Quantcast
Channel: Insanity Pop » Scripts, Coding & Hacking
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to Hack Username and Passwords over W-Fi

  Disclaimer: This article is intended soley for information purposes. In it, I will discuss the use of an attack known as a “Man In The Middle” (MITM), in order to capture UserID and Passwords that...

View Article



Image may be NSFW.
Clik here to view.

Perl – Programming Language – A brief Intro.

Perl is a high-level, general-purpose, interpreted, dynamic programming language. Though Perl is not officially an acronym, there are various backronyms in usage, such as: Practical Extraction and...

View Article

Perl – Part 1 – The basics

Perl – Part 1 – The basics In layman’s terms – Perl is a Beast of an scripting language. I will endeavor to guide you through learning, in a clear, easily understood format, using examples as i go. –...

View Article

Image may be NSFW.
Clik here to view.

Hackers – The Good, The Bad & Ugly.

The Hacker – Black, White or Gray? … Which are you, and does it matter? … Most people think hackers have extraordinary skill and knowledge that allow them to hack into computersystems and find...

View Article

Image may be NSFW.
Clik here to view.

TCP/IP Overview – A Breakdown Of Computer Communication

TCP/IP model: Layers The TCP/IP model defines four totally independent layers into which it divides the process of communication between two devices. The layers through which it passes information...

View Article


Perl – Part 2 – Advancing

1. The for Loop The for loop has another syntax which can be used to encapsulate while-like loops in a more compact way, which also has some advantages. The syntax for this for loop is for({Initial...

View Article

Image may be NSFW.
Clik here to view.

Faking your iOS Version

Found this neat trick off the Hak5 Forums. Lets say you’ve got a iPod 2G and you want to install some new apps but the app store keeps butting in every time you make the install complaining that your...

View Article

Image may be NSFW.
Clik here to view.

Java 0-Day Exploit – Own that heap of shit of a computer your friend calls...

Oracle has finally issued an update for Java 7 (v 1.7.0_07) which solves the problem of the CVE-2012-4681 vulnerability which allowed hackers (like us) so easily own a machine. Luckily for us there...

View Article


Image may be NSFW.
Clik here to view.

Building an Evil Access Point!

In this article im going to show you how to code up an Evil WiFi Access Point. What makes this AP so evil you might find yourself asking on a cold winter morning? Well, when somebody connects to this...

View Article


Image may be NSFW.
Clik here to view.

How To Hack Kik Messenger On iPhone & Android

Kik Messenger is an instant messaging application for mobile devices. The app is available on most iOS, Android, Windows Phone, BlackBerry and Symbian operating systems for free.[1] Kik Messenger is...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images