top of page
1 min read
Anti-Forensics: Avoiding the Pitfalls of Reality Winner
This past week, NSA contractor Reality Winner, was caught and arrested for leaking information to the Interecept. This was evidence that...
676 views
6 min read
Exploit Development, Part 2: Writing a Simple Buffer Overflow
I. Introduction In the previous lesson in this module, we explored the basics of buffer overflows. We defined buffer overflows and looked...
2,972 views
3 min read
Digital Forensics, Part 9: Extracting EXIF Data from Graphics Files
In many cases when a computer, phone, or mobile device is seized for evidence, the system will have graphic images that might be used as...
10,886 views
7 min read
Linux for Hackers, Part 8: Managing the User Environment
Managing the User Environment Among the areas that Linux newcomers find problematic, managing the user environment variables might be the...
4,774 views
4 min read
Browser Exploitation Framework (BeEF), Part 1
There are multitude of ways to exploit a target's system. Newbie hackers often focus on the operating system or applications, but few...
8,426 views
5 min read
Hacking DNS to Re-Direct Anyone on your LAN to your Website
There are SOOOO many ways to hack a system or network, which means you need to think creatively in order to be successful. Many novice...
33,982 views
3 min read
Web App Hacking, Part 5: Enumerating Users and Bruteforcing Passwords on Wordpress Sites
Welcome back, my newbie hackers! In previous articles this section, I showed you how to find WordPress sites and how to identify the...
21,187 views
3 min read
Scraping Potential Passwords from a Target's Website using CeWL
Welcome back, my novice hackers! In my series on cracking passwords, I began by showing off some basic password-cracking principles;...
8,036 views
7 min read
Advice from a Professional Hacker: The 12 Best Hacker Movies of All Time
As a movie buff AND a professional hacker, I love the opportunity to combine my passions, so I have decided to review the best hacker...
7,595 views
4 min read
Website Scraping, Part 1: Email Scraping for Hackers
As a pentester/hacker, gathering email addresses from potential victims can have a multitude of uses. When we have email addresses of key...
3,711 views
bottom of page