Hacking

25 ways to become the ultimate script kiddie

You do not need to learn C, C++, C#, Python, Perl, PHP, Assembly and other computer programming languages since Kali, Parrot OS, and Backbox Linux have s

Fifteen Famous Bug Bounty Hunters

Fifteen Famous Bug Bounty Hunters For today’s article, let us acknowledge fifteen famous and 1337 bug bounty hunters who have been the talk of the web. This

Buffer overflow & format string attacks: More basics

In the previous article we learned about the basics of buffer overflow, how attackers exploit this vulnerability, and then various defenses that can be put a

The Most Hacker-Active Countries

Section 1. Introduction The major figures in computer-related cyber-crimes, hackers and their networks, regularly explore and exploit weaknesses in computer

Buffer overflow and format string attacks: the basics

I have come across various analysts who want to learn how buffer overflow and format string attacks actually occur. Articles we read on the web are usually a

Netcat uses

Netcat is one of the most common tools used by hackers to exploit systems. It runs on a variety of systems including Windows, Linux, Solaris, etc. Netcat com

How to acquire a user’s facebook credentials, using the credential harvester attack

In this article you will see how you can obtain a user's Facebook credentials without him suspecting a thing. There are going to be provided two versions of

Clickjacking, Cursorjacking & Filejacking

Same origin bypasses using clickjacking Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a

Spoof using right to left override (RTLO) technique

In this article we will learn about the one of the most overlooked spoofing mechanisms, known as right to left override (RTLO). What is RTLO? RIGHT TO LEFT

Cracking NQ vault step by step

The mobile encryption app NQ Vault has been in the news for bad reasons. Mobile encryption apps are commonly used to prevent access to sensitive data on the