Metasploit Basics, Part 5: Using Metasploit for Reconnaissance (nmap, EternalBlue, SCADA, and MS SQL)

Welcome back, my rookie hackers! As you know, reconnaissance is a crucial part of the hacker/pentester’s job. Without good reconnaissance, it is likely that all your work and effort will go for naught. As Metasploit has evolved from strictly an exploitation framework to a multi-faceted, penetration testing tool, it has added additional capabilities, including reconnaissance. […]

Continue Reading

Open Source Intelligence (OSINT), Spyse, Part 1: Finding Critical Information about a Domain

Welcome back, my open source intelligence (OSINT) investigators. In previous tutorials, we have examined numerous web services that compile key information that is useful to pentesters, hackers and bug hunters. These include; Google Hacking Shodan Censys BuiltWith Netcraft and others These are all great tools but I’m going to show you a new kid on […]

Continue Reading

The Hackers-Arise Cybersecurity/Hacker Starter Bundle

So many of you have asked for an inexpensive cybersecurity starter package and we have responded! The following package provides everything you need to get started in cybersecurity/infosec for just $149! This package includes; Linux Basics for Hackers v2 companion videos ($99 value) Certified WhiteHat Hacker Associate(CWA) Prep v2 course ($99 value) Getting Started Becoming […]

Continue Reading

Software Defined Radio (SDR) for Hackers, Part 4: Intercepting International Space Station Signals

Welcome back, my aspiring RF hackers! In this series, we are exploring how we can use a simple and inexpensive rtl-sdr dongle, in conjunction with our computer and software, to listen, intercept, decode and decrypt various radio frequency signals. These include such things as cellphones, pagers, garage door openers, remotes, automobile remote door openers, police […]

Continue Reading