5 min readHACKING FUNDAMENTALSNetworking Basics for Hackers, Part 1With our dramatic growth over the last year, we have added many new aspiring hackers who are still lacking in the basics of network and...
5 min readHACKING FUNDAMENTALSNetworking Basics for Hackers, Part 2In the first part of this series, I introduced you to the basics of networking including IP addresses, ports, NAT, and DHCP. In this...
5 min readHACKING FUNDAMENTALSIntroduction to Regular Expressions (regex)Welcome back, my aspiring cyber warriors! This next subject might seem a bit obscure to the uninitiated--but I promise-- this lesson will...
4 min readHACKING FUNDAMENTALSBasics of HexadecimalIt has become clear from some of your questions that quite a few of you are unfamiliar with the hexadecimal system, or simply, hex. The...
4 min readHACKING FUNDAMENTALSThe Hacker MethodologyMany newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight...
4 min readHACKING FUNDAMENTALSNetcat, the All- PowerfulNetcat, the All- Powerful Netcat is one of those few tools--like nmap, Metasploit, Wireshark and few others-- that every hacker should...
4 min readHACKING FUNDAMENTALSBasics of XORingIn a recent tutorial, I showed you how to use shikata_ga_nai to change the signature of a payload to evade detection by security devices...
4 min readHACKING FUNDAMENTALSWindows Remote CMD Commands for HackingMany new hackers come from a Windows background, but seldom--if ever--use its built-in command-line tools. As a hacker, you will often be...