Blogs

  • Web Scraping with Python

    Posted June 28, 2016 by Anonanonamous

    Hello, everyone.Today I will be demonstrating how to connect to web pages in Python 2.7, scrape information you need from them, and post back to them using standard Python libraries. I will be performing this in a Python terminal, but obviously these actions can be scripted as well.My first demonstr...

  • Local File Inclusion (LFI)

    Posted June 7, 2016 by psychomarine

      Local File Inclusion Local File Inclusion (also known as LFI) is the process of including files on a server through the web browser. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected. A typical example of a PHP ...

  • PHP Object Injection

    Posted June 7, 2016 by psychomarine

    Understanding PHP Object Injection PHP Object Injection is not a very common vulnerability, it may be difficult to exploit but it also may be really dangerous. In order to understand this vulnerability, understanding of basic PHP code is required.   PHP Classes and Objects Classes and objec...

  • how to see hidden profile pic. on Facebook?

    Posted November 6, 2014 by roymillar

    how to see hidden profile pic. on Facebook? 1 Visit the user’s timeline. 2 Right click on his/her profile picture. 3 Copy the image URL. 4 Open a new browser tab. 5 Paste the URL into the address bar. 6 Remove the entire part from “hprofile-ak-…” to ”...

  • Unlock any windows computer

    Posted November 6, 2014 by roymillar

    Unlock any windows computer ********************************* To make a password reset tool u require 1 - Pendrive 2 - Computer 3 - Offline NT Password & Registry Editor Download here https://adf.ly/sml5s click this link wait for 5 sec. then skip adds Steps to make password reset pendr...

  • Mac exploit and solution

    Posted August 11, 2014 by timmey112

    Mac OSX is obviously not the programmers first choice, yet a great deal of people still use it as their operating system. The number of remote exploits with tools like metasploit is very limited because more people use windows. Although remote hacking can still be achieved from your Linux distro wit...

  • Particle Swarm Optimisation

    Posted March 2, 2014 by peter

    FOREWORD 1) I will tell you what I know about Particle Swarm Optimization (PSO), a technique that can be used to do for example Programming_9 or Logic_8 2) I am no mathematician, so I will not use fancy mathematical language or symbols that are not on my keyboard anyway. This is pure prog...

  • BUffer overflow and ASLR bypass (Brute force method)

    Posted January 19, 2013 by 3ntr0py

    ###### COMMENTS ########################### # I wrote this originally a year or so ago # # and there is a good chance of finding few # # mistakes as I was in a bit hurry and image # # copy and paste onto the onlin...

  • WPA/WPA2 hacking

    Posted January 14, 2013 by bul2nmedown

    WPA/WPA2 Cracking by BurnMeDown Software in use OS: Ubuntu 10.04 lts Software: Crunch 3.3 Dictionary maker Aircrack-ng Macchanger Note to begin with this tutorial. Do not expect to crack a wpa quickly. They take time(days, weeks, months) to crack. Some tips before we start. Major com...

  • Simple guide to aquiring key from WEP encrypted network

    Posted June 22, 2012 by electro-technic

    Simple guide to aquiring key from WEP encrypted network This tutorial is aimed at providing a simple guide to a common, effective, and simple attack on WEP based networks, yielding the WEP key. We will, of course be using tools from the aircrack-ng suite on a Linux operating system with aircrack ...

  • Error Based SQL Injection

    Posted February 20, 2012 by martian

    Error based SQL injection takes advantage of poor error handling in web page processing. I’ll make this tutorial as friendly as possible. This will involve 5 major stages: • Finding the target • Identifying database size i.e number of columns • Extracting database tables • Extracting database ...

  • securing a linux box

    Posted September 13, 2011 by c0re

    @author: c0re @copyright: CreativeCommons @version: 1.3 | 09.13.2011 [TOC - TableOfContent] -------------------------------- 0x00 | Introduction 0x01 | Basics 0x02 | Hardening SSH 0x03 | Simple Firewall 0x04 | Port Knocking 0x05 | ARPalert 0x06 | Tunneling Traffic 0x07 | Final word...

  • sql injection

    Posted August 30, 2011 by polemarchos

    TOTAL SQL INJECTION What is sql injection 1. What is sql injection It is a mean of database exploitation through queries (sql commands) in order to read database tables contents, mainly, attack or gain unauthorized access to a system using the exploited database. A great number of modern webs...

  • LFI Apache log poisoning

    Posted August 13, 2011 by Ausome1

    LFI Apache Log Poisoning by Ausome1 Here's a quick overview: If you find a file inclusion vuln and you can't do a remote file include (RFI) attack on it but you can still use the LFI to view things outside the /home/$user directory (open_base turned off). What you can do to include some PHP co...

  • install backtrack 3 to HD using live CD from the command line

    Posted August 5, 2011 by electro-technic

    Install Backtrack to HD Using Live CD From the command line For whatever reason, I have still been unsuccessful at installing Backtrack to a hard drive by using the installer that they provide. In addition to that, the actual steps (that work) are becoming harder and harder to find online. So I'm...