Cyberwar Mission: Hack the Adversary’s 2FA Protected Account

To prevent password stealing and password hacking, many applications have adopted 2FA authentication. 2FA or 2-factor authentication, requires that the user authenticate not only using a username name and password (1 factor authentication but als a second authentication method such as send a one time password (2-factor authentication) to an authenticated device such as a […]

Continue Reading

Satellite Hacking, Part 1: Getting Started

Welcome back, my aspiring radio satellite hackers! In this series of tutorials, we will be exploring hacking satellites from a multitude of approaches. Satellites have become a ubiquitous and necessary technology in our everyday lives. They provide us with internet access, television and radio signals, location services, satellite phone service and, of course, satellite images […]

Continue Reading

Software Defined Radio (SDR) for Hackers: Radio Frequency Attack Methods

Welcome back, my aspiring radio hackers! With the advent of inexpensive radio devices such as the RTL-SDR, HackRF, LimeSDR and bladeRF, the possibility of hacking radio frequency (RF) communication and control devices has been blown wide open to anyone in the cybersecurity/infosec field. Although not commonly included in penetration tests, radio hacks should be considered […]

Continue Reading

Hackers-Arise Announces a New Training Program: Digital Forensics and Incident Response (DFIR)!

Many of our aspiring cyberwarriors have been asking for a separate digital forensics and incident response (DFIR) training program and we have responded! This new program will use many of the existing courses on our Subscriber and Subscriber Pro platform and add additional, new courses specifically for digital forensics and incident response. We recognize that […]

Continue Reading