Hacking

From local file inclusion to code execution

Local File Inclusion (LFI) is one of the most popular attacks in Information Technology. In this article, we are not going to focus on what LFI attacks are o

Hacking tools with Python: Part one

Python is a brilliant language. It is known to be a lazy programming language that can be used to write codes small in number of lines, but able to do huge t

Hacker tools: Sniffers

In this article we will take a look at the well known the concept of hacker tools - packet sniffing, how do they work, what are their common uses and then we

How to exploit XSS with an image

Cross-Site Scripting is one of the most common and powerful vulnerabilities on the Web. The OWASP organization has classified it in the third place in the

Hacking and gaining access to Linux by exploiting SAMBA service

Step 1 First, we need to find out the ports and services running on the target system. To find the open ports and services, the command is: Command: nma

DNS hacking (beginner to advanced)

DNS is a naming system for computers that converts human-readable domain names e.g. (infosecinstitute.com) into computer-readable IP-addresses. However, some

Password cracking using Cain & Abel

According to the official website, Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kinds of p

Hacking tools: Web application hacking tools

Certain tools are essential if you want to hack a web application. Knowledge is key in everything, and this involves hacking. To hack websites as well as web

ICMP reverse shell

What are shells? Shell can simply be described as a piece of code or program which can be used to gain code or command execution on a device (like servers

Exploiting X11 unauthenticated access

In this article, we are going to see how to exploit the x11Server Unauthenticated Access vulnerability which is associated with the CVE-1999-0526. How bad i