Follow us on Twitter!
Never in the field of human conflict was so much owed by so many to so few. - Winston Churchill
Thursday, April 24, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 27
Guests Online: 22
Members Online: 5

Registered Members: 82895
Newest Member: kevy90
Latest Articles
Articles: Tutorials and How To's

A Beginner's Guide

A brief tutorial on direction.


A ball of Wool and NetCat

A simple tutorial on NetCat, and some other things you can do with netcat


AIM colors

make urself look awesome


Access the internet through calculator, notepad, etc

Ever find yourself at school and locked off the internet?


Advanced DLL Injection C/C++

A 'safer' way to inject DLL(s).


An Intoduction to Game Theory

it's only math, science, and a lot of logic


An easier JTR tutorial

An easier JTR tutorial for beginners.


Anatomy of a Simple IP logger (PHP)

A quick guide and explanation on how to get someone's ip by making them view an 'image'


Basic Anonimity With TOR

How to stay anonymous


Basic CSS Tutorial

Basic CSS tutorial for newbies.


Basic Guide To Trashing

The Basics Of Trashing


Basic HTML Snippits for Newbies

A few basic HTML samples for new people to HTML


Basic Introduction To Reverse Engineering

This is aimed at those who struggle with the application challenges. There is a lot of explanation of code, massively over the top for a simple crackme but its an old article I wrote a while ago. Maybe someone will find it useful to start them off.


Beating rapidshare V1

This is the first version of my tutorial about beating rapidshare. It will outline various ways of getting past many of the Limitations of useing rapidshare. Most of these have been tested and in that situation they worked.


Beginning A Career In Information Security

Step by step how to get started in a Information Security . What courses to take and some other primary things to be doing .


Building a CMS 4 Dummies

A complete guide on building your own working CMS!


Cain & Abel

how to use Cain & Abel


Configuring Dynamic Addressing

O dear


Configuring Static Addressing

Another article from my coursework


Converting Matroska (.mkv) video files

Let's face it. Matroska video files are a bitch to work with. Let's convert it to something a little more universal!


Cool shapes and buttons on adobe fireworks

Cool shapes and buttons on adobe fireworks


Cracking Wep Keys With BackTrack

Guide to cracking wep keys for BEGINNERS! By: Exidous


Cryptcat: Advanced Usage

Advanced Usage of the encrypt3d SwiSS army K.nife!


Data Mining Guide

These two tutorials will teach you how to data mine some body, but also teach you how to protect yourself from being data mined.


Deactivate Caps Lock *Forever!*

You can't use second glue or nails ;)


Dropping DNS Information

Get a bunch of information with in a couple of commands, although it is a hack.


Edit Photoshop CS2 or CS3 Splash Screen

Tutorial for modifying PS CS2 or CS3 splash logos, with an example by me.


Exploiting Dreamweaver

Exploiting Dreamweaver to get access to C:\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ - very simple!


FireFox custom search engines

Tutorial on how to create your own searchplugin for FireFox


Flash 8 Animating. Step one

This will teach you how to animate using Flash 8. Step one


Flash webcam

How to include your webcam in a flash document


Freewebhosts and subdomains

4 freewebhosts are listed here, and 2 subdomains(shorter subdomain).


Gaining Access

Some basic ways to get some access on VERY insecure networks...try your school.


Gaining elevated rights in a secure hosting environment

Yeah, I tried making a CMS with Go cough Dad cough y. The had me so locked down. I wasn\'t havin\' it. Here\'s How to beat it, and get the privelages needed to do what you want.


Get any windows XP password

When you have admin access...this method will allow you to reveal the login password of any account on the machine including the administrator password...without changing it. Interested? Read on


Getting IP addresses through MSN

It will teach you how to get the IPs of your friends on MSN.


Google Guide

Learn how to use Google!


Google Hacking Search Strings by Redlock

Google Hacking Search Strings For Finding Forbidden Sensitive Information And More


Guide to Creating Lessons

An article on creating Vid-Lessons for HBH. We need a ton more of these!


Hack Windows Vista Admin Account By:Exidous

Step By Step Guide To Hacking Windows Vista Passwords


Hacking Lighting Control Systems

playing god with the lighting fixtures


Hardware Hacking Part 1

The title says it all


Help decideing what parts to buy when building a comp

This is an article i wrote to help you find the parts you will need to make a sweet new custom computer


Hiding Your Files In Windows Vista

Ok, so you want to know how to hide your files so it can never be found. NEWS FLASH: it can always be found, but you can make it damn near impossible for your parents/spouse/etc. to find you. Read on to see how one might hide their files or cover their tracks.


Hierarchical data and SQL

This article explains some basic concepts to store hierarchical data in RDBMSs.


How To Get Help On A Mission

Steps to getting a mission completed


How To Make Your Own Server

Learn how easy it is to make your own web server using Internet Information Services (IIS).


How To Use Proxy

This willt each you a little about what proxy is and how to use it in firefox. Very useful it even says google.com!


How To: RSS feeds

A tutorial on Creating RSS feeds and applying them to your website.


How a program works

A very early step for understanding Buffer Overflow


How a proxy works/how to set one up

This article will teach you how to use a proxy


How to Hack in Net Cafe.txt

Check this out!!!


How to add a Favicon to your site.

How to add the little picture that goes next to the favorites or the url bar.


How to get Runescape music outside of Runescape

For those poor, addicted people that still play it.


How to get to blocked websites

Your school blocks nearly every site but that only makes you want to get there more doesnt it. Heres a simple way to get to almost any blocked website.


How to hack, in real-life.

How does one hack in real-life? Why do you need you read this article? JUST CLICK THE LINK


How to have your background as a website!

Have your background as any website in the world wide web!!


How to make your soda into a rocket

Blow your soda


How to password protect your site using htaccess

As the title says.


How to rip videos from Youtube

How to rip videos from Youtube


How too torrent.


How-To Turn your iPod in to a Universal Infrared Remote Control

HOW to Turn your Ipod into a a universal infrared remote control


Hydra: Brute-Forcing Passwords (Dictionary Attacks)

Brute-Forcing Logins on Remote Services.


Hydrogen: The Easy way

How to produce hydrogen easier then what our friend AC1D told us.


Info Gathering with Phone Numbers

How to retrieve phone owner names and pinpoint their exact locations.


Introduction to Perl

I helpful introduction to perl, I take no credit for this article, I just found it.


John the Riper - A noob friendly guide

A detailed tutorial about how to use John the Ripper for cracking DES hashes. Specifically geared to those with less experience


John the Ripper for Dummies

A reference for the rest of us! Learn the basics of John and some handy word lists as well.


John the ripper

Detailed tutorial on jtr usage.


Look, I'm the google bot.

A short description of how appearing to be the google bot can grant you access to forums and such without needing to register.


Making Fire Fox Add-ons Compatible With Your Version of Fire Fox

A quick guide to fix that problem.


Making Use Of AccessDiver

Using the freeware program AccessDiver to remotely run dictionary attacks on websites.


Mapping Memory

Mapping Memory Explained & Behind The Scenes


Mitm, arp poison routing, network sniffing using cain and able

as stated above


NetBIOS Hacking

Learn how to get your enemies hard drive!


Obscuring Your URL

Ever wonder how hackers/spammers/phishers can make their URLs look so...different?


Phishing: Hook, Line, and Sucker

How to make a fake login page and how to get people to login there..


Preventing the Hack - Part 1

Part 1 in a series of articles designed to help you better understand how a hacker might attack your system or network infrastructure.


RSS Tutorial

Simple/easy RSS tutorial


Recording Streaming Audio (yahoo videos, .pls, .asx, etc... )

Disclaimer: I am not responsible for you misusing this tutorial, or any damage brought upon yourself or your computer. This for educational purposes only, and should not be used for illegal music recording or distribution. *who am i kidding?


Regular Forum Rules

Forum rules: read this!


Requesting a mentor, avoid requesting trouble

How to request a mentor.


Reverse Engineering Terminology and Logic

Terminology and Logic behind Assembly language and an introduction to Optimization


SSH and Nmap

A live example.


School Filter Bypassing

This is just a little collection's of method's ive discovered and learned about getting past school filter's and blocks.


School Network Hacking

How to become Admin on your school. This way works for most schools.


Set up an APR (ARP Poison Routing) using Cain and Abel

Direct traffic from other peoples' computer on your network through yours so you can steal logins and passwords (a.k.a. entertainment and/or revenge)!


Setting Up A LAN

Setting up Basic Networking in Windows, Linux and MAC


Setting up Apache on XP

A guide on howto set up Apache


Simple PHP Form

Here is a simple PHP form tutorial to help people whom are just starting PHP


Staying hidden.

Basic to Intermediate Stealth practices.


The newbies guide to Tweaking Firefox v2

In This Artical i try to out line and explaine many tweaks used to speed firefox greately. This is not recomended for dile-up users it would have no affect. It then teaches how to do these tweaks safely a securly


Thermite :D

how to make thermite and destroy ANYTHING


Torrent Optimization

A tutorial on how to get the most out of torrents


Trojan attack

Learn Here About trojan attacking


Tweaking Firefox Plugins to work with newer versions of Firefox

A brief introduction in opening xpi files and changing the plugins install file to work with newer versions of Firefox.


Types of Attacks (network) and Defenses (Windows)

Several types of network based attacks, and some network defense basics. (Windows)


Using a mac as a wireless router.

Turn a spare mac into a wireless router.


Using cURL for HTTP transactions

This article explains how to GET and POST data to webpages using PHP's cURL library, as well as some other options.


WIFI - Part 4, Airmon-ng

This is a guide on how to utilize Airmon-ng to be able to place a wireless interface into monitor mode, and be able to successfully use it.


WIFI - Part 5, OSI and TCP/IP Models

This is a quick guide that will help you understand the OSI model and the TCP/IP model. Both are fundamental when dealing with any kind of networking.


WIFI - Part 6, Airodump-ng Part 1

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng options and syntax.


WIFI - Part 6, Airodump-ng Part 2

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng Results.


WiFi - Part 0, Introduction

This is the introduction to my WiFi Tutorial Series. It is basically just a brief summary of what is to come, and what is to be expected. Please leave feedback!


WiFi - Part 1, Interfaces and Drivers

This section goes over Interfaces, Drivers, and Logs. Depicts what each of the above are, how to view them, and their importance.


WiFi - Part 2, Protocols, Bands and Channels

This section goes over the common 802.11 protocols, talks about bands and channels, and some common characteristics of antennas. Also talks about world regulartoy domains, and how to set them.


WiFi - Part 3, Aircrack-ng

This is just a summary of the various tools that are included with the Aircrack-ng suite. It also goes over the installation process.


Windows XP Privilege Escalation (For those who don't know how..)

This article explains how to gain SYSTEM privileges on a Windows XP Operating System.


finding what you want & effectively using google

this article should explain how to find exactly what you are searching for and how to use google effectively to find topics of interest. a follow-up to spyware's article on mentor requests.


how to put a computer together

how to put a computer together


how to use Net Send

what is net send and how to use it at school


installing&updating XP myway

this will show you,how to slipstream your windows,and not have to connect to the internet to do it.


sniffing switched networks: MAC flooding

how to sniff on a switched network


user agent switcher - huge list

how to get all of the user agents you'll ever need in under a minute


Most Read Articles

Selecting Your First Programming Language

Reads: 201728

If you are stuck wondering were to start in your programming adventure this is the article for you.

The Impact of the Gold Rush on Western Society

Reads: 185061

Essay for school on Gold Rush. Not really about western society. Just added \\\"western society\\\" to make it sound more specific. But good Gold Rush info. Please comment. I can expand on it.

Root in Under Five

Reads: 154870

For Schools and Such

Cracking Wep Keys With BackTrack

Reads: 138480

Guide to cracking wep keys for BEGINNERS! By: Exidous

The Tetris Effect

Reads: 130743

A quick overview on a psychological condition known as "The Tetris Effect."

Hydra: Brute-Forcing Passwords (Dictionary Attacks)

Reads: 71830

Brute-Forcing Logins on Remote Services.

Game of Life

Reads: 70520

A small article examining the influence of Conway's Game of Life on the hacker culture.

_Basic 1 to 17_

Reads: 65131

This article is for...wait....you got it....BASIC 1 TO 17! This is a \"how-to\" and may contain some spoliers.

MySQL injection complete tutorial

Reads: 63592

MySQL injection tutorial by sam207... please rate/comment it

Basic Web Hacking *ALL*

Reads: 60536

A good place to start. Simple instructions for every challenge. *VERY MINOR spoilers*

50 WAYS TO CONFUSE, WORRY, OR JUST SCARE THE PEOPLE IN THE COMPUTER LAB

Reads: 57620

50 WAYS TO CONFUSE, WORRY, OR JUST SCARE THE PEOPLE IN THE COMPUTER LAB. COPIED FROM www.duckshit.com

School Network Hacking

Reads: 44066

How to become Admin on your school. This way works for most schools.

Using Python's HTMLParser class

Reads: 41762

A quick intro on parsing web pages in python

Complete Set Of CGI-BIN Exploits and what they do

Reads: 36206

This tutorial will show you many Cgi-Bin exploits out there and tell you what they mean.

Camera Hacking with Google

Reads: 33735

This is a list of strings that you could type into google and find a unprotected network camera.Enjoy!

Latest Articles

Pent testing 2 walk through

Reads: 1163

a walk through on the pent testing 2

Top 10 Simple Home Security Tips

Reads: 1171

Easy Home Networking Tips!

Pen Testing 2

Reads: 2300

If you need hints because you are still stucked with pen test 2, this article is written for you.

5 Firefox Addons Everyone Should Have

Reads: 4026

Here's a list of Firefox Addons that everyone should have and use.

Realistic 18

Reads: 3054

A guide to help you with the 'insane' realistic 18.

IT Security, a way of life.

Reads: 3435

Offensive Security vs. Defensive Security general questions and answers essay.

WIFI - Part 6, Airodump-ng Part 2

Reads: 5564

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng Results.

WIFI - Part 6, Airodump-ng Part 1

Reads: 6010

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng options and syntax.

WIFI - Part 5, OSI and TCP/IP Models

Reads: 3527

This is a quick guide that will help you understand the OSI model and the TCP/IP model. Both are fundamental when dealing with any kind of networking.

WIFI - Part 4, Airmon-ng

Reads: 3945

This is a guide on how to utilize Airmon-ng to be able to place a wireless interface into monitor mode, and be able to successfully use it.

Artificial Intelligence

Reads: 4163

I wrote this a while back and thought it would be good to post on here to start some good debates or conversations. This article is a thought prosses on what gaps the real human mind with that of AI

WiFi - Part 3, Aircrack-ng

Reads: 7354

This is just a summary of the various tools that are included with the Aircrack-ng suite. It also goes over the installation process.

WiFi - Part 2, Protocols, Bands and Channels

Reads: 7118

This section goes over the common 802.11 protocols, talks about bands and channels, and some common characteristics of antennas. Also talks about world regulartoy domains, and how to set them.

WiFi - Part 1, Interfaces and Drivers

Reads: 7740

This section goes over Interfaces, Drivers, and Logs. Depicts what each of the above are, how to view them, and their importance.

WiFi - Part 0, Introduction

Reads: 7825

This is the introduction to my WiFi Tutorial Series. It is basically just a brief summary of what is to come, and what is to be expected. Please leave feedback!