background preloader

Null Byte - The aspiring grey hat hacker / security awareness playground « Wonder How To

Null Byte - The aspiring grey hat hacker / security awareness playground « Wonder How To

Packet Injection Basics Presentation Description: The Packet Injection basics presentation is an in-depth tutorial on various packet injection programming techniques. We will look at how to construct various headers and then bunch them together to form a complete packet and then how to send this packet over the network. This presentation is a necessary pre-requisite for all the other packet injection videos in this tutorial series. Links:<br><br>1. Raw sockets basics presentation <br><br>2. Tags: programming , Disclaimer: We are a infosec video aggregator and this video is linked from an external website. Comments:

64 Things Every Geek Should Know - laptoplogic.com The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. 1. USB – Universal Serial Bus GPU – Graphics Processing Unit CPU – Central Processing Unit SATA – Serial ATA HTML – Hyper-text Markup Language HTTP – Hypertext Transfer Protocol FTP – File Transfer Protocol P2P – Person to Person data sharing 2. If you rolled your eyes here, that is a good thing. 3. Here’s what one looks like: 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.

Some 15 Awesome Widescreen Abstract Wallpapers by Humza / October 29, 2011 In this post we have wound up some really amazing abstract wallpapers. The special thing is the fact that majority of these wallpapers are huge, 1920×1200 resolution or so to fit your widescreens perfectly. We hope you love what we collect and share. The credit goes to the following artists: Bruno Kenzo, David Fuhrer, Casperium, Jason Benjamin, BOBBb12345, NKeo, skam4 Irongeek.com Recommended Reading for Developers Code Complete 2 Steve McConnell's Code Complete 2 is the Joy of Cooking for software developers. Reading it means that you enjoy your work, you're serious about what you do, and you want to keep improving. In Code Complete, Steve notes that the average programmer reads less than one technical book per year. The very act of reading this book already sets you apart from probably ninety percent of your fellow developers. I like this book so much that the title of this very website is derived from it – the examples of what not to do are tagged with the "Coding Horror" icon. The Mythical Man-Month: Essays on Software Engineering, Anniversary Edition (2nd Edition) Arguably the only classic book in our field. I challenge any developer to pick up a copy of The Mythical Man Month and not find this tale of a long-defunct OS, and the long-defunct team that developed it, startlingly relevant. Don't Make Me Think: A Common Sense Approach to Web Usability Er… yeah. Rapid Development Why?

Creating Truly Powerful Batch Files By Brien M. Posey, MCSE Published in TechRepublic's Windows NT Administrator Report At first glance, the Windows NT® command prompt appears to be just another MS-DOS window. The Power of the Question Mark Because the whole point of this article is to show you how to build truly powerful batch files, we should show you how to figure out which commands to use. Figuring out the necessary command is easier than you might think. Figure A: Find the filename and the location of the utility you wish to automate. Now that you know the filename and location for the utility you need to use, you can create a batch file command that calls the utility. Go to your \%SystemRoot%\system32 directory and type ntbackup /?. Figure B: You can follow a command with the /? The Extended Command Set As we mentioned earlier, the Windows NT command prompt lets you use commands that other operating systems don't support. Figure C: Windows NT contains many new and enhanced commands. DEL and ERASE CD and CHDIR MD and MKDIR

remote-exploit.org Hacking Articles,Backtrack Tutorials,Hacking Tricks,Penetration Testing,Metaspolit Tutorial RFI Tutorial (remote file inclusion) Basically, the include function in PHP allows contents from local or remote files to be pretty much "copied and pasted" and executed in a script at runtime. Now suppose yo' dad wants a small website. All he wants is three pages.A blog page where he can update you on how many babies he has killed.A contact page with his email on it os people can ask advice on the best way to kill babies.An gallery page where he can show you pictures of all the babies he has killed. He creates four pages. blog.php, contact.php and gallery.php along with index.php, this is our "main" page that will contain a header, a side bar for navigation, some php and a footer. You would view the pages on his website like this.Code: for header//html for menu$page = $_GET['page'];include($page);? This means when we go to Code: What's wrong with this? What's the point of this? Undefined variables. Switching.

SQL Injection Cheat Sheet Find and exploit SQL Injections with free Netsparker SQL Injection Scanner SQL Injection Cheat Sheet, Document Version 1.4 About SQL Injection Cheat Sheet Currently only for MySQL and Microsoft SQL Server, some ORACLE and some PostgreSQL. Samples are provided to allow reader to get basic idea of a potential attack and almost every section includes a brief information about itself. Examples; (MS) means : MySQL and SQL Server etc. Table Of Contents Syntax Reference, Sample Attacks and Dirty SQL Injection Tricks Ending / Commenting Out / Line Comments Line Comments Comments out rest of the query. -- (SM) DROP sampletable;-- # (M) DROP sampletable;# Line Comments Sample SQL Injection Attacks Username: admin'-- SELECT * FROM members WHERE username = 'admin'-- This is going to log you as admin user, because rest of the SQL query will be ignored. Inline Comments /*Comment Here*/ (SM) DROP/*comment*/sampletableDR/**/OP/*bypass blacklisting*/sampletableSELECT/*avoid-spaces*/password/**/FROM/**/Members /*!

HITB Quarterly Magazine .:: Phrack Magazine ::. 2600 News | 2600 Category:Attack This category is for tagging common types of application security attacks. What is an attack? Attacks are the techniques that attackers use to exploit the vulnerabilities in applications. All attack articles should follow the Attack template. Examples: Brute Force: Is an exhaustive attack that works by testing every possible value of a parameter (password, file name, etc.) Note: many of the items marked vulnerabilities from CLASP and other places are really attacks. Subcategories This category has the following 12 subcategories, out of 12 total. Pages in category "Attack" The following 68 pages are in this category, out of 68 total.

Related: