Hacking and Security Articles
Unity3D attack by reverse engineering.
Games are a great way to kill the time and most of you probably already played video games. Some of you have already been tempted to cheat in video game because somehow, they find it funnier like this. There is a lot of kind of games over internet. Some of them are even playable under y... continue reading
What is SSL and how does it protect you online?
What is SSL?
SSL (Secure Sockets Layer) is a protocol that operates directly on top of TCP. Due to this higher layer protocols, such as HTTP, can continue to work unchanged while providing enhanced security.
What protection is offered?
When implemented correctly SSL disguises the contents of packet... continue reading
Cracking ZIP Files (known-plaintext attack)
Steganography & encryption
Did you find an old zip file while browsing your documents? Does it contain important information? You try to extract it, but a window pops up asking for a password. What if you don't remember that password? Of course, you will try to brute-force it, but, damn, that's a lot of combinations. It will ... continue reading
Password Generation and Safe Offline Storage
1. Password generating
How to generate the ultimate password and store it offline as safely as possible.
* charset: a-zA-Z0-9!@#$%...
* alphabets: cyrillic, latin, hebrew, greek, syllabic etc.
!NB Do not use alt symbols. They are often misread unsupported by most boards a... continue reading
A Basic Introduction to Cross-Site Scripting (XSS)
Cross Site Scripting (XSS) attacks occur when a website fails to properly prevent attackers from inserting malicious code into an area that takes user provided data, such as form fields on a webpage, HTTP headers, URLs etc. This code is then used to attack other users, rather than the actual website... continue reading