Blogs

  • SQL Injections Revealed

    Posted September 23, 2008 by Link-

    -------------------- | SQL Injection | -------------------- Description Server type: LAMP ● Linux ● Apache ● MySQL ● PHP In this simple article I will go through the basic steps of finding an SQL injection to fully exploiting a database. Nevertheless this ...

  • Gaining Access to Command Prompt From School

    Posted September 22, 2008 by data

    ============================================ Gaining Access to Command Prompt From School by data ============================================ A lot of students may watch films such as Hackers, The Net, Wargames, and Swordfish. They look at these "hackers" and see the computers they work with ...

  • The Polybius Cipher

    Posted September 4, 2008 by invas10n

    The Polybius Cipher ------------------- The Polybius Cipher is another type of substitution cipher. It involves using a 5x5 matrix holding all the letters of the alphabet. Yes, so, there are 26 letters in the alphabet and a 5x5 matrix can only hold 25 letters. This is a trivial problem. Th...

  • The Gronsfeld Cipher

    Posted August 27, 2008 by invas10n

    The Gronsfeld Cipher The Gronsfeld Cipher is a variation on the Vigenere Cipher developed by F. Pratt in 1939. Instead of using a keyword and 26 possible Caeser Shifts, the Gronsfeld Cipher uses a combination on numbers, normally 4 or 5. A single digit is not used more than once and the combinati...

  • The Vigenere Cipher

    Posted August 26, 2008 by invas10n

    The Vigenere Cipher The Vigenere Cipher is a mutation on the basic Caeser Cipher. To recap, the Caeser Cipher involves the shifting of the alphabet a specific number of letters left or right to allow a phrase to be re-written using the new alphabet. It is called the "Caeser" Cipher because it was...

  • The Caeser Cipher

    Posted August 26, 2008 by invas10n

    The Caeser Cipher ---------------- History: One of the first ciphers ever created was the Caeser cipher, so named because Juilius Caeser was the creator of it. He used it to encrypt his messages to his generals so that spys and the enemy would not be able to read it. They were however mostly il...

  • Footprinting

    Posted August 25, 2008 by invas10n

    FootPrinting T.O.C (N00bs Tips) What is Footprinting? Internet footprinting Step1: Determine the Scope of Your Activities Step2: Network Enumeration --> Registrar Query --> Organizational Query --> Domain Query --> Network Query --> POC Query Step3: D...

  • Phone Line Theft

    Posted August 19, 2008 by haZed

    ===================================================== Phone Line Theft ===================================================== In most cases, the telephone cabling used in residential property is cabling known as "two pair" cabling. This cabling consists of four wires, ranging in colours dependin...

  • 40 Tips for optimizing your php Code

    Posted August 19, 2008 by Ausome1

    1. If a method can be static, declare it static. Speed improvement is by a factor of 4. 2. echo is faster than print. 3. Set the maxvalue for your for-loops before and not in the loop. 4. Unset your variables to free memory, especially large arrays. 5. Avoid magic like __get, __set, __au...

  • CRLF Injections

    Posted August 19, 2008 by Ethernet

    [+]----------------------------------[+] [-]CRLF Injection Attacks [-] [-]By Ethernet [-] [-]EnigmaGroup.9/04/07 [-] [+]----------------------------------[+] ---------------------------------------- [0x] Table of Contents ------------------------...

  • The Hosts File

    Posted August 19, 2008 by Xero

    WHAT IS THE HOSTS FILE? The hosts file is your computer's first resort when it needs to translate a hostname into an IP address. An example of a hostname would be www.EnigmaGroup.org. The IP address that this hostname typically resolves to would be 72.232.251.174. We have hostnames so that we don...

  • Voice Mail Default Passwords

    Posted August 19, 2008 by Ethernet

    VoiceMail Default Password List By Ethernet ================================= *These where only collected by me and compiled Intro: ====== This little article will cover 21 different Voice Mail and Answering Machine default codes. Following are some quick (but useless) bruteforcing steps. ...

  • Setting up a Home Network

    Posted August 19, 2008 by haZed

    ===================================================== Setting up a Home Network ===================================================== ----------------------------------------------------- Static or Dynamic IP Addressing Scheme ----------------------------------------------------- The first...

  • How to Install Internet Explorer 7.0 Bypassing Genuine Windows Validation

    Posted August 19, 2008 by Ausome1

    Internet Explorer 7.0 is the long awaited tabbed web browser by Microsoft. Nearly four years after the release of Internet Explorer 6.0, in the face of growing competition from Mozilla's Firefox, Microsoft has finally given the old IE platform a facelift. Optimized design along with new cool interfa...

  • Translating DOS to Linux

    Posted August 19, 2008 by Ausome1

    DOS Command: dir, dir/w Linux Equivalent: ls, ls -l DOS Command: chdir (Current directory) Linux Equivalent: pwd DOS Command: del (remove a file) Linux Equivalent: rm DOS Command: deltree (remove a directory and all files under it) Linux Equivalent: rm -r DOS Command: copy Linux Equ...