Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

Blind SQL Injection

DNS Spoofing

One-Time Pad

  • DNS Spoofing

    Network Security
    I. Introduction What is DNS Spoofing ? Firstly, we need to understand what is a DNS server. DNS stands for Domain Name Server. It is a server that match IPs to their associated hostnames. Here's a clear and easy example to understand what a DNS server does ; Copy/paste this IP : - i... continue reading
  • SQLMAP - Tutorial to your first SQL Injection tool

    Website Security
    1. Introduction SQL Injection is a must know hacker vocabulary. You have learnt how to inject simple queries like universal true queries and union based queries. You may login as admin or retrieve sensitive information from databases. Now imagine those vulnerabilities explored at an automated level.... continue reading
  • One-Time Pad

    Steganography & encryption
    Prerequisites In order to understand this article, you must understand what a XOR cipher is. I won’t go into too much details about it here as this is not the subject of this article, but because this is not a tough subject and I assume that only smart people are reading this article, I will give ... continue reading
  • How to hide messages in audio files

    Steganography & encryption
    How can we see an audio ? Usually, by its waveform, but we can also see the visual representation of its frequency over time, which is a spectrogram. [image] Since every audio can be represented by a visual way, can we construct an audio file from an image, that will be reproduced as its spectrogr... continue reading
  • The XOR Cipher

    Steganography & encryption
    Overview What is XOR cipher ? In cryptography, the simple XOR cipher is a type of additive cipher, an encryption algorithm that operates according to the principles: A ⊕0 = A, A ⊕ A = 0, (A ⊕ B ) ⊕ C = A ⊕ (B ⊕ C), (B ⊕ A) ⊕ A = B ⊕ 0 = B, where ⊕ denotes the exclusive disju... continue reading