HACKERS ARISE

  • About Us
    • About
    • OTW on Twitter
    • Master OTW on Youtube
  • Blog
  • Getting Started
  • Books
  • Store
    • Training Platform
    • Autographed Books
  • Training
    • Courses
      • List of Courses
      • Live Training Schedule
    • Training Packages
      • Compare Packages
      • Member Gold
      • Subscriber
      • Subscriber PRO
      • Member
      • DFIR
      • SDR
  • Services
    • Advertising
    • Hackers for Hire
    • Digital Forensics Investigator for Hire
  • F.A.Q.
  • About Us
    • About
    • OTW on Twitter
    • Master OTW on Youtube
  • Blog
  • Getting Started
  • Books
  • Store
    • Training Platform
    • Autographed Books
  • Training
    • Courses
      • List of Courses
      • Live Training Schedule
    • Training Packages
      • Compare Packages
      • Member Gold
      • Subscriber
      • Subscriber PRO
      • Member
      • DFIR
      • SDR
  • Services
    • Advertising
    • Hackers for Hire
    • Digital Forensics Investigator for Hire
  • F.A.Q.
Start Hacking

Category: Hacking

Linux Basics for Hackers, Part 12: The Linux Philosophy

December 12, 2023January 4, 2024Occupy The Web

Welcome back my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have read it when just starting out studying Linux. Now, that you are well into your Linux studies and have some familiarity with how it operates, I’d like to take this moment to […]

Continue Reading

How To Study and Pass the Certified Whitehat Hacker Associate (CWA) Exam

December 12, 2023January 4, 2024Occupy The Web

Many of you have been asking me, “How can I study for the CWA certification exam, and what material is covered on the exam?” Here is the answer you have been waiting for! The White Hat Hacker Associate (CWA) covers 14 domains or subject areas. Everything you need to know is here on Hackers-Arise. There […]

Continue Reading

Web App Hacking: Fuzzing Web Apps to Find Bugs with BurpSuite

December 12, 2023January 4, 2024Occupy The Web

Welcome back, my aspiring cyberwarriors! In previous tutorials here on Hackers-Arise, we have used the BurpSuite for a number of purposes to test, evaluate and hack web applications. BurpSuite is among that set of tools that every hacker/pentester/bug bounty hunter should be familiar with! In this tutorial, we will be using the BurpSuite to fuzz […]

Continue Reading

SCADA Hacking: Finding Specific SCADA Systems with Censys

December 12, 2023January 3, 2024Occupy The Web

Welcome back, my aspiring SCADA Security Engineer! As you know, SCADA/ICS systems around the world are under attack. These systems are industrial systems that make up the infrastructure of any nation’s economy and are the prime targets in any cyberwar. In such a war, these systems can be easily found via a variety of tools […]

Continue Reading

Android Hacking, Part 4: A Compendium of Android Remote Administration Trojans (RATS)

December 12, 2023December 12, 2023Occupy The Web

Welcome back, my aspiring cyberwarriors! In light of the recent revelations regarding Israel’s NSO group and their cellphone malware known as Pegasus, I thought it would be good time to catalog some of the better-known Remote Access Trojans (RATs) available for the Android OS. This is not meant as an exhaustive list, but simply a […]

Continue Reading

Wi-Fi Hacking, Part 11: The PMKID Attack

December 12, 2023January 3, 2024Occupy The Web

Welcome back, my aspiring cyber warriors! As you know, the key to hacking the WPA2-PSK is to capture the PSK (pre-shared key or password) as it passes through the air in the 4-way handshake between the client and the AP (you must be in monitor mode to do so). This requires that we either wait […]

Continue Reading

It’s Finally Here! Metasploit5 Basics for Hackers

December 12, 2023January 3, 2024Occupy The Web

It’s finally here! Master OTW’s Long Awaited Next Book Metasploit5 Basics for Hackers Master OTW’s new book, following closely in the footsteps of his previous books–Linux Basics for Hackers and Getting Started Becoming a Master Hacker–is meant to fill a gap in the industry for a simple-to-use, accessible guide to getting started with Metasploit (the […]

Continue Reading

Open Source Intelligence (OSINT): Facial Recognition for Investigations

December 12, 2023January 3, 2024Occupy The Web

Welcome back, my aspiring OSINT investigators! Very often in an investigation, we have a picture and we are trying to identify the subject. This might be a picture from a scammer on a dating site, a picture from a Facebook page, a picture sent via SMS, WhatsApp, Snapchat, TikTok or other chat medium or a […]

Continue Reading

OSINT: Google Hacking and Dorks to Find Key Information

December 12, 2023December 12, 2023Occupy The Web

As all of us know, Google operates the most widely used Internet search engine on the planet. Google crawls nearly every web page, of every website, and builds a massive database of all the information it gathers. Most people then use Google’s database to search by keywords for articles relevant to the subject of their […]

Continue Reading

Reverse Engineering Malware, Part 5: OllyDbg Basics

December 12, 2023January 3, 2024Occupy The Web

In this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and espionage agencies such as the CIA and NSA, regularly re-purpose malware for other purpose. Previously, we looked at the basics of IDA Pro, the most widely used disassembler in our industry. In this […]

Continue Reading

Posts navigation

Older posts
Newer posts

Hackers-Arise Newsletter

Explore the latest cybersecurity news and insights from Master OTW!

Categories

  • AI
  • Anti-Forensics
  • Bitcoin
  • Bluetooth
  • Bug Bounty
  • Cellphones
  • Cryptocurrency
  • Cryptography Basics
  • Cyber Threat Intelligence
  • Cybersecurity
  • Cyberwar
  • Cyberwarrior
  • Data Analytics
  • Data Dumps
  • Defensive Security
  • Digital Forensics
  • DoS
  • Email Dumps
  • Exploit Development
  • FemtoCell
  • GPS
  • Hacking
  • ICS
  • InfoSec
  • IoT
  • IoT Hacking
  • Linux
  • Lock Picking
  • Malware
  • Metasploit
  • Network Basics
  • Offesnsive Security
  • OSINT
  • ParamSpider
  • Pentesting
  • Physical Security
  • Python
  • Ransomware
  • Satellite Hacking
  • SCADA Hacking
  • Scanner
  • Scapy
  • Scripting for Hackers
  • SDR
  • Signals Intelligence
  • Spidering
  • Stingray
  • Ukraine
  • Uncategorized
  • Vulnerabilities
  • White Hat
  • Windows

Recent Posts

  • Open-Source Intelligence (OSINT): Unmasking YouTube with OSINT Tools! May 5, 2025
  • Ukraine/Russia Cyber War! Using SQLi Against Russian Websites, Part 2 May 5, 2025
  • Linux Basics for Hackers: Building a Router with nftables May 5, 2025
  • Kubernetes Hacking: Attacking Kubernetes Clusters Using The Kubelet API April 29, 2025
  • Ukraine/Russia CyberWar! Targeting Russian Websites with SQL Injection April 29, 2025

Twitter

Mi Perfil de Twitter Tweets by three_cube

Twitter

Mi Perfil de Twitter Tweets by three_cube Seguir a @three_cube

DON’T MISS OUT – The best training package for aspiring hackers JUST GOT BETTER

BE THE FIRST TO READ MASTER OTW’S NEW RELEASE Linux Basics for Hackers 2nd eDITION

all the books and training videos you need to start hacking for just $169 NOW INCLUDES the brand new second edition of Linux Basics for Hackers

Discover why thousands of hackers began their journey with Linux Basics for Hackers and why it is rated 4.7 stars with over 2,700 reviews on Amazon.

TAKE COMMAND OF YOUR FUTURE

Learn Linux, Networking, Sec+ 701 certification, Radio Basics, Python, Wi-Fi Hacking, Remaining Anonymous, Cryptography, Wireshark, and Nmap – all in one bundle!

This bundle also includes Master OTW’s highly anticipated upcoming book, Python Basics for Hackers, and bestselling Network Basics for Hackers.

Plus, every month, one lucky purchaser will win

A FREE 3-YEAR TRAINING PACKAGE

CYBER WEEK SALE

35% OFF EVERYTHING

 USE CODE jjt8vpmput1d

ENDS 12/6 AT MIDNIGHT!

Excludes books, but everything else is fair game!