Posted Link-
by-------------------- | SQL Injection | -------------------- Description Server type: LAMP â— Linux â— Apache â— MySQL â— PHP In this simple article I will go through the basic steps of finding an SQL injection to fully exploiting a database. Nevertheless this ...
Posted Deleted Member
by============================================ Gaining Access to Command Prompt From School by data ============================================ A lot of students may watch films such as Hackers, The Net, Wargames, and Swordfish. They look at these "hackers" and see the computers they work with ...
Posted invas10n
byThe Polybius Cipher ------------------- The Polybius Cipher is another type of substitution cipher. It involves using a 5x5 matrix holding all the letters of the alphabet. Yes, so, there are 26 letters in the alphabet and a 5x5 matrix can only hold 25 letters. This is a trivial problem. Th...
Posted invas10n
byThe Gronsfeld Cipher The Gronsfeld Cipher is a variation on the Vigenere Cipher developed by F. Pratt in 1939. Instead of using a keyword and 26 possible Caeser Shifts, the Gronsfeld Cipher uses a combination on numbers, normally 4 or 5. A single digit is not used more than once and the combinati...
Posted invas10n
byThe Vigenere Cipher The Vigenere Cipher is a mutation on the basic Caeser Cipher. To recap, the Caeser Cipher involves the shifting of the alphabet a specific number of letters left or right to allow a phrase to be re-written using the new alphabet. It is called the "Caeser" Cipher because it was...
Posted invas10n
byThe Caeser Cipher ---------------- History: One of the first ciphers ever created was the Caeser cipher, so named because Juilius Caeser was the creator of it. He used it to encrypt his messages to his generals so that spys and the enemy would not be able to read it. They were however mostly il...
Posted invas10n
byFootPrinting T.O.C (N00bs Tips) What is Footprinting? Internet footprinting Step1: Determine the Scope of Your Activities Step2: Network Enumeration --> Registrar Query --> Organizational Query --> Domain Query --> Network Query --> POC Query Step3: D...
Posted haZed
by===================================================== Phone Line Theft ===================================================== In most cases, the telephone cabling used in residential property is cabling known as "two pair" cabling. This cabling consists of four wires, ranging in colours dependin...
Posted Ausome1
by1. If a method can be static, declare it static. Speed improvement is by a factor of 4. 2. echo is faster than print. 3. Set the maxvalue for your for-loops before and not in the loop. 4. Unset your variables to free memory, especially large arrays. 5. Avoid magic like __get, __set, __au...
Posted Deleted Member
by[+]----------------------------------[+] [-]CRLF Injection Attacks [-] [-]By Ethernet [-] [-]EnigmaGroup.9/04/07 [-] [+]----------------------------------[+] ---------------------------------------- [0x] Table of Contents ------------------------...
Posted Deleted Member
byWHAT IS THE HOSTS FILE? The hosts file is your computer's first resort when it needs to translate a hostname into an IP address. An example of a hostname would be www.EnigmaGroup.org. The IP address that this hostname typically resolves to would be 72.232.251.174. We have hostnames so that we don...
Posted Deleted Member
byVoiceMail Default Password List By Ethernet ================================= *These where only collected by me and compiled Intro: ====== This little article will cover 21 different Voice Mail and Answering Machine default codes. Following are some quick (but useless) bruteforcing steps. ...
Posted haZed
by===================================================== Setting up a Home Network ===================================================== ----------------------------------------------------- Static or Dynamic IP Addressing Scheme ----------------------------------------------------- The first...
Posted Ausome1
byInternet Explorer 7.0 is the long awaited tabbed web browser by Microsoft. Nearly four years after the release of Internet Explorer 6.0, in the face of growing competition from Mozilla's Firefox, Microsoft has finally given the old IE platform a facelift. Optimized design along with new cool interfa...
Posted Ausome1
byDOS Command: dir, dir/w Linux Equivalent: ls, ls -l DOS Command: chdir (Current directory) Linux Equivalent: pwd DOS Command: del (remove a file) Linux Equivalent: rm DOS Command: deltree (remove a directory and all files under it) Linux Equivalent: rm -r DOS Command: copy Linux Equ...