Finding Outdated and Vulnerable Systems in Russian Using Shodan

Welcome back, my cyberwarriors! The Russian invasion of Ukraine continues and the courageous people of Ukraine need our help. In previous posts, I have emphasized that there are many outdated and vulnerable systems around the world. Not everyone updates and upgrades their operating systems. These systems are particularly vulnerable to known attack vectors. Russia is […]

Continue Reading

Open Source Intelligence (OSINT): Using Google Earth Pro Satellite Imagery for Investigations

Welcome back, my aspiring investigators! Open Source Intelligence (OSINT) is a very broad field with a multitude of applications throughout information security and other fields. These applications include; Pentesting and security assessment Economic and financial assessments Environmental Assessments Crime investigations People Searches Thwarting hacks, scams, and other criminal activity Journalism The list could go on […]

Continue Reading

Wireless Hacking, Part 10: Creating an Evil Twin Wi-Fi AP to Eavesdrop on the Target’s Traffic

Welcome back, my aspiring cyber warriors! There are a multitude of strategies and techniques for hacking wireless networks. You can see a list of the tutorials in the Wireless Hacking section here on Hackers-Arise. Here, we will look at one more technique for hacking Wi-Fi for spying on the target’s traffic. One such strategy would […]

Continue Reading