Metasploit Basics, Part 5: Using Metasploit for Reconnaissance (nmap, EternalBlue, SCADA, and MS SQL)

Welcome back, my rookie hackers! As you know, reconnaissance is a crucial part of the hacker/pentester’s job. Without good reconnaissance, it is likely that all your work and effort will go for naught. As Metasploit has evolved from strictly an exploitation framework to a multi-faceted, penetration testing tool, it has added additional capabilities, including reconnaissance. […]

Continue Reading

Software Defined Radio (SDR) for Hackers, Part 4: Intercepting International Space Station Signals

Welcome back, my aspiring RF hackers! In this series, we are exploring how we can use a simple and inexpensive rtl-sdr dongle, in conjunction with our computer and software, to listen, intercept, decode and decrypt various radio frequency signals. These include such things as cellphones, pagers, garage door openers, remotes, automobile remote door openers, police […]

Continue Reading

Dreaming of Becoming a Cyber Warrior? You can join our team NOW by becoming a Hackers-Arise MEMBER!

You can become a Hackers-Arise MEMBER and receive the following; 1. “Linux Basics for Hackers v2” Video Companion ($99 value). 2. “CWA Prep” (Introduction to Hacking) Video ($99 value). 3. An Autographed copy of Master OTW’s new book “Getting Started Becoming a Master Hacker” ($30 value. You just pay shipping). 4. A digital copy of […]

Continue Reading