Hackers-Arise Gets International Recognition for Exploiting SCADA System Vulnerability

October 25, 2016, Voice of America (VOA) News (voanews.com) ran an article about the vulnerability of SCADA/ICS systems. In that article in the second paragraph titled “Headline Grabbers”, it cited: Because of the potential for catastrophic damage, some hackers have long targeted ICS networks in hopes of grabbing headlines. Just last month, an anonymous hacker […]

Continue Reading

Scraping Potential Passwords from a Target’s Website using CeWL

Welcome back, my novice hackers! In my series on cracking passwords, I began by showing off some basic password-cracking principles; developed an efficient password-cracking strategy; demonstrated how to use Hashcat, one of the most powerful password-cracking programs; and showed how to create a custom wordlist using Crunch. In this tutorial, I will show you how […]

Continue Reading