Posted p2501
byHi all, I'd like to share my list of favorite shellbased wargames I'm aware of and are solid (when it comes to knowledge): http://overthewire.org/wargames/ (I get nostalgic reading last phrack) http://io.netgarage.org/ http://smashthestack.org/wargames.html http://brmlab.cz/project/warzone...
Posted Anonanonamous
byHello, everyone.Today I will be demonstrating how to connect to web pages in Python 2.7, scrape information you need from them, and post back to them using standard Python libraries. I will be performing this in a Python terminal, but obviously these actions can be scripted as well.My first demonstr...
Posted psychomarine
byLocal File Inclusion Local File Inclusion (also known as LFI) is the process of including files on a server through the web browser. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected. A typical example of a PHP ...
Posted psychomarine
byUnderstanding PHP Object Injection PHP Object Injection is not a very common vulnerability, it may be difficult to exploit but it also may be really dangerous. In order to understand this vulnerability, understanding of basic PHP code is required. PHP Classes and Objects Classes and objec...
Posted Deleted Member
byhow to see hidden profile pic. on Facebook? 1 Visit the user’s timeline. 2 Right click on his/her profile picture. 3 Copy the image URL. 4 Open a new browser tab. 5 Paste the URL into the address bar. 6 Remove the entire part from “hprofile-ak-…” to ”...
Posted Deleted Member
byUnlock any windows computer ********************************* To make a password reset tool u require 1 - Pendrive 2 - Computer 3 - Offline NT Password & Registry Editor Download here https://adf.ly/sml5s click this link wait for 5 sec. then skip adds Steps to make password reset pendr...
Posted timmey112
byMac OSX is obviously not the programmers first choice, yet a great deal of people still use it as their operating system. The number of remote exploits with tools like metasploit is very limited because more people use windows. Although remote hacking can still be achieved from your Linux distro wit...
Posted Deleted Member
byFOREWORD 1) I will tell you what I know about Particle Swarm Optimization (PSO), a technique that can be used to do for example Programming_9 or Logic_8 2) I am no mathematician, so I will not use fancy mathematical language or symbols that are not on my keyboard anyway. This is pure prog...
Posted 3ntr0py
by###### COMMENTS ########################### # I wrote this originally a year or so ago # # and there is a good chance of finding few # # mistakes as I was in a bit hurry and image # # copy and paste onto the onlin...
Posted bul2nmedown
byWPA/WPA2 Cracking by BurnMeDown Software in use OS: Ubuntu 10.04 lts Software: Crunch 3.3 Dictionary maker Aircrack-ng Macchanger Note to begin with this tutorial. Do not expect to crack a wpa quickly. They take time(days, weeks, months) to crack. Some tips before we start. Major com...
Posted electro-technic
bySimple guide to aquiring key from WEP encrypted network This tutorial is aimed at providing a simple guide to a common, effective, and simple attack on WEP based networks, yielding the WEP key. We will, of course be using tools from the aircrack-ng suite on a Linux operating system with aircrack ...
Posted martian
byError based SQL injection takes advantage of poor error handling in web page processing. This tutorial has been made as simple as possible to be easy to follow through. For this attack there are usually 5 major steps within the attack to compromise an application but this may vary depending...
Posted Deleted Member
by@author: c0re @copyright: CreativeCommons @version: 1.3 | 09.13.2011 [TOC - TableOfContent] -------------------------------- 0x00 | Introduction 0x01 | Basics 0x02 | Hardening SSH 0x03 | Simple Firewall 0x04 | Port Knocking 0x05 | ARPalert 0x06 | Tunneling Traffic 0x07 | Final word...
Posted Deleted Member
byTOTAL SQL INJECTION What is sql injection 1. What is sql injection It is a mean of database exploitation through queries (sql commands) in order to read database tables contents, mainly, attack or gain unauthorized access to a system using the exploited database. A great number of modern webs...
Posted Ausome1
byLFI Apache Log Poisoning by Ausome1 Here's a quick overview: If you find a file inclusion vuln and you can't do a remote file include (RFI) attack on it but you can still use the LFI to view things outside the /home/$user directory (open_base turned off). What you can do to include some PHP co...