Dreaming of Becoming a Cyber Warrior? You can join our team NOW by becoming a Hackers-Arise MEMBER!

You can become a Hackers-Arise MEMBER and receive the following; 1. “Linux Basics for Hackers v2” Video Companion ($99 value). 2. “CWA Prep” (Introduction to Hacking) Video ($99 value). 3. An Autographed copy of Master OTW’s new book “Getting Started Becoming a Master Hacker” ($30 value. You just pay shipping). 4. A digital copy of […]

Continue Reading

Metasploit5 Basics, Part 4: Connecting and Using the postgresql Database with Metasploit

Welcome back, my aspiring Metasploit Cyber Warriors! In this series, we are exploring the power and features of the world’s most popular and powerful exploitation framework, Metasploit. In this tutorial, we will be examining how to connect the postgresql database to Metasploit. In this way, we can speed up our Metasploit module searches, save our […]

Continue Reading

Metasploit Basics for Hackers, Part 25: Web Delivery with Linux/UNIX/OsX

Welcome back, my aspiring cyber warriors! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even after my many tutorials, I have only scratched the surface of its capabilities. For instance, it can be used with Nexpose for vulnerability scanning, with nmap for port scanning, and with its numerous auxiliary modules, nearly […]

Continue Reading

Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit

Welcome back, my Metasploit Cyber Warriors! Although Metasploit is an “exploitation framework” primarily used for hacking and penetration testing, it can also be used to provide some rudimentary forensic capabilities. It’s primary usefulness as a forensic tool is to gather evidence from a remote system when the physical system is unavailable to the investigator. In […]

Continue Reading