Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

  • Buffer Overflows and IDS Basics

    Application Security
    Types of Buffer Overflows and Methods of Detection Buffer overflows are exploits that hackers use against an operating system or application; like SQL injection attacks, they’re usually targeted at user input fields. A buffer overflow exploit causes a system to fail by overloading memory or execu... continue reading
  • Inappropriate File Types

    Large amounts of sensitive data is stored on a server, these could include login credentials, source code and others. This data is generally stored in a way that is not accessible to the end user, but as all of it is required by the application to run there is an inherit danger. The application need... continue reading
  • How to spoof your MAC address

    Introduction A Media Access Control (MAC) address is essentially your computers hardware address. Much like an IP address can show where your computer is located in the world, a MAC address can be used to determine the hardware manufacturer. Spoofing basically means to trick or deceive. What you are... continue reading
  • Common PHP attacks: Poison Null Byte

    Website Security
    What is a null byte The Poison Null Byte aka The Poisoned NUL Byte was originally dubbed as such by Olaf Kirch in a post in the news group. A null byte in many languages is used to detect the end of a string. As opposed to storing an integer value in the first byte or two of the st... continue reading
  • A basic example of Cross-site scripting (XSS)

    Website Security
    Introduction This article will try to demonstrate and explain one of many ways XSS is used. The example is based on a previous vulnerability in the profile edit page at HackThis!! (this vulnerability has since been patched) but it is applicable to a lot of places all around the internet. The article... continue reading