Hacking

The breach attack

Back in 2012, when Juliano Rizzo and Thai Duong announced the CRIME attack, a TLS / SSL Compression attack against HTTPS, the ability to recover selected par

System address map initialization in x86/x64 architecture part 1: PCI-based systems

This article serves as a clarification about the PCI expansion ROM address mapping, which was not sufficiently covered in my "Malicious PCI Expansion ROM" ar

Online dictionary attack with Hydra

When an attacker wants to learn credentials for an online system, he can use brute force or a dictionary attack. This article introduces these two types of a

Penetration testing of web services with CGI support

This article shows hands-on penetration testing using an Apache server with CGI access; it identifies some vulnerabilities and performs exploits attacking th

OSINT (Open-Source Intelligence)

With an estimated 80% of required information available for use in an open source for specific information vital for a deep analysis in newspapers, magazines

Keygenning: Part I

Introduction : A key generator or a Keygen is a computer program that will generate a valid « Product Serial or Key » in order to completely register a soft

CBC byte flipping attack—101 approach

As usual, there are some explanations about this attack out there (see references at the end), but some knowledge is required to understand it properly, so h

Dictionary attack using Burp Suite

Nowadays internet usage is growing dramatically because of this, a vast majority of companies and individuals that provide services have a website so custome

Keyloggers: How they work and more

Below is a graphic that enumerates some methods of password pilfering, which serves as an introduction to the matter discussed: [pkadzone zone="main_t

Hacker proofing Apache & PHP configuration

SECURING APACHE Apache has been truly one of the dominant web servers of the World Wide Web. It's one of the best open source projects, Web Server for b