Reverse-Engineering a Linux Process with strace

The pill you took is part of a trace program. It's designed to disrupt your input/output carrier signals so we can pinpoint your location. And just like that, we can trace signals as they bounce around the Matrix, whether it's the Matrix that simulates Earth in 1999 or the Matrix that generates pretty pictures on … Continue reading Reverse-Engineering a Linux Process with strace

NMap Experiment: Using a Banner Grabbing Attack to Bypass a Load Balancer

Disclaimer: This article talks about port scanning and banner grabbing in NMap, which can be used as precursors to an online attack. This information is for educational and entertainment purposes only and is not to be used for illegal hacking purposes. Disclosing vulnerabilities and exploits is protected by free speech laws, but using such information … Continue reading NMap Experiment: Using a Banner Grabbing Attack to Bypass a Load Balancer

Generalized Password Cracking, Part 2: Starting with Some Stock Password Attacks

Brute-force password cracking attack

Disclaimer: The present series of posts contains information on how to exploit security vulnerabilities in passwords. It is intended for educational and research purposes only. Neither the password cracking tools described in this series nor any of the exploits developed with these tools are to be used for gaining unauthorized access to accounts or other … Continue reading Generalized Password Cracking, Part 2: Starting with Some Stock Password Attacks

Generalized Password Cracking, Part 1: A Description of the PCL Password Cracking Language

Cracking passwords with the PCL password cracking language

Disclaimer: The present series of posts contains information on how to exploit security vulnerabilities in passwords. It is intended for educational and research purposes only. Neither the password cracking tools described in this series nor any of the exploits developed with these tools are to be used for gaining unauthorized access to accounts or other … Continue reading Generalized Password Cracking, Part 1: A Description of the PCL Password Cracking Language

Exploring Kali Linux

So in this post I started documenting my efforts to learn about offensive security by researching vulnerability reports. In the present post, I will be documenting my efforts to learn about offensive security by exploring a Linux distro designed specifically for that purpose: Kali Linux. Kali is a Linux distro based on Debian. In fact … Continue reading Exploring Kali Linux

Shell Script for Launching a Local Denial-of-Service Attack

Shell script to launch a local denial-of-service attack

Disclaimer: The following article is written for entertainment and educational purposes only. Neither the script shown here nor any of the techniques involved are intended to be used in real life. Launching denial-of-service attacks is illegal and can get you in serious trouble. I do not condone or support any use of such hacking methods … Continue reading Shell Script for Launching a Local Denial-of-Service Attack

Uses for Reverse Engineering: Debugging C Code with a Disassembler

One thing I like about C programming for the DOS prompt is that when there's a run time error, a whole collection of debugging information gets dumped to the console. This can be very useful in diagnosing errors, as opposed to the Unix command line, where all you get is a not-so-descriptive message like "Segmentation … Continue reading Uses for Reverse Engineering: Debugging C Code with a Disassembler

10 Forms of Hacking That Are Totally Legal

Disclaimer: The following article is written for entertainment purposes only and should not be taken as official legal advice. It provides no guarantee that the exploits listed are legal in your jurisdiction or that they are legal in every context, only that the author has been able to do them openly without getting arrested. Consult … Continue reading 10 Forms of Hacking That Are Totally Legal

Setting Up a Home Hacking Lab

I've been hard at work setting up my new pen-testing lab, which will operate over the network I have set up in my room. This article will be both a documentation of my progress as well as advice for others who wish to set up similar labs in their own homes. The purpose of the … Continue reading Setting Up a Home Hacking Lab

More Assembly Code Hacking: Deciphering the Program Setup

The "Hello World" program I started disassembling in the last article has a fuck-ton of subroutines, surprising considering that the source code only had one. I am now making an effort to decipher and document all of them and figure out the exact course of system calls made in the execution of a printf() statement. … Continue reading More Assembly Code Hacking: Deciphering the Program Setup