Search
Hacking Fundamentals
Articles and tutorials dedicated to conveying the basic skills and knowledge that every hacker needs to acquire.

5 min read
Networking Basics for Hackers, Part 1
With our dramatic growth over the last year, we have added many new aspiring hackers who are still lacking in the basics of network and...
15,937 views


5 min read
Networking Basics for Hackers, Part 2
In the first part of this series, I introduced you to the basics of networking including IP addresses, ports, NAT, and DHCP. In this...
5,868 views


5 min read
Introduction to Regular Expressions (regex)
Welcome back, my aspiring cyber warriors! This next subject might seem a bit obscure to the uninitiated--but I promise-- this lesson will...
3,752 views


4 min read
Basics of Hexadecimal
It has become clear from some of your questions that quite a few of you are unfamiliar with the hexadecimal system, or simply, hex. The...
3,149 views


4 min read
The Hacker Methodology
Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight...
7,304 views

4 min read
Netcat, the All- Powerful
Netcat, the All- Powerful ​ Netcat is one of those few tools--like nmap, Metasploit, Wireshark and few others-- that every hacker should...
15,417 views


4 min read
Basics of XORing
In a recent tutorial, I showed you how to use shikata_ga_nai to change the signature of a payload to evade detection by security devices...
4,265 views


4 min read
Hacker Fundamentals: The Basics of XOR-ing
Welcome back, my aspiring cyber warriors! In a recent tutorial in my Metasploit series, I showed you how to use shikata_ga_nai to change...
1,518 views


4 min read
Windows Remote CMD Commands for Hacking
Many new hackers come from a Windows background, but seldom--if ever--use its built-in command-line tools. As a hacker, you will often be...
10,546 views