Disclaimer: This article talks about port scanning and banner grabbing in NMap, which can be used as precursors to an online attack. This information is for educational and entertainment purposes only and is not to be used for illegal hacking purposes. Disclosing vulnerabilities and exploits is protected by free speech laws, but using such information … Continue reading NMap Experiment: Using a Banner Grabbing Attack to Bypass a Load Balancer
Tag: penetration testing
Generalized Password Cracking, Part 2: Starting with Some Stock Password Attacks
Disclaimer: The present series of posts contains information on how to exploit security vulnerabilities in passwords. It is intended for educational and research purposes only. Neither the password cracking tools described in this series nor any of the exploits developed with these tools are to be used for gaining unauthorized access to accounts or other … Continue reading Generalized Password Cracking, Part 2: Starting with Some Stock Password Attacks
Generalized Password Cracking, Part 1: A Description of the PCL Password Cracking Language
Disclaimer: The present series of posts contains information on how to exploit security vulnerabilities in passwords. It is intended for educational and research purposes only. Neither the password cracking tools described in this series nor any of the exploits developed with these tools are to be used for gaining unauthorized access to accounts or other … Continue reading Generalized Password Cracking, Part 1: A Description of the PCL Password Cracking Language
Exploring Kali Linux
So in this post I started documenting my efforts to learn about offensive security by researching vulnerability reports. In the present post, I will be documenting my efforts to learn about offensive security by exploring a Linux distro designed specifically for that purpose: Kali Linux. Kali is a Linux distro based on Debian. In fact … Continue reading Exploring Kali Linux
Shell Script for Launching a Local Denial-of-Service Attack
Disclaimer: The following article is written for entertainment and educational purposes only. Neither the script shown here nor any of the techniques involved are intended to be used in real life. Launching denial-of-service attacks is illegal and can get you in serious trouble. I do not condone or support any use of such hacking methods … Continue reading Shell Script for Launching a Local Denial-of-Service Attack
Setting Up a Home Hacking Lab
I've been hard at work setting up my new pen-testing lab, which will operate over the network I have set up in my room. This article will be both a documentation of my progress as well as advice for others who wish to set up similar labs in their own homes. The purpose of the … Continue reading Setting Up a Home Hacking Lab
Shared Memory Exploits
So last week I checked out Season 1 of Mr. Robot from the library. It's a series I've been meaning to watch for some time now, because some scenes I've seen suggest that it's really good inspirational hacker material, while other scenes suggest that it's just fodder for dumb normies who want to think they … Continue reading Shared Memory Exploits
The Joy of Hacking
I've been on WordPress for exactly a month now, and so I thought it fitting to make a post that was a little more reflective in nature. I'm going to explore a subject I've thought extensively about... specifically I'd like to talk about what it means to hack, what it means to be a hacker, … Continue reading The Joy of Hacking