Articles: Web Hacking
15 most common ways to stay out of Jail.
Here's a list of Firefox Addons that everyone should have and use.
How to use AJAX in websites
Going a little bit deeper into csrf and xss.
Has it been 30 minutes? Still looking for the right answer? Well, if you really just can't get this one, here's a simple article for you.
Basics Of WeBhAcKiNg nothing more nothing less
Just a few tips...
Blind SQL Injection explained
An explanation of a new XSS assault vector. Only useful for IE and semi useful against Konqueror
This is a list of strings that you could type into google and find a unprotected network camera.Enjoy!
This tutorial will show you many Cgi-Bin exploits out there and tell you what they mean.
Fooling browser into doing things due to content type spoofing!
Viewing and editing cookies
Fine article on using a tool and wordlists to crack MD5 (unsalted).
A UNDERGROUND SEARCH ENGINE FOR SCHOOLS WHO *DONT HAVE GOOGLE?IMAGES ACCESS*
Another fine article about using an old exploit and a hacker's best friend, Google to find vulnerable sites.
Learn to email people from a different email address by spoofing.
i did add this article a while ago but it went missing so.... i\'ve decided to add it again.
a common CMS used by guilds in MMORPGs has a severe refspoof vulnerability.
Just a simple tute for beginners on FrontPage Extension
A simple way to trick the owner of a website into changing their password.
Look at the title, but if I must...Get around the internet blocking at your school (or work place I guess)
Getting past the Webbalanced blocking service
How to take control of Guestbooks, most commonly guestbook.html
A small guide to telnet. It covers HTTP and SMTP
Basic tools/progs a hacker mite need
Ever wanted to hack that InvisionFree forum that you despise? Or maybe you're the ethical hacker that simply wants to show InvisionFree owners how to stay secure (through demonstration, no less). Either way, you might find this guide useful.
\*\/*/ Hacking with Windows Xp /*/\*\ by Carolyn meinel Using telnet
NetCat the other Telnet
How to become a hacker by Eric Steven Raymond email@example.com 22.214.171.124 http://www.catb.org/~esr/faqs/hacker-howto.html
This tutorial will teach you how to make annoying avatars which will log you out from a forum, or cause annoying popups. <h1>mofo</h1>
Rip from google videos.
They plugged the old hole, heres a new one.
Err...kinda explained it in the subject. HOW TO VIEW ANYONE'S COMMENTS ON MYSPACE. There. Just in case you didn't get it.
What the IE exploit is, how to use it, how to hide it and what you can do. Examples. Script kiddies beware, this article is engineered only to give enough to be just that script kiddies, the hardcore stuff you've got to learn yourself.
Old but very effective technique to gaining to a web server
What if there are no unprotected search boxes or logins to inject through?
An introduction to Cross-site request forgery. Description, explanation, examples, prevention
MySQL injection tutorial by sam207... please rate/comment it
Break into any computer you want
How to access a folder or hardrive on a pc on your network.
Obtain passwd file
Here is some PHP code on getting a visitors ip adress
Different ways to crack a password
A small guide about physical intrusion and its various aspects
Ever wonder a safe way to post in a piczo guest book or shoutbox, or totally erase every message in one? Well this ones for you!
List of frequently seen tcp and udp ports and what they mean
proxys proxi proxys??? basically a little tut one proxys.
A basic guide on how this method works and how to stop it
Basic Guide to simple SQL Injection
SQL Injection good for beginners
long (blind) sql injection guide from basic to advanced showing all sides of the story
You want to send emails from you friends email account!!
Send emails from other peoples addresses (or fake ones)
Spoofing HTTP Requests with Putty
Yes... it really is possible, and very easy, i stumbled upon it when i had a zoom modem
An in depth article written by M3DU54 for me in regards to a question i asked about how to perform steps to Serious Penetration
Some small software pieces which you really need if you want to hack.
official tcp/ip port list
A intro to telnet with examples and brief history
IP Addresses you should not attemped to scan when doing IP scans
If you dont have the patience to get easyFTP or something else like that, heres a fix.
Just a list of various piczo vulnerabilities. Please don\'t flame me too much, it\'s my first article. it\'s kinda aimed at beginners and script-kiddies, so i tried to keep it simple
How to crack WEP like the feds, in 3 mins.
This tutorial will help you get around those nasty firewalls at school or work and help you see the internet in its entirety.
Learn to deface websites and break into intranets.
I do hate all these fake free wifi networks so I decided to look into how to work around these annoying buggers.
A basic tut on XSS, how to test it, how to use this Vulnerability in a more interesting way.
This article describes a few types of XSS methods that you can use, which a lot of sites forget about.
XSS The Complete Walkthrough
What is XSS? Well read to find out.
A step-by-step explanation of how an attacker creates an XSS worm
an explanation of how to use exploits with msf, in order to get a payload on a remote machine (i.e. reverse shell, immediate root, etc..)
trojan TCP/IP ports just think what you can do with these
Most Read Articles