Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

  • About SQL Injections with MS SQL Server

    Forensics
    About SQL Injections Scenario There are many articles about SQLis but I’m writing this with the aim of a Windows server and MS SQL server specifically. Most of this can be applied to other environments too. Let’s suppose that you’ve found an SQL injection vulnerability on a page that has a GE... continue reading
  • Hiding files inside an image

    Steganography & encryption
    Introduction Due to the way different file types are read it is possible to have a single file that acts differently depending on how it is read. For example images are read from the header down whereas ZIP files are read from the footer up. All image files should work, but some are more unpredicta... continue reading
  • Understanding Source Code

    General
    Introduction Hey everyone and welcome to this article on understanding source code. First, let me start by explaining that this article will not teach you to hack anything specifically, but it will give you the understanding you need to start to learn to hack. Okay, first let me tell you a little a... continue reading
  • Introduction to IRC

    General
    What is IRC Internet Relay Chat (IRC) is a protocol for real-time Internet text messaging (chat) or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message. It is also posible to trans... continue reading
  • Simple WEP Cracking

    Steganography & encryption
    1 Introduction This tutorial will show you how to crack a depreciated, but still used, wireless encryption algorithm called Wired Equivalent Privacy (WEP). WEP was introduced in 1997 and was designed to provide the user with a secure connection comparable to that of traditional wired networks. But s... continue reading