Hacking

How do I go about hacking file transfer protocol? Part I

Usually, I write about human resource management, risk assessment and project estimation almost every day, but from time to time, I get an e-mail from InfoSe

Handy Devices Revolution: Handy Pentesting & Hacking Part 1

A few weeks ago, I wrote an article entitled 'Transforming your Android Phone into a Network Pentesting Device' which is obviously about turning your Android

Exceptions In Injected Code

Injection and API Hooking - When you don't know enough to know that you are getting it wrong... Code Injection and API hooking techniques are gaining in pop

Eight Handy Security Tools for a Novice

Here is a compilation of a few tools that we need to be aware of. The power, the performance and the capabilities of these tools are limited only to the crea

Backtrack 5 R3 Walkthrough, Part 4

DHCPig DHCPig is a very nice and handy little tool used to carry out an advanced DHCP exhaustion attack. It does this by grabbing all the IP addresses in it

Executable Code Injection

Introduction Code injection is a process of injecting executable code in a running process or static executable. Executable code in web applications can be i

Backtrack 5 R3 Walkthrough - Part 3

In this article we will we look at some of the other new tools that were added into Backtrack 5 with the release of its latest version R3. Wifite [pkad

The easier form of hacking: Social engineering

When we talk about hacking, especially in today's world, we hear the media giving us the stories of how hackers hack into a database and steal information fr

Hacking SVN, GIT, and Mercurial

We all know that when programming with a small or large team, having a revision control in place is mandatory. We can choose from a number of revision contro

Transforming your Android Phone into a Network Pentesting Device

Lester: Hey Nash, are you scanning our school's network with just your smartphone? Nash: Well, yes I am! I'm using a network penetration suite just to check