Hacking

LUKS: Swap, Root and Boot Partitions

The /swap Partition We need to encrypt the swap partition, since we don't want encryption keys to be swapped to an unencrypted disk. To do that we can first

Hello world: C, assembly, object file and executable

Summary: In this article we'll take a look at the C program that prints "Hello World!" to the screen, which we'll assemble and compile. Then we'll compare th

Handy Devices Revolution: Handy Pentesting and Hacking Part III

And now is the time for the third article of the Handy Devices Revolution series! In the second article we talked about Arduino and Power Pwn; this time we w

Wireshark

A network sniffer or protocol analyzer is a software application or hardware device which is capable of intercepting traffic and logging it for further analy

Google Hacking with GGGoogleScan

When scraping the Google search engine, we need to be careful so that Google doesn't detect our automated tool as a bot, which will redirect us to a captcha

Tutorial on SQLi Labs

  Structured Query Language, also known as SQL, is basically a programming language that deals with databases. For beginners, databases are simply dat

Calling Conventions

Introduction Calling conventions are used by all programs without the user even realizing it. But before saying more about them, we must first make sure we u

How do I go about hacking FTP? Part III

Oh boy, this whole series about FTP hacking is really getting long. There's just too much information to cover in just one article. In fact, if you ever have

SQL Injection Through SQLMap Burp Plugin

Hai folks, This article gives you an overview of SQLMAP, an SQL injection tool used for detecting and exploiting the SQLI. What is SQLI? SQL Injection is a w

How do I go about hacking file transfer protocol? Part II

In the previous part of this article series, we introduced the topic of FTP security, and the basics of how the protocol works. After reading that previous a