Blog

Satellite Hacking, Part 1: Getting Started

Welcome back, my aspiring radio satellite hackers! In this series of tutorials, we will be exploring hacking satellites from a multitude of approaches. Satellites have become a ubiquitous and necessary technology in our everyday lives. They provide us with internet access, television and radio signals, location services, satellite phone service and, of course, satellite images […]

Continue Reading

Hackers-Arise Offers the Best Cybersecurity Training on the Planet! Listen to What our Students are Saying!

Hackers-Arise Offers the Best Cybersecurity Training on the Planet! We attract the best students from around the world and make them the best cyberwarriors on the planet! Don’t take our word for it, look what are students are saying! These are all unsolicited testimonials from real people!     To participate in this state-of-the-art training, […]

Continue Reading

Hacking Active Directory

Agent, your mission—code-named “Digital Lockpick”—is set within the cyber walls of Active Directory, the nexus of network security. Your mission, should you choose to accept it: to exploit the Server Message Block (SMB) protocol, a seemingly innocuous yet vital pathway through which information travels. This operation hinges on mastering the SMB Relay Attack, a tactic […]

Continue Reading

Software Defined Radio (SDR) for Hackers: Radio Frequency Attack Methods

Welcome back, my aspiring radio hackers! With the advent of inexpensive radio devices such as the RTL-SDR, HackRF, LimeSDR and bladeRF, the possibility of hacking radio frequency (RF) communication and control devices has been blown wide open to anyone in the cybersecurity/infosec field. Although not commonly included in penetration tests, radio hacks should be considered […]

Continue Reading