Wireless Hacking, Part 10: Creating an Evil Twin Wi-Fi AP to Eavesdrop on the Target’s Traffic

Welcome back, my aspiring cyber warriors! There are a multitude of strategies and techniques for hacking wireless networks. You can see a list of the tutorials in the Wireless Hacking section here on Hackers-Arise. Here, we will look at one more technique for hacking Wi-Fi for spying on the target’s traffic. One such strategy would […]

Continue Reading

OSINT: Using Spiderfoot for OSINT Data Gathering

Welcome back, my aspiring OSINT experts! Open Source Intelligence –or OSINT as it has become known –is a leading-edge field in hacking/pentesting, forensics and data science. OSINT is changing the way private investigators, pentesters and data scientists do their job. Open Source Intelligence uses the resources freely available on the Internet (no illegal activities necessary) […]

Continue Reading

Ransomware, Part 1: History and Evolution of Ransomware and Ransomware Attacks

Welcome back, my aspiring cyberwarriors! Recent events have once again emphasized the importance of SCADA security! On May 7, 2021, Colonial Pipeline was attacked with ransomware and was forced the close down a pipeline carrying 45% of the gasoline to major US East Coast cities (NYC, Philadelphia, Washington DC, etc.). This set up gasoline shortages […]

Continue Reading

Certified Cloud Security Professional (CCSP) Earn the Most Respected Cloud Security Certification!

Welcome back, my aspiring cyberwarrior! The Certified Cloud Security Professional (CCSP) from ISC2 is the world’s most respected and sought-after cloud security certification. Now, you can take your career to the next level by becoming CCSP certified. Certification Magazine lists the top 75 certifications in its 2021 Annual Salary Survey. According to their survey, the […]

Continue Reading