Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

  • Simple WEP Cracking

    Steganography & encryption
    1 Introduction This tutorial will show you how to crack a depreciated, but still used, wireless encryption algorithm called Wired Equivalent Privacy (WEP). WEP was introduced in 1997 and was designed to provide the user with a secure connection comparable to that of traditional wired networks. But s... continue reading
  • Common PHP attacks: Directory traversal

    Website Security
    What is Directory Traversal? During a directory traversal attack, the attacker will submit a filename containing characters that will allow them to access files outside of the intended directory. For example, a single dot (.) refers to the current directory and two dots (..) the parent directory. Du... continue reading
  • Warriors of the Net

    Did you ever wonder how the Internet works? How does a router look like? What color does a IP packet have? How does a IP packet travel through firewall. All the answers and many more can be found in the Warriors of the net movie. Official site: continue reading
  • Cracking Stuxnet, a 21st-century cyber weapon

    When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead\'s final target -- and its covert origins.... continue reading