Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

  • Confessions of A Cyber Spy Hunter

    With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, a company that is developing stealth cyber security technology so... continue reading
  • Blind SQL Injection

    Website Security
    Introduction Blind SQL injection is used when there is no value from database in output from the web application, that means the server don't show any information about database, we only can check if the injection will return true or false. In this script example the server checks if the id of user... continue reading
  • Firefox extensions a hacker should have (and use)

    [image] Sometimes we can see some new challengers asking for some help using Micro$oft Edge or other uncanny software in order to complete some basic challenges... Here I suggest to use Firefox, to make the way easier to challenges completion. Why especially Firefox? At first because it's free, it'... continue reading
  • Defcon 23 - Looping Surveillance Cameras

    Introduction This project consists of the hardware and software necessary to hijack wired network communications. The hardware allows an attacker to splice into live network cabling without ever breaking the physical connection. This allows the traffic on the line to be passively tapped and examined... continue reading
  • SIP - Session Initiation Protocol

    Session Initiation Protocol is used to (set up and terminate voice or video calls of course) establish two-party (unicast) or multiparty (multicast) sessions. It also allows modification of existing calls. The modification can involve changing addresses or ports, inviting more participants, and addi... continue reading