Vote Now! Top Ten Web Hacking Techniques of 2011
Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we’re talking about actual new and creative methods of Web-based attack.
2600: The Hacker Quarterly
How To Become A Hacker
Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?".
The Open Organisation Of Lockpickers
This is a repository of the most up-to-date versions of Deviant's lock diagrams and animations. Seen in all of the TOOOL educational materials and slide decks, these files are all released under the Creative Commons license. You are free to use any of them for non-commercial purposes, as long as they are properly attributed and the same freedom for others is maintained in all derivative works. Please note that these diagrams have evolved and developed over time. While Deviant is still proud of the older versions of his images, if you still have copies of legacy material they should all be replaced with the latest versions available here.
NEW!!!! Destroy someone's Computer! : OFF Topic
vampyre is right.1. LIL DEVIL IS AN A-HOLE2. THAT IS HACKING WHICH IS ILLEGAL3. LIL DEVIL IS AN A-HOLE X10= ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE 4. IF YOU ACTUALLY DID THAT, YOU WOULD BE MORE OF AN ASS5.
Ok, here's a new quick tutorial for everyone who has been having to deal with Facebook blocking your entrance into someone's account due to logging in from a different location. Ever since I had been problems constantly having to deal with Facebook leaving me out off people's accounts I began to think that I should write over my experiences to help others. I will go over specific techniques and ideas to eventually grant you entrance to their accounts without having to deal with that Facebook problem having logging in from different location. 1. Before you even begin reading this, you must already have their passwords or e-mails.
Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist
Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe)
How to Pick a Lock with a Bump Key
The point that many people miss is that bump keys and lockpicks allow access to an area without any obvious sign of forced entry. This allows for long term theft, especially in an office or retail situation where high value items may be stored in a supposedly secure area and not be missed for some time, but where attempting to force a lock would bring immediate attention. If my wife comes home to a lock drilled off the door, she going to call the police. If an intruder uses a bump key, she could be totally unaware that someone was lurking inside.