Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

Blind SQL Injection

Firefox extensions a hacker should have (and use)

SIP - Session Initiation Protocol

  • Blind SQL Injection

    Website Security
    Introduction Blind SQL injection is used when there is no value from database in output from the web application, that means the server don't show any information about database, we only can check if the injection will return true or false. In this script example the server checks if the id of user... continue reading
  • Firefox extensions a hacker should have (and use)

    [image] Sometimes we can see some new challengers asking for some help using Micro$oft Edge or other uncanny software in order to complete some basic challenges... Here I suggest to use Firefox, to make the way easier to challenges completion. Why especially Firefox? At first because it's free, it'... continue reading
  • Defcon 23 - Looping Surveillance Cameras

    Introduction This project consists of the hardware and software necessary to hijack wired network communications. The hardware allows an attacker to splice into live network cabling without ever breaking the physical connection. This allows the traffic on the line to be passively tapped and examined... continue reading
  • SIP - Session Initiation Protocol

    Session Initiation Protocol is used to (set up and terminate voice or video calls of course) establish two-party (unicast) or multiparty (multicast) sessions. It also allows modification of existing calls. The modification can involve changing addresses or ports, inviting more participants, and addi... continue reading
  • The Complete Guide to Beginner Lock Picking

    Lock picking
    So you guys want to learn how to pick a lock. Well, look no further! This guide brought to you by will cover all the basics of simple pin tumbler lock picking. :D What is Lock Picking For the purpose of this being a beginners guide, we will simply define lock picking as the ... continue reading