HACKERS ARISE

  • About Us
    • About
    • OTW on Twitter
    • Master OTW on Youtube
  • Blog
  • Getting Started
  • Books
  • Store
    • Training Platform
    • Autographed Books
  • Training
    • Courses
      • List of Courses
      • Live Training Schedule
    • Training Packages
      • Compare Packages
      • Member Gold
      • Subscriber
      • Subscriber PRO
      • Member
      • DFIR
      • SDR
  • Services
    • Advertising
    • Hackers for Hire
    • Digital Forensics Investigator for Hire
  • F.A.Q.
  • About Us
    • About
    • OTW on Twitter
    • Master OTW on Youtube
  • Blog
  • Getting Started
  • Books
  • Store
    • Training Platform
    • Autographed Books
  • Training
    • Courses
      • List of Courses
      • Live Training Schedule
    • Training Packages
      • Compare Packages
      • Member Gold
      • Subscriber
      • Subscriber PRO
      • Member
      • DFIR
      • SDR
  • Services
    • Advertising
    • Hackers for Hire
    • Digital Forensics Investigator for Hire
  • F.A.Q.
Start Hacking

Author: Occupy The Web

Finding the F5 Systems Vulnerable to CVE-2020-5902 using Shodan

December 8, 2023December 8, 2023Occupy The Web

Welcome back, my aspiring cyberwarriors! On July 4, 2020 (US Independence Day), F5 released a security patch for their BIG-IP systems that allows the attacker to take control of the affected systems. This vulnerability is rated a 10/10 in severity and assigned CVE-2020-5902. This vulnerability is so severe that an attacker with even rudimentary skills […]

Continue Reading

Reverse Engineering Malware, Part 2: Assembler Language Basics

December 8, 2023September 25, 2024Occupy The Web

Most of the work we will be doing in reverse engineering will be with assembler language. This simple and sometimes tedious language can reveal a plethora of information on the source code. When we can’t see or recover the source code of the malware or other software, we can use tools such as dis-assemblers and […]

Continue Reading

Splunk for Security Monitoring, Part 3: Creating a Real-Time Alert

December 8, 2023January 2, 2024Occupy The Web

Welcome back, my aspiring cyber warriors! In earlier posts here at Hackers-Arise, I introduced you to Splunk, an excellent tool for managing all your machine-generated data. In this tutorial, I will show you how to use Splunk to generate real-time alerts on just about any machine-data condition that arises on your system or network. Splunk […]

Continue Reading

OSINT, Part 6: Open-Source Flight and Aircraft Tracking Data

December 8, 2023December 8, 2023Occupy The Web

Welcome back, my aspiring cyber warrior! There is SO much data on the Internet that the issue not IF the data is available, but rather where. At times, we may want to track flights in an investigation. You may want to track the flights of powerful and nefarious individuals or track military flights. Maybe you […]

Continue Reading

Password Cracking Strategy: Using pipal to Determine Common Password Patterns

December 8, 2023January 2, 2024Occupy The Web

Welcome back, my aspiring cyber warriors! In my book “Getting Started Becoming a Master Hacker” and an earlier post, I encouraged you to develop custom password lists before you attempt to brute force passwords. Most often, users create passwords that are simple, common, and follow simple patterns that are easy for them to remember. If […]

Continue Reading

OSINT: How to Use the DNS Cache to Determine the Target’s AV Software

December 8, 2023December 8, 2023Occupy The Web

Welcome back, my greenhorn hackers! In previous tutorials, we have looked at ways to re-encode your payloads and other malware to evade AV software. We have also looked at the inner workings of Clam AV to better understand how this type of software works. Sometimes, we can encode our malware with applications such as Shellter […]

Continue Reading

Digital Forensics, Part 5: Analyzing the Windows Registry for Evidence

December 8, 2023December 8, 2023Occupy The Web

Although nearly all Microsoft Windows users are aware that their system has a registry, few understand what it does, and even fewer understand how to manipulate it for their purposes. As a forensic analyst, the registry can be a treasure trove of evidence of what, where, when, and how something occurred on the system. In […]

Continue Reading

Mr. Robot Hacks, Part 8: How Darlene Hacks the Car in Season 4

December 7, 2023January 2, 2024Occupy The Web

Welcome back, my Mr Robot fans! As many of you already know, Mr.Robot is my favorite TV show and if it were a movie, it would be the BEST hacker movie ever. Not only do I love it for the writing, directing and acting (the star, Rami Malek, won an Academy Award in 2019), but […]

Continue Reading

BASH Scripting for Hackers, Part 2: Building a Continuous Wi-Fi Denial of Service Tool

December 7, 2023September 25, 2024Occupy The Web

Welcome back, my aspiring cyberwarriors! Now that you understand a bit of BASH scripting, let’s try to use our BASH scripting skills in conjunction with our Wi-Fi Hacking skills to write a simple script to create a Denial of Service (DoS) to a Wi-Fi AP. If you are unfamiliar with the aircrack-ng suite of tools […]

Continue Reading

Python Scripting for Hackers, Part 3: Building an FTP Password Cracking Tool

December 7, 2023January 2, 2024Occupy The Web

This is the third installment of my Python scripting series. If you haven’t read the previous two articles, take some time now to go back and read Part 1 (Introduction) and Part 2 (Building a Banner Grabbing Tool) before you proceed here. As I mentioned in previous tutorials, Python is probably the most widely used […]

Continue Reading

Posts navigation

Older posts
Newer posts

Hackers-Arise Newsletter

Explore the latest cybersecurity news and insights from Master OTW!

Categories

  • AI
  • Anti-Forensics
  • Bitcoin
  • Bluetooth
  • Bug Bounty
  • Cellphones
  • Cryptocurrency
  • Cryptography Basics
  • Cyber Threat Intelligence
  • Cybersecurity
  • Cyberwar
  • Cyberwarrior
  • Data Analytics
  • Data Dumps
  • Defensive Security
  • Digital Forensics
  • DoS
  • Email Dumps
  • Exploit Development
  • FemtoCell
  • GPS
  • Hacking
  • ICS
  • InfoSec
  • IoT
  • IoT Hacking
  • Linux
  • Lock Picking
  • Malware
  • Metasploit
  • Network Basics
  • Offesnsive Security
  • OSINT
  • ParamSpider
  • Pentesting
  • Physical Security
  • Python
  • Ransomware
  • Satellite Hacking
  • SCADA Hacking
  • Scanner
  • Scapy
  • Scripting for Hackers
  • SDR
  • Signals Intelligence
  • Spidering
  • Stingray
  • Ukraine
  • Uncategorized
  • Vulnerabilities
  • White Hat
  • Windows

Recent Posts

  • Open-Source Intelligence (OSINT): Unmasking YouTube with OSINT Tools! May 5, 2025
  • Ukraine/Russia Cyber War! Using SQLi Against Russian Websites, Part 2 May 5, 2025
  • Linux Basics for Hackers: Building a Router with nftables May 5, 2025
  • Kubernetes Hacking: Attacking Kubernetes Clusters Using The Kubelet API April 29, 2025
  • Ukraine/Russia CyberWar! Targeting Russian Websites with SQL Injection April 29, 2025

Twitter

Mi Perfil de Twitter Tweets by three_cube

Twitter

Mi Perfil de Twitter Tweets by three_cube Seguir a @three_cube

DON’T MISS OUT – The best training package for aspiring hackers JUST GOT BETTER

BE THE FIRST TO READ MASTER OTW’S NEW RELEASE Linux Basics for Hackers 2nd eDITION

all the books and training videos you need to start hacking for just $169 NOW INCLUDES the brand new second edition of Linux Basics for Hackers

Discover why thousands of hackers began their journey with Linux Basics for Hackers and why it is rated 4.7 stars with over 2,700 reviews on Amazon.

TAKE COMMAND OF YOUR FUTURE

Learn Linux, Networking, Sec+ 701 certification, Radio Basics, Python, Wi-Fi Hacking, Remaining Anonymous, Cryptography, Wireshark, and Nmap – all in one bundle!

This bundle also includes Master OTW’s highly anticipated upcoming book, Python Basics for Hackers, and bestselling Network Basics for Hackers.

Plus, every month, one lucky purchaser will win

A FREE 3-YEAR TRAINING PACKAGE

CYBER WEEK SALE

35% OFF EVERYTHING

 USE CODE jjt8vpmput1d

ENDS 12/6 AT MIDNIGHT!

Excludes books, but everything else is fair game!