Search


7 min read
Cryptography Basics for Hackers, Part 1
Welcome back, my aspiring cyberwarriors! As cyberwarriors, we are often faced with the hurdle or promise of cryptography and encryption....
2,941 views


5 min read
Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)
Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
70,652 views


3 min read
Android Hacking, Part 2: How to Embed a Backdoor into an Android APK
Welcome back, my fledgling hackers! Mobile devices--smartphones and tablets--are proliferating around the world and slowly overtaking...
46,480 views


5 min read
Database Hacking, Part 3: Using sqlmap for SQL Injection Against MySQL and WordPress
SQL Injection is one of the most important and common attacks on web sites. Nearly every website has a database behind it containing...
78,450 views