Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

  • Inappropriate File Types

    Hacking
    Large amounts of sensitive data is stored on a server, these could include login credentials, source code and others. This data is generally stored in a way that is not accessible to the end user, but as all of it is required by the application to run there is an inherit danger. The application need... continue reading
  • How to spoof your MAC address

    General
    Introduction A Media Access Control (MAC) address is essentially your computers hardware address. Much like an IP address can show where your computer is located in the world, a MAC address can be used to determine the hardware manufacturer. Spoofing basically means to trick or deceive. What you are... continue reading
  • Common PHP attacks: Poison Null Byte

    Website Security
    What is a null byte The Poison Null Byte aka The Poisoned NUL Byte was originally dubbed as such by Olaf Kirch in a post in the fa.linux.security news group. A null byte in many languages is used to detect the end of a string. As opposed to storing an integer value in the first byte or two of the st... continue reading
  • A basic example of Cross-site scripting (XSS)

    Website Security
    Introduction This article will try to demonstrate and explain one of many ways XSS is used. The example is based on a previous vulnerability in the profile edit page at HackThis!! (this vulnerability has since been patched) but it is applicable to a lot of places all around the internet. The article... continue reading
  • All your devices can be hacked

    Talks
    Could someone hack your pacemaker? At TEDxMidAtlantic, Avi Rubin explains how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world. More videos can be found at ted.com... continue reading