In this "HOW TO" I will show you how to install and mange yourself in bugtraq. You will jave to folllow a couple of videos and then you will know everything that you need on how to install and configure bugtraq.
Edward Snowden was a NSA contractor who took information that showed that the NSA is spying on all of us. Now he is in Russia, a man without a country. Should he be celebrated as a whistleblower who showed the world that the NSA is conducting illegal spying on U.S. citizens and citizens of all nations or be be condemned as traitor and send the rest of his life in exile or in prison?
In the first part of this series, we took a factual and technical look at the history of the Internet. I explained how all of these wires and servers got here in the first place. Obviously, a firm did not just create and build the Internet around 1995! Now that we know how the Internet came to be, we can get into the really fun stuff—what the Internet looks like now!
If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC address work together? If you want to hijack sessions and all sorts of lulz like that, you need to understand these concepts. Let's get into it, mates!
In general, hacking and information security is not just one discipline, but a number of them, and today we will look into some of the networking concepts.
Hello! I'm brand new to this forum (just shown by a friend recently) and as a computer science major (freshman year) I'd like to get started in this hacking community. But, there seems to be tons of information on this site and frankly i don't know where to start. Could someone tell me a good place to start out? Anything such as best guides to start with, necessary software, etc. Thanks!
I have injected a SQL injection to a Website Thanks To SKYFOX! But Now i want to change or update a news title in there database. I don't have access to admin password, Can i change it by writing any SQL query in browsers Address bar. If yes please Can you provide the Query & explain in Details i will be thankful to you.???
First off, Rooting Your Device voids the warranty on the device. If you want to root your device but are afraid of "bricking" said device, rooting it may not be good for you.
We all know about PRISM. The Surveillance Program allowing the U.S Government to access private user information. Such as, Google Searches, Tweets, Facebook Posts, Private Images, and other private user data. "Hiding" yourself can be very difficult, but it is possible. I'm here to show you How to Become Anonymous & Browse the Internet Safely.
Whether or not you believe that the government is snooping around in our private emails, texts, and phone calls, it wouldn't hurt to protect ourselves a little better in the digital realm.
Since The Guardian published leaked documents exposing the depth of the NSA's spying powers, many people who've never put much effort into protecting their privacy are finally starting to pay attention.
There has been much talk about how unsecure the cloud is because of PRISM's newfound ability to demand all of your data without any resistance. This has spin doctors in the Cloud Storage industry losing their mind. They suddenly went from a central hub for 10GB of your files, to an easy window for Big Brother to track you through. Centralized cloud storage is no longer a safe way to keep your files, but we still need a way to access our files anywhere we go.
It has been suggested by some leading figures in information security that if you have been hacked (say by a cyber crime organization) that you should be able to hack back or retaliate on THEIRr computers. This certainly would be great for us hackers as it would give us a legal and legitimate use of our talents.
What do you think the U.S. and other nations that are victims of Chinese state hacking of intellectual property and national secrets do about this activity?
Welcome back my fellow army of hackers! Today we'll be hacking a website. Hacking is technically not the right word used here. It should be defacing! So we are going to deface a website...
Welcome back my precious hackerians. Today i would like to promote an OS which i have been using for the past couple months. I'm not talking about Backtrack 5 or Kali Linux. Something even more promising:
I'm still amazed by all the things some people just don't know. Script-kiddies often refer to Metasploit if someone asks them how to hack a computer because they think there's simply no other way. Well here I am today trying to increase your set of tools and -of course- skills.
Welcome back, my fellow hackerians! Today we'll be hacking Facebook profiles on your local network. You may think, "How is this useful, nobody but me is using my network." Well, you can use this on other Wi-Fi networks that are available for free (like at Starbucks) and crack their precious Facebook profile!
When i went to class today, a good friend asked me a question. He wanted to know what the best hacking software was to basically do everything. What i told him was this: Well there isn't an "Ultimate" tool boot there are a number of tools which deserve a "Medal." So what i'm trying to say here... What are some of the best hacking tools available right now? For starters i created a list with some of the tools.
With more people joining the internet scene each day it's important that it's security is.. well it has to be good. Of course everything can be hacked and that's the way hackers work. They know there IS a vulnerability but they don't don't know the rest. in this article i'll try to explain the big difference between HTTP and HTTPS
So i recently became aware of the fact that famous VoiP client Skype which is part of Microsoft has indeed an backdoor service which monitors our chats when we send certain keywords. What do you guys think about this? Can we even trust any IM?
Ok, so I would like to know how to find out IP address of a remote computer over internet. I know about getting the user to my site and logging their IP address, but I am looking forward to more intuitive method of getting the target's IP. Directing the user to my site is not the best way to get the IP for instance the user will get suspicious when asking hit to visit a site for no obvious reason, moreover anyone with even a slight knowledge would figure out the reason. Also it fails if target...
Hackers have long been associated with illegal activity. In recent years, security firms have been hiring hackers to perform penetration tests to test the security profile of companies' IT systems. Now, governments around the world are trying to hire hackers for cyber warfare activity as well as anti-terrorism efforts.
Hi guys! I have been wondering about something with Metasploit. When I download Metasploit, it asks for the port, days of validity, and server name, what does this mean for my router? Will it cost extra? Will it show up as a opened port on the router? Sorry if this sounds newbie, I am new to this, and I would like help so I can get better.
If you weren't aware, all music purchased online through iTunes, Amazon, and other digital audio providers have information embedded that can be used to identify the buyer and transaction of the digital music file. This may seem like something you should be disclosed about in their terms of use, but it's not.
With portable devices being a necessity in modern everyday life, they may be subject to overuse, improper charging, or normal wear and tear. For those people who carry around their smartphone or iPod with them all of the time, how many times have you been out and about just to have your portable device die on you?
Every Windows system includes command prompt; and while a lot of people on Null Byte and WonderHowTo in general know how to use it, some people don't know anything about it, even how to access it.
I see that there are a lot of people that want to install and try the Aircrack-ng program for wireless auditing. But have problems because their Linux knowledge isn't that great. This How-To video tutorial explains step by step exactly what you have to do. No loud background music.
We go to such great lengths to secure our smartphones. We put passwords on our lock screens, encrypt our data, and install anti-theft programs, but it's never enough—someone, somewhere, will find a way around any protective measure you use, no matter how sophisticated.
I Know Alot of Ways to Hack into Computers Over LAN but I Can't Find a Way to Hack Over WAN Is There Any Good Tutorial? Or Any Exploit That Can Help Me?
In my last hack blog on crashing your roommates Win7 system, we started looking at client- side attacks. As promised, we will be looking at some more client-side attacks.
The creation of private browsing was brought upon by the backlash against ad tracking and other ways that sites and agencies take away users' privacy online. People were tired of getting spammed with ads for Vitamin C pills simply because they visited WebMD. Private browsing is now built into all of the major browsers and is used frequently.
No matter how many PSAs are published on the topic, studies continue to show that we are generally terrible at creating secure passwords and PINs. Using the same password (or variations of it) for multiple sites is another huge no-no that the majority of people ignore, and even though you should change your passwords frequently, most of us don't.
So the folks over at Darchoods are cool with us resting our virtual presences over there again, chatting it up and shooting the shit. If we want this to be any good though I'ld like a few people to OP the channel though. If you would like OP status in our new channel, please say so in the comments below. In your comment please include your nick, registered on irc.darchoods.net, and a reason/experience as an IRC OP. I myself have very little, I would prefer an emissarial role. Anywho, hope to...
Yes, here it is, the time of the year we have all been waiting for. The time where things are dropping in price faster then one might imagine. Let me explain what I mean, it is near mid November and it is almost December. That's right I am talking about Shopping Season. Well to head off this fantastic shopping season I have comprised a list of places to look for that gift for that special tech lover or a gift just for you and your computer. This list is based off of a consumer who lives in the...
Hello everyone, I have been reading and going to this site for a few months now and I finally joined. I always read great articles in the Grey Hat aspect of this site, and i have been inspired to dive deeper into the culture of hacking and programming. I want to know how to hack, but i do not know where to begin. I am a pretty decent programmer in HTML, and i am beginning to learn how to program in Python and Javascript. I am hoping that someone will be able to show me the basics of hacking, so...
I currently have a macbook pro, and I am getting a new one with an i7 and 8g of ram. I have also found an old HP laptop. I think it's a D6. I just want to learn a bit about hacking. What would you guys recommend for an Operating System? Linux, XP or Mountain Lion?