Follow us on Twitter!
The measure of a mans life is not how well he dies, but how well he lives.
Monday, April 21, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 24
Guests Online: 24
Members Online: 0

Registered Members: 82852
Newest Member: sockpuppets
Latest Articles
Articles: Web Hacking

15 Ways to help you stay out of Jail

15 most common ways to stay out of Jail.


5 Firefox Addons Everyone Should Have

Here's a list of Firefox Addons that everyone should have and use.


AJAX Tutorial

How to use AJAX in websites


Advanced csrf and xss tricks

Going a little bit deeper into csrf and xss.


Basic 15 - Spoiler free Walkthrough

Has it been 30 minutes? Still looking for the right answer? Well, if you really just can't get this one, here's a simple article for you.


Basics OF webhacking

Basics Of WeBhAcKiNg nothing more nothing less


Basics of Web Hacking

Just a few tips...


Blind SQL Injection

Blind SQL Injection explained


CSS XSS

An explanation of a new XSS assault vector. Only useful for IE and semi useful against Konqueror


Camera Hacking with Google

This is a list of strings that you could type into google and find a unprotected network camera.Enjoy!


Complete Set Of CGI-BIN Exploits and what they do

This tutorial will show you many Cgi-Bin exploits out there and tell you what they mean.


Content Type Spoofing

Fooling browser into doing things due to content type spoofing!


Cookies

Viewing and editing cookies


Cracking MD5

Fine article on using a tool and wordlists to crack MD5 (unsalted).


DISINFO.COM IS GREAT!

A UNDERGROUND SEARCH ENGINE FOR SCHOOLS WHO *DONT HAVE GOOGLE?IMAGES ACCESS*


Defacing FTPs

Another fine article about using an old exploit and a hacker's best friend, Google to find vulnerable sites.


Els1 Basic To Javascript (EBTJ)

Basics to Javascript, from els1 productions.


Email Spoofing with Telnet

Learn to email people from a different email address by spoofing.


Email spoofing... yet again

i did add this article a while ago but it went missing so.... i\'ve decided to add it again.


Exploiting a common EQDKP vulnerability.

a common CMS used by guilds in MMORPGs has a severe refspoof vulnerability.


FrontPage Extension Hacking made easy

Just a simple tute for beginners on FrontPage Extension


Get access to a website...

A simple way to trick the owner of a website into changing their password.


Get around censorship

Look at the title, but if I must...Get around the internet blocking at your school (or work place I guess)


Getting past Webbalanced

Getting past the Webbalanced blocking service


Guestbook Hacking

How to take control of Guestbooks, most commonly guestbook.html


Guide to telnet

A small guide to telnet. It covers HTTP and SMTP


Hackers essentials

Basic tools/progs a hacker mite need


Hacking InvisionFree forums

Ever wanted to hack that InvisionFree forum that you despise? Or maybe you're the ethical hacker that simply wants to show InvisionFree owners how to stay secure (through demonstration, no less). Either way, you might find this guide useful.


Hacking With Windows XP

\*\/*/ Hacking with Windows Xp /*/\*\ by Carolyn meinel Using telnet


Hacking in General

.


How to Use Netcat port 23

NetCat the other Telnet


How to become a hacker

How to become a hacker by Eric Steven Raymond esr@thyrsus.com 152.2.210.81 http://www.catb.org/~esr/faqs/hacker-howto.html


How to make popup and logout avatars

This tutorial will teach you how to make annoying avatars which will log you out from a forum, or cause annoying popups. <h1>mofo</h1>


How to rip from google videos

Rip from google videos.


How to save Pandora songs with the new version of pandora

They plugged the old hole, heres a new one.


How to view anyone's comments on Myspace.com

Err...kinda explained it in the subject. HOW TO VIEW ANYONE'S COMMENTS ON MYSPACE. There. Just in case you didn't get it.


IE Xploit

What the IE exploit is, how to use it, how to hide it and what you can do. Examples. Script kiddies beware, this article is engineered only to give enough to be just that script kiddies, the hardcore stuff you've got to learn yourself.


Include Exploits

Old but very effective technique to gaining to a web server


Injection via User Agents

What if there are no unprotected search boxes or logins to inject through?


Intro to CSRF

An introduction to Cross-site request forgery. Description, explanation, examples, prevention


Javascript Injections

Basics of javascript


MySQL injection complete tutorial

MySQL injection tutorial by sam207... please rate/comment it


Netcat back doors

Break into any computer you want


Network Hacking

How to access a folder or hardrive on a pc on your network.


Obtain a passwd file

Obtain passwd file


Obtaining a visitors IP adress

Here is some PHP code on getting a visitors ip adress


Password cracking!!

Different ways to crack a password


Physical Intrusion

A small guide about physical intrusion and its various aspects


Piczo Guestbook/Shoutbox Defacement

Ever wonder a safe way to post in a piczo guest book or shoutbox, or totally erase every message in one? Well this ones for you!


Port Knowledgebase

List of frequently seen tcp and udp ports and what they mean


Proxies 101

proxys proxi proxys??? basically a little tut one proxys.


Real-time source modification through Opera

How to modify the source without the hassle of offline editing & javascript injetion.


Remote Code Execution

A basic guide on how this method works and how to stop it


SQL Injection

Basic Guide to simple SQL Injection


SQL Injection

SQL Injection good for beginners


SQL Injection Whitepaper

long (blind) sql injection guide from basic to advanced showing all sides of the story


Sending Fake Emails

You want to send emails from you friends email account!!


Simple email spoofing with telnet

Send emails from other peoples addresses (or fake ones)


Spoofing HTTP Requests with Putty

Spoofing HTTP Requests with Putty


Steal zoom modem user's isp username and pw!

Yes... it really is possible, and very easy, i stumbled upon it when i had a zoom modem


Steps to Serious Penetration

An in depth article written by M3DU54 for me in regards to a question i asked about how to perform steps to Serious Penetration


Stuff you need for hacking

Some small software pieces which you really need if you want to hack.


TCP/IP port List

official tcp/ip port list


TelNet - tutorial for noobs

A intro to telnet with examples and brief history


US GOV IP ADDRESSES YOU SHOULD NOT SCAN

IP Addresses you should not attemped to scan when doing IP scans


Using Internet Explorer for FTP

If you dont have the patience to get easyFTP or something else like that, heres a fix.


Various Piczo vulnerabilities

Just a list of various piczo vulnerabilities. Please don\'t flame me too much, it\'s my first article. it\'s kinda aimed at beginners and script-kiddies, so i tried to keep it simple


WEP Cracking, FBI Style

How to crack WEP like the feds, in 3 mins.


Ways Around Internet Censorship

This tutorial will help you get around those nasty firewalls at school or work and help you see the internet in its entirety.


Website Defacement

Learn to deface websites and break into intranets.


WiFi Gateway/Ibahn bypass

I do hate all these fake free wifi networks so I decided to look into how to work around these annoying buggers.


XSS

XSS


XSS Attacks and Phishing

A basic tut on XSS, how to test it, how to use this Vulnerability in a more interesting way.


XSS That some people forget about

This article describes a few types of XSS methods that you can use, which a lot of sites forget about.


XSS The Complete Walkthrough

XSS The Complete Walkthrough


XSS-Good For Java 4

What is XSS? Well read to find out.


constructing an XSS Worm

A step-by-step explanation of how an attacker creates an XSS worm


exploiting Windows, Linux, and MACs

an explanation of how to use exploits with msf, in order to get a payload on a remote machine (i.e. reverse shell, immediate root, etc..)


javascipt injection tutorials

covers all the methods and uses of javascript injection.


trojan TCP/IP ports

trojan TCP/IP ports just think what you can do with these


Most Read Articles

Selecting Your First Programming Language

Reads: 201701

If you are stuck wondering were to start in your programming adventure this is the article for you.

The Impact of the Gold Rush on Western Society

Reads: 185056

Essay for school on Gold Rush. Not really about western society. Just added \\\"western society\\\" to make it sound more specific. But good Gold Rush info. Please comment. I can expand on it.

Root in Under Five

Reads: 154717

For Schools and Such

Cracking Wep Keys With BackTrack

Reads: 138452

Guide to cracking wep keys for BEGINNERS! By: Exidous

The Tetris Effect

Reads: 130739

A quick overview on a psychological condition known as "The Tetris Effect."

Hydra: Brute-Forcing Passwords (Dictionary Attacks)

Reads: 71784

Brute-Forcing Logins on Remote Services.

Game of Life

Reads: 70517

A small article examining the influence of Conway's Game of Life on the hacker culture.

_Basic 1 to 17_

Reads: 65109

This article is for...wait....you got it....BASIC 1 TO 17! This is a \"how-to\" and may contain some spoliers.

MySQL injection complete tutorial

Reads: 63513

MySQL injection tutorial by sam207... please rate/comment it

Basic Web Hacking *ALL*

Reads: 60509

A good place to start. Simple instructions for every challenge. *VERY MINOR spoilers*

50 WAYS TO CONFUSE, WORRY, OR JUST SCARE THE PEOPLE IN THE COMPUTER LAB

Reads: 57598

50 WAYS TO CONFUSE, WORRY, OR JUST SCARE THE PEOPLE IN THE COMPUTER LAB. COPIED FROM www.duckshit.com

School Network Hacking

Reads: 44059

How to become Admin on your school. This way works for most schools.

Using Python's HTMLParser class

Reads: 41744

A quick intro on parsing web pages in python

Complete Set Of CGI-BIN Exploits and what they do

Reads: 36115

This tutorial will show you many Cgi-Bin exploits out there and tell you what they mean.

Camera Hacking with Google

Reads: 33708

This is a list of strings that you could type into google and find a unprotected network camera.Enjoy!

Latest Articles

Pent testing 2 walk through

Reads: 1140

a walk through on the pent testing 2

Top 10 Simple Home Security Tips

Reads: 1153

Easy Home Networking Tips!

Pen Testing 2

Reads: 2290

If you need hints because you are still stucked with pen test 2, this article is written for you.

5 Firefox Addons Everyone Should Have

Reads: 4006

Here's a list of Firefox Addons that everyone should have and use.

Realistic 18

Reads: 3043

A guide to help you with the 'insane' realistic 18.

IT Security, a way of life.

Reads: 3422

Offensive Security vs. Defensive Security general questions and answers essay.

WIFI - Part 6, Airodump-ng Part 2

Reads: 5542

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng Results.

WIFI - Part 6, Airodump-ng Part 1

Reads: 5987

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng options and syntax.

WIFI - Part 5, OSI and TCP/IP Models

Reads: 3511

This is a quick guide that will help you understand the OSI model and the TCP/IP model. Both are fundamental when dealing with any kind of networking.

WIFI - Part 4, Airmon-ng

Reads: 3932

This is a guide on how to utilize Airmon-ng to be able to place a wireless interface into monitor mode, and be able to successfully use it.

Artificial Intelligence

Reads: 4148

I wrote this a while back and thought it would be good to post on here to start some good debates or conversations. This article is a thought prosses on what gaps the real human mind with that of AI

WiFi - Part 3, Aircrack-ng

Reads: 7342

This is just a summary of the various tools that are included with the Aircrack-ng suite. It also goes over the installation process.

WiFi - Part 2, Protocols, Bands and Channels

Reads: 7095

This section goes over the common 802.11 protocols, talks about bands and channels, and some common characteristics of antennas. Also talks about world regulartoy domains, and how to set them.

WiFi - Part 1, Interfaces and Drivers

Reads: 7713

This section goes over Interfaces, Drivers, and Logs. Depicts what each of the above are, how to view them, and their importance.

WiFi - Part 0, Introduction

Reads: 7819

This is the introduction to my WiFi Tutorial Series. It is basically just a brief summary of what is to come, and what is to be expected. Please leave feedback!