Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

Blind SQL Injection

One-Time Pad

How to hide messages in audio files

  • SQLMAP - Tutorial to your first SQL Injection tool

    Website Security
    1. Introduction SQL Injection is a must know hacker vocabulary. You have learnt how to inject simple queries like universal true queries and union based queries. You may login as admin or retrieve sensitive information from databases. Now imagine those vulnerabilities explored at an automated level.... continue reading
  • One-Time Pad

    Steganography & encryption
    Prerequisites In order to understand this article, you must understand what a XOR cipher is. I won’t go into too much details about it here as this is not the subject of this article, but because this is not a tough subject and I assume that only smart people are reading this article, I will give ... continue reading
  • How to hide messages in audio files

    Steganography & encryption
    How can we see an audio ? Usually, by its waveform, but we can also see the visual representation of its frequency over time, which is a spectrogram. [image] Since every audio can be represented by a visual way, can we construct an audio file from an image, that will be reproduced as its spectrogr... continue reading
  • The XOR Cipher

    Steganography & encryption
    Overview What is XOR cipher ? In cryptography, the simple XOR cipher is a type of additive cipher, an encryption algorithm that operates according to the principles: A ⊕0 = A, A ⊕ A = 0, (A ⊕ B ) ⊕ C = A ⊕ (B ⊕ C), (B ⊕ A) ⊕ A = B ⊕ 0 = B, where ⊕ denotes the exclusive disju... continue reading
  • Confessions of A Cyber Spy Hunter

    With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, a company that is developing stealth cyber security technology so... continue reading