Software Defined Radio (SDR) for Hackers: Radio Frequency Attack Methods

Welcome back, my aspiring radio hackers! With the advent of inexpensive radio devices such as the RTL-SDR, HackRF, LimeSDR and bladeRF, the possibility of hacking radio frequency (RF) communication and control devices has been blown wide open to anyone in the cybersecurity/infosec field. Although not commonly included in penetration tests, radio hacks should be considered […]

Continue Reading

Hackers-Arise Announces a New Training Program: Digital Forensics and Incident Response (DFIR)!

Many of our aspiring cyberwarriors have been asking for a separate digital forensics and incident response (DFIR) training program and we have responded! This new program will use many of the existing courses on our Subscriber and Subscriber Pro platform and add additional, new courses specifically for digital forensics and incident response. We recognize that […]

Continue Reading

Wi-Fi Hacking, Part 17: Wi-Fi Hacking with Bettercap

Welcome back my aspiring cyberwarriors! In this series on Wi-Fi (802.11) hacking, we have examined a multitude of approaches to Wi-Fi hacking including; Wireless Hacking Strategies Getting Started with aircrack-ng Hacking WPA2-PSK Continuous DoSing of a Wireless AP Hacking WPS with Reaver Hacking WPA2-PSK without Password Cracking Evading Wi-Fi Authentication Evil Twin Attack to Spy […]

Continue Reading

Evading AV with Veil-Evasion

One of the most important issues any hacker must address is how to get past security devices and remain undetected. These can include antivirus software, intrusion detection systems, firewalls, web application firewalls, and numerous others. As nearly all of these devices employ a signature-based detection scheme where they maintain a database of known exploits and […]

Continue Reading