NMap Experiment: Using a Banner Grabbing Attack to Bypass a Load Balancer

Disclaimer: This article talks about port scanning and banner grabbing in NMap, which can be used as precursors to an online attack. This information is for educational and entertainment purposes only and is not to be used for illegal hacking purposes. Disclosing vulnerabilities and exploits is protected by free speech laws, but using such information … Continue reading NMap Experiment: Using a Banner Grabbing Attack to Bypass a Load Balancer

Generalized Password Cracking, Part 2: Starting with Some Stock Password Attacks

Brute-force password cracking attack

Disclaimer: The present series of posts contains information on how to exploit security vulnerabilities in passwords. It is intended for educational and research purposes only. Neither the password cracking tools described in this series nor any of the exploits developed with these tools are to be used for gaining unauthorized access to accounts or other … Continue reading Generalized Password Cracking, Part 2: Starting with Some Stock Password Attacks

Generalized Password Cracking, Part 1: A Description of the PCL Password Cracking Language

Cracking passwords with the PCL password cracking language

Disclaimer: The present series of posts contains information on how to exploit security vulnerabilities in passwords. It is intended for educational and research purposes only. Neither the password cracking tools described in this series nor any of the exploits developed with these tools are to be used for gaining unauthorized access to accounts or other … Continue reading Generalized Password Cracking, Part 1: A Description of the PCL Password Cracking Language

Exploring Kali Linux

So in this post I started documenting my efforts to learn about offensive security by researching vulnerability reports. In the present post, I will be documenting my efforts to learn about offensive security by exploring a Linux distro designed specifically for that purpose: Kali Linux. Kali is a Linux distro based on Debian. In fact … Continue reading Exploring Kali Linux

Shell Script for Launching a Local Denial-of-Service Attack

Shell script to launch a local denial-of-service attack

Disclaimer: The following article is written for entertainment and educational purposes only. Neither the script shown here nor any of the techniques involved are intended to be used in real life. Launching denial-of-service attacks is illegal and can get you in serious trouble. I do not condone or support any use of such hacking methods … Continue reading Shell Script for Launching a Local Denial-of-Service Attack

Setting Up a Home Hacking Lab

I've been hard at work setting up my new pen-testing lab, which will operate over the network I have set up in my room. This article will be both a documentation of my progress as well as advice for others who wish to set up similar labs in their own homes. The purpose of the … Continue reading Setting Up a Home Hacking Lab

Getting Information on People the 1337 H4xx0r Way

There are a lot of ways to get information on people through computers, ranging from amateurish methods like stalking someone's Facebook profile to methods that require a little more technical know-how. In this tutorial I'm going to focus on reconnaissance methods that harness clever tech tricks and hacks that not everyone knows about. I wouldn't … Continue reading Getting Information on People the 1337 H4xx0r Way

Forensics Tool to Detect Encrypted Files

Well shit, looks like I haven't posted in about two weeks. I really didn't mean to do that. This absence was entirely unplanned and served no real purpose. But here I am again, and I'll try to update on a semi-daily basis for the forseeable future. Oh, and it looks like I'm getting regular hits … Continue reading Forensics Tool to Detect Encrypted Files

Shared Memory Exploits

So last week I checked out Season 1 of Mr. Robot from the library. It's a series I've been meaning to watch for some time now, because some scenes I've seen suggest that it's really good inspirational hacker material, while other scenes suggest that it's just fodder for dumb normies who want to think they … Continue reading Shared Memory Exploits

The Joy of Hacking

I've been on WordPress for exactly a month now, and so I thought it fitting to make a post that was a little more reflective in nature. I'm going to explore a subject I've thought extensively about... specifically I'd like to talk about what it means to hack, what it means to be a hacker, … Continue reading The Joy of Hacking