

Hackers-Arise Newsletter

Explore the latest cybersecurity news and insights from Master OTW!

Categories

  • AI
  • Anti-Forensics
  • Bitcoin
  • Bluetooth
  • Bug Bounty
  • Cellphones
  • Cryptocurrency
  • Cryptography Basics
  • Cyber Threat Intelligence
  • Cybersecurity
  • Cyberwar
  • Cyberwarrior
  • Data Analytics
  • Data Dumps
  • Defensive Security
  • Digital Forensics
  • DoS
  • Email Dumps
  • Exploit Development
  • FemtoCell
  • GPS
  • Hacking
  • ICS
  • InfoSec
  • IoT
  • IoT Hacking
  • Linux
  • Lock Picking
  • Malware
  • Metasploit
  • Network Basics
  • Offesnsive Security
  • OSINT
  • ParamSpider
  • Pentesting
  • Physical Security
  • Python
  • Ransomware
  • Satellite Hacking
  • SCADA Hacking
  • Scanner
  • Scapy
  • Scripting for Hackers
  • SDR
  • Signals Intelligence
  • Spidering
  • Stingray
  • Ukraine
  • Uncategorized
  • Vulnerabilities
  • White Hat
  • Windows

Recent Posts

  • Open-Source Intelligence (OSINT): Unmasking YouTube with OSINT Tools! May 5, 2025
  • Ukraine/Russia Cyber War! Using SQLi Against Russian Websites, Part 2 May 5, 2025
  • Linux Basics for Hackers: Building a Router with nftables May 5, 2025
  • Kubernetes Hacking: Attacking Kubernetes Clusters Using The Kubelet API April 29, 2025
  • Ukraine/Russia CyberWar! Targeting Russian Websites with SQL Injection April 29, 2025

Twitter

Mi Perfil de Twitter Tweets by three_cube

Twitter

Mi Perfil de Twitter Tweets by three_cube Seguir a @three_cube

DON’T MISS OUT – The best training package for aspiring hackers JUST GOT BETTER

BE THE FIRST TO READ MASTER OTW’S NEW RELEASE Linux Basics for Hackers 2nd eDITION

all the books and training videos you need to start hacking for just $169 NOW INCLUDES the brand new second edition of Linux Basics for Hackers

Discover why thousands of hackers began their journey with Linux Basics for Hackers and why it is rated 4.7 stars with over 2,700 reviews on Amazon.

TAKE COMMAND OF YOUR FUTURE

Learn Linux, Networking, Sec+ 701 certification, Radio Basics, Python, Wi-Fi Hacking, Remaining Anonymous, Cryptography, Wireshark, and Nmap – all in one bundle!

This bundle also includes Master OTW’s highly anticipated upcoming book, Python Basics for Hackers, and bestselling Network Basics for Hackers.

Plus, every month, one lucky purchaser will win

A FREE 3-YEAR TRAINING PACKAGE

CYBER WEEK SALE

35% OFF EVERYTHING

 USE CODE jjt8vpmput1d

ENDS 12/6 AT MIDNIGHT!

Excludes books, but everything else is fair game!