Advice from a Professional Hacker: How Hackers Are Stealing Your Bitcoin and Other Cryptocurrencies

As the price of the cryptocurrencies has skyrocketed over the last few years, the theft of cryptocurrencies has soared right along with it. It appears that hackers have decided it is much easier and more lucrative to steal the cryptocurrencies than the traditional, government-issued fiat currencies ($, pounds, Euros, etc.) and the possible consequences, more […]

Continue Reading

Dreaming of Becoming a Cyber Warrior? You can join our team NOW by becoming a Hackers-Arise MEMBER!

You can become a Hackers-Arise MEMBER and receive the following; 1. “Linux Basics for Hackers v2” Video Companion ($99 value). 2. “CWA Prep” (Introduction to Hacking) Video ($99 value). 3. An Autographed copy of Master OTW’s new book “Getting Started Becoming a Master Hacker” ($30 value. You just pay shipping). 4. A digital copy of […]

Continue Reading

SCADA Hacking: Attacking SCADA/ICS Systems through the Human Machine Interface (HMI)

Welcome back, my aspiring SCADA/ICS cyberwarriors! Let’s begin by congratulating you on your foresight in committing to study SCADA/ICS hacking and security. This is certainly THE most important security issue this decade! In general, SCADA/ICS hacks have been of two types; Hack the protocols (modbus, DNP3, Profitnet, etc); Hack the Human Machine Interface (HMI) In […]

Continue Reading

Android Hacking, Part 2: How to Embed a Backdoor into an Android APK

Welcome back, my fledgling hackers! Mobile devices–smartphones and tablets–are proliferating around the world and slowly overtaking desktop and laptop machines. These mobile devices generally run either the iOS or the Android operating system, with Android comprising the bulk of all mobile device OS’s (82%). Considering the growth of the mobile market and the dominance of […]

Continue Reading

Metasploit Basics, Part 15: Post- Exploitation Fun (Web Cam, Microphone, Passwords and more)

Welcome back, my fledgling hackers! As we have progressed through this series on Metasploit Basics, we have used numerous techniques to exploit your target system including; 1. SMB Exploits (EternalBlue and MS08_067, for instance); 2. File Format (ms14-0440_sandworm, office_word_hta); 3. Browser Exploits (autopwn, Abobe Flash and numerous others); 4. Social Engineering Toolkit(SET); Custom Payloads with […]

Continue Reading