Hacking

Circumventing NAT with UDP hole punching

A lot of networks use NAT (Network Address Translation) these days. This allows the systems on the same network to have a single global IP address. This also

pcAnywhere Leaked Source Code - An Anonymous Review

[highlight color=yellow]DISCLAIMER: InfoSec Institute received an anonymous submission concerning the leaked pcAnywhere source code. The article is published

Virtualization Security: Hacking VMware with VASTO

With the advancement of the technology in the field of computers, requirement for hybrid setups has also escalated. Nowadays every company is using a heterog

A New DNS Exploitation Technique: Ghost Domain Names

DNS is a naming system which coverts human readable domain names into computer readable IP addresses. Whenever there is a query for a domain which is not in

Attacking the Phishers: An Autopsy on Compromised Phishing Websites

In this article we will cover the results of an informal investigation I performed into phishing websites. Rather than simply reviewing them externally as

Creating backdoors using SQL injection

If you're reading this article than I'm reasonably sure that you have heard of a virus, otherwise refered to as a Trojan horse or worm, which can infect your

Hacking In The World’s Largest Mall

Figure 1. Yes there is a ship in the mall, and a whole bunch of wireless[pkadzone zone="main_top"] [pkadzone zone="main_top"] Much has been made in the medi

Hacking web authentication - Part 2

In the first part of this article we looked at some of the common authentication types used in Web Applications these days and discussed their pros and cons.

The THC SSL DoS Threat

Ever since computers became ubiquitous and affordable they have attracted malicious users as well as those who use computers for altruistic purposes. These malicious users– sometimes called “black hats” or “crackers”– often try and take servers, desktops or entire networks offline using something called a Denial of Service attack or “DoS.”

Fuzzing: Mutation vs. generation

Many of you have undoubtedly come across the word "Fuzzing" and wondered about it. But if you have ever tried modifying some parameter; some sort of input/ar