The Default Passwords of Nearly Every IP Camera
Hackers Arise
by otw
3d ago
Welcome back, my aspiring camera hackers! As you know, the Ukrainian Army asked for our assistance at the beginning of the Russian invasion of Ukraine to hack IP cameras across Ukraine. This was intended provide surveillance to the Ukraine military and intelligence on Russian troop movements, and later to record war crimes. You can read more about it here. Face with this task, we went about it strategically and methodically. The first thing we did was to locate the cameras using such OSINT tools as Google, Shodan, and Censys. Once we located the cameras, the next step was to attempt to hack i ..read more
Visit website
Hackers-Arise Announces a New Cyberwarrior School in Kharkiv, Ukraine!
Hackers Arise
by otw
1M ago
Officials in Ukraine have requested that Hackers-Arise open a new cybersecurity/hacker school in Ukraine to train the next generation of cyberwarriors to protect Ukraine. This school will begin January, 2023 and is open to talented Ukrainians who are interested in protecting Ukraine from further Russian cyber attacks. Kharkiv is just 40 km (25 miles) from the Russian border and this school will represent the closest hacker/cybersecurity school to Russia. The school is tuition-free to Ukraine citizens. This is part of the Hackers-Arise commitment to the people of Ukraine to resist brutal Russi ..read more
Visit website
Master OTW on Youtube
Hackers Arise
by otw
1M ago
Here you will find all the videos with Master OTW which accumulate millions of views, hours of content and knowledge that you can access for free on YouTube. https://www.youtube.com/watch?v=ZGCScbV7vSA&list=PLhfrWIlLOoKOf1Ru_TFAnubVuWc87i-7z&index=10https://www.youtube.com/watch?v=uXbGQiXsRes&list=PLhfrWIlLOoKOf1Ru_TFAnubVuWc87i-7z&index=9https://www.youtube.com/watch?v=GudY7XYouRk&list=PLhfrWIlLOoKOf1Ru_TFAnubVuWc87i-7z&index=8https://www.youtube.com/watch?v=3KYZ5yEqvY4&list=PLhfrWIlLOoKOf1Ru_TFAnubVuWc87i-7z&index=7https://www.youtube.com/watch?v=UYt0r5Rw2gE&a ..read more
Visit website
Networking Basics for Hackers, Part 1
Hackers Arise
by otw
2M ago
With our dramatic growth over the last year, we have added many new aspiring hackers who are still lacking in the basics of network and networking. In addition, with the new ,White Hat certifications, the exam requires some basic networking skills and knowledge to pass. ​ As a result, I decided to offer my own take on networking basics to make certain that everyone here has these basic skills down, which I consider foundation skills for hacking. In reality, without basic networking and Linux skills, becoming a master hacker will certainly remain beyond your reach. ​ I will attempt to address a ..read more
Visit website
Networking Basics for Hackers, Part 2
Hackers Arise
by otw
2M ago
In the first part of this series, I introduced you to the basics of networking including IP addresses, ports, NAT, and DHCP. In this lesson, I want to introduce you to the basics of TCP/IP, i.e., Transmission Control Protocol (TCP) and Internet Protocol (IP). These are the most common protocols used on the internet for communication. ​ ​ ​ To become a proficient hacker, forensic investigator, or simply be a good network engineer, you should understand the structure and anatomy of these protocols. From my experience, many professionals in these fields do not understand the basics of TCP/IP, wh ..read more
Visit website
Introduction to Regular Expressions (regex)
Hackers Arise
by otw
2M ago
Welcome back, my aspiring cyber warriors! This next subject might seem a bit obscure to the uninitiated--but I promise-- this lesson will benefit you significantly either as a hacker or system admin. This tutorial will cover what is usually referred to as a regular expressions, or regex for short. ​ Manipulating Text in Linux ​ Remember, nearly everything in Linux is a file, and for that matter, most are simple text files. Unlike Windows, with elaborate snap-ins and MMCs to configure an application or server, Linux simply has a text file for configuration. Change the text file, change the conf ..read more
Visit website
Basics of Hexadecimal
Hackers Arise
by otw
2M ago
It has become clear from some of your questions that quite a few of you are unfamiliar with the hexadecimal system, or simply, hex. The hexadecimal system is used throughout computing and if you have never studied this Base16 numering system, it may appear relatively opaque. ​ For those of you who may have been overwhelmed by this seemingly mysterious numbering system, I dedicate this brief introduction and overview of the hexadecimal numbering system. ​ As you already know, you encounter the hexadecimal system throughout your computer and software. It usually looks some thing like this 0x4D o ..read more
Visit website
The Hacker Methodology
Hackers Arise
by otw
2M ago
Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight to the exploit without doing the due diligence to make certain that the hack will work and you won't get caught. ​ Here, I want to lay out for you the proper methodology, with example tools and techniques for a hack, from start to finish. ​ Step 1: Performing Reconnaissance ​ Good reconnaissance is critical to great hacking. In general, a good hacker will recon for about 2 to 3 times longer than he/she would performing the actual hack. It's not unusual to s ..read more
Visit website
Netcat, the All- Powerful
Hackers Arise
by otw
2M ago
Netcat, the All- Powerful ​ Netcat is one of those few tools--like nmap, Metasploit, Wireshark and few others-- that every hacker should be familiar with. It is simple, elegant and has a multitude of uses. ​ For instance, netcat can be used to; ​ scan to see if a port is open on a remote system pull the banner from a remote system connect to a network service manually remote administration This lesson will be dedicated to learning to use netcat and its encrypted cousin, cryptcat. Later in your studies, we will find many uses for this simple tool. Like so many applications in the Linux world ..read more
Visit website
Cryptography Basics for the Aspiring Hacker
Hackers Arise
by otw
2M ago
As hackers, we are often faced with the hurdle of cryptography and encryption. Every cyber security engineer worth their pocket protector understands that encryption make the hacker/attacker's task much more difficult. In some cases it may be useful to the hacker, to hide actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such as SSL and wireless, you need to have at least a basic familiarity with the concepts and terminology of cryptography and encryption. ​ To many new h ..read more
Visit website

Follow Hackers Arise on Feedspot

Continue with Google
OR