Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

  • All your devices can be hacked

    Talks
    Could someone hack your pacemaker? At TEDxMidAtlantic, Avi Rubin explains how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world. More videos can be found at ted.com... continue reading
  • About SQL Injections with MS SQL Server

    Forensics
    About SQL Injections Scenario There are many articles about SQLis but I’m writing this with the aim of a Windows server and MS SQL server specifically. Most of this can be applied to other environments too. Let’s suppose that you’ve found an SQL injection vulnerability on a page that has a GE... continue reading
  • Hiding files inside an image

    Steganography & encryption
    Introduction Due to the way different file types are read it is possible to have a single file that acts differently depending on how it is read. For example images are read from the header down whereas ZIP files are read from the footer up. All image files should work, but some are more unpredicta... continue reading
  • Understanding Source Code

    General
    Introduction Hey everyone and welcome to this article on understanding source code. First, let me start by explaining that this article will not teach you to hack anything specifically, but it will give you the understanding you need to start to learn to hack. Okay, first let me tell you a little a... continue reading
  • Introduction to IRC

    General
    What is IRC Internet Relay Chat (IRC) is a protocol for real-time Internet text messaging (chat) or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message. It is also posible to trans... continue reading