Exploring Kali Linux

So in this post I started documenting my efforts to learn about offensive security by researching vulnerability reports. In the present post, I will be documenting my efforts to learn about offensive security by exploring a Linux distro designed specifically for that purpose: Kali Linux. Kali is a Linux distro based on Debian. In fact … Continue reading Exploring Kali Linux

Shell Script for Launching a Local Denial-of-Service Attack

Shell script to launch a local denial-of-service attack

Disclaimer: The following article is written for entertainment and educational purposes only. Neither the script shown here nor any of the techniques involved are intended to be used in real life. Launching denial-of-service attacks is illegal and can get you in serious trouble. I do not condone or support any use of such hacking methods … Continue reading Shell Script for Launching a Local Denial-of-Service Attack

Uses for Reverse Engineering: Debugging C Code with a Disassembler

One thing I like about C programming for the DOS prompt is that when there's a run time error, a whole collection of debugging information gets dumped to the console. This can be very useful in diagnosing errors, as opposed to the Unix command line, where all you get is a not-so-descriptive message like "Segmentation … Continue reading Uses for Reverse Engineering: Debugging C Code with a Disassembler

10 Forms of Hacking That Are Totally Legal

Disclaimer: The following article is written for entertainment purposes only and should not be taken as official legal advice. It provides no guarantee that the exploits listed are legal in your jurisdiction or that they are legal in every context, only that the author has been able to do them openly without getting arrested. Consult … Continue reading 10 Forms of Hacking That Are Totally Legal

Setting Up a Home Hacking Lab

I've been hard at work setting up my new pen-testing lab, which will operate over the network I have set up in my room. This article will be both a documentation of my progress as well as advice for others who wish to set up similar labs in their own homes. The purpose of the … Continue reading Setting Up a Home Hacking Lab

More Assembly Code Hacking: Deciphering the Program Setup

The "Hello World" program I started disassembling in the last article has a fuck-ton of subroutines, surprising considering that the source code only had one. I am now making an effort to decipher and document all of them and figure out the exact course of system calls made in the execution of a printf() statement. … Continue reading More Assembly Code Hacking: Deciphering the Program Setup

Reverse-Engineering a Windows PE Binary

I'm excited, guys! I just made my first real foray into the guts of an executable file à la reverse-engineering with the Interactive Disassembler (IDA) from Hex-Rays. I'm using the freeware version of IDA, which means I don't get any tech support, so I've had to mostly figure out how to do everything myself (although … Continue reading Reverse-Engineering a Windows PE Binary

Getting Information on People the 1337 H4xx0r Way

There are a lot of ways to get information on people through computers, ranging from amateurish methods like stalking someone's Facebook profile to methods that require a little more technical know-how. In this tutorial I'm going to focus on reconnaissance methods that harness clever tech tricks and hacks that not everyone knows about. I wouldn't … Continue reading Getting Information on People the 1337 H4xx0r Way

Shared Memory Exploits

So last week I checked out Season 1 of Mr. Robot from the library. It's a series I've been meaning to watch for some time now, because some scenes I've seen suggest that it's really good inspirational hacker material, while other scenes suggest that it's just fodder for dumb normies who want to think they … Continue reading Shared Memory Exploits

Hacking Image Files – With a Hex Editor

So recently I've been doing some SEO research for my site. This research basically consists of searching for my own pages on Google to see what's been indexed and how the pages rank. One problem that I want to solve is Google's penalizing of duplicate or old content. In the case of images, if I … Continue reading Hacking Image Files – With a Hex Editor