Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Hacking and Security Articles

  • SIP - Session Initiation Protocol

    Session Initiation Protocol is used to (set up and terminate voice or video calls of course) establish two-party (unicast) or multiparty (multicast) sessions. It also allows modification of existing calls. The modification can involve changing addresses or ports, inviting more participants, and addi... continue reading
  • The Complete Guide to Beginner Lock Picking

    Lock picking
    So you guys want to learn how to pick a lock. Well, look no further! This guide brought to you by will cover all the basics of simple pin tumbler lock picking. :D What is Lock Picking For the purpose of this being a beginners guide, we will simply define lock picking as the ... continue reading
  • How Magnetic Stripes Work

    Have you ever wondered how to build your own credit card emulator, or how to copy card keys? Well, Magspoof displays the basics of understanding and building your own card key spoofer. In this video Samy shows just how simple it is.... continue reading
  • Practical Applications of Directory Traversals

    Website Security
    Null Prerequisites Throughout this paper, many scripting languages will be used to provide proof-of-concept and other examples for the benefit of the reader. A basic understanding of these languages is required in order to completely understand the concepts that are conveyed herein. In addition to... continue reading
  • Cookie-based SQL Injection

    Website Security
    Overview What is Cookie ? A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to a user’s browser and for the browser to return the state information to the origin site. The state information can be used for authentication,... continue reading