Metasploit Basics, Part 15: Post- Exploitation Fun (Web Cam, Microphone, Passwords and more)

Welcome back, my fledgling hackers! As we have progressed through this series on Metasploit Basics, we have used numerous techniques to exploit your target system including; 1. SMB Exploits (EternalBlue and MS08_067, for instance); 2. File Format (ms14-0440_sandworm, office_word_hta); 3. Browser Exploits (autopwn, Abobe Flash and numerous others); 4. Social Engineering Toolkit(SET); Custom Payloads with […]

Continue Reading

Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain

Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital around us emits, radiates or receives radio waves. These include our cellphones, computers, automobiles, remote controls, key fobs, GPS, and this list could go on and on. This is a little understood field of cybersecurity by […]

Continue Reading

The Cyber Cossacks: Hackers-Arise’s New School in Kharkiv, Ukraine!

Ukrainian officials have requested that Hackers-Arise open a new cybersecurity/hacker school in Ukraine to train the next generation of cyber cossacks to protect Ukraine.    These classes will begin in January 30, 2023 and is open to talented and motivated Ukraine citizens who are interested in protecting Ukraine from further Russian cyber attacks. Kharkiv is […]

Continue Reading