How to Hack Username and Passwords over W-Fi
Disclaimer: This article is intended soley for information purposes. In it, I will discuss the use of an attack known as a “Man In The Middle” (MITM), in order to capture UserID and Passwords that...
View ArticlePerl – Programming Language – A brief Intro.
Perl is a high-level, general-purpose, interpreted, dynamic programming language. Though Perl is not officially an acronym, there are various backronyms in usage, such as: Practical Extraction and...
View ArticlePerl – Part 1 – The basics
Perl – Part 1 – The basics In layman’s terms – Perl is a Beast of an scripting language. I will endeavor to guide you through learning, in a clear, easily understood format, using examples as i go. –...
View ArticleHackers – The Good, The Bad & Ugly.
The Hacker – Black, White or Gray? … Which are you, and does it matter? … Most people think hackers have extraordinary skill and knowledge that allow them to hack into computersystems and find...
View ArticleTCP/IP Overview – A Breakdown Of Computer Communication
TCP/IP model: Layers The TCP/IP model defines four totally independent layers into which it divides the process of communication between two devices. The layers through which it passes information...
View ArticlePerl – Part 2 – Advancing
1. The for Loop The for loop has another syntax which can be used to encapsulate while-like loops in a more compact way, which also has some advantages. The syntax for this for loop is for({Initial...
View ArticleFaking your iOS Version
Found this neat trick off the Hak5 Forums. Lets say you’ve got a iPod 2G and you want to install some new apps but the app store keeps butting in every time you make the install complaining that your...
View ArticleJava 0-Day Exploit – Own that heap of shit of a computer your friend calls...
Oracle has finally issued an update for Java 7 (v 1.7.0_07) which solves the problem of the CVE-2012-4681 vulnerability which allowed hackers (like us) so easily own a machine. Luckily for us there...
View ArticleBuilding an Evil Access Point!
In this article im going to show you how to code up an Evil WiFi Access Point. What makes this AP so evil you might find yourself asking on a cold winter morning? Well, when somebody connects to this...
View ArticleHow To Hack Kik Messenger On iPhone & Android
Kik Messenger is an instant messaging application for mobile devices. The app is available on most iOS, Android, Windows Phone, BlackBerry and Symbian operating systems for free.[1] Kik Messenger is...
View Article
More Pages to Explore .....