Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

How Magnetic Stripes Work

Have you ever wondered how to build your own credit card emulator, or how to copy card keys? Well, Magspoof displays the basics of understanding and building your own card key spoofer. In this video Samy shows just how simple it is.

Practical Applications of Cross Site Scripting (XSS)

Practical Applications of Directory Traversals

  • How Magnetic Stripes Work

    Videos
    Have you ever wondered how to build your own credit card emulator, or how to copy card keys? Well, Magspoof displays the basics of understanding and building your own card key spoofer. In this video Samy shows just how simple it is.... continue reading
  • Practical Applications of Directory Traversals

    Website Security
    Null Prerequisites Throughout this paper, many scripting languages will be used to provide proof-of-concept and other examples for the benefit of the reader. A basic understanding of these languages is required in order to completely understand the concepts that are conveyed herein. In addition to... continue reading
  • Cookie-based SQL Injection

    Website Security
    Overview What is Cookie ? A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to a user’s browser and for the browser to return the state information to the origin site. The state information can be used for authentication,... continue reading
  • Practical Applications of Cross Site Scripting (XSS)

    Website Security
    Prerequisites Throughout this paper, many scripting languages will be used to provide proof-of-concept and other examples for the benefit of the reader. A basic understanding of these languages is required in order to completely understand the concepts that are conveyed herein; that being said, a la... continue reading
  • Second Order SQL injections

    Website Security
    INTRODUCTION There are a good numbers of SQL injections. One of the most difficult to detect and to exploit are Second Order SQLi. We can definy First Order SQLi as the "classical" and more frequent vulnerability in which we edit a legit query with our own code in the same SQL statement i... continue reading