Follow us on Twitter!
Society leans ever heavily on computers, if you have the power to take out computers you can take out society. - cubeman372
Saturday, April 19, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 23
Guests Online: 22
Members Online: 1

Registered Members: 82832
Newest Member: SerMSYS
Latest Articles
Articles: Other

10 Commandments Day

Is this the end?


10 Reasons not to get an os

Ten reasons not to get an operating system.


50 WAYS TO CONFUSE, WORRY, OR JUST SCARE THE PEOPLE IN THE COMPUTER LAB

50 WAYS TO CONFUSE, WORRY, OR JUST SCARE THE PEOPLE IN THE COMPUTER LAB. COPIED FROM www.duckshit.com


Analog Satellite TV (C-Band) Reception

A quick tutorial on how to get free analog satellite TV channels from all over the earth (every continent), Africa, Europe, N+S America, Australia, Russia, etc...


Anti-Forensics

This little guide will help you protect yourself from data recovery.


Are You Addicted to the Internet Quiz

Take the quiz and find out. The Internet Addiction Test is adapted from Dr. Kimberley S. Young\\\'s book Caught in the Net


Are you cheating your self?

I am resubmitting this Article since it was lost in light of the business with layeredtech. Thanks to all who rated and left comments before. Please rate and feel free to comment.


Artificial Intelligence

I wrote this a while back and thought it would be good to post on here to start some good debates or conversations. This article is a thought prosses on what gaps the real human mind with that of AI


Cisco any one?

Routers and Switches.....I would rather own them, than just pass through


Computerized Revenge

Fun things to do to an ass's computer :D


Crack Hotmail

Don't Hack Hotmail, Just Crack It


Declaration of the Independence of Cyberspace

Declaration of the Independence of Cyberspace


Dream Interpretation, Psychology

Dream Interpretation; Exploring the Subconscious By: maug


Elevator Hacking

Bypass all stops on an elevator...except for yours of course...


Firefox Browser Hacking

Firefox Browser Hacking


Firefox Optimization Guide.

This article aims to set out the optimal settings for Mozilla Firefox and explain what it is they do. PM me if ya want instructions on how to apply the settings or for info.


Flash 8 Animating. Step two

The next step in animating with Flash 8


For New Members

Help for new members. Send them here.


Fun With Math And Science

This is just some interesting permutations of 2 + 2 = 5. This is not hacking related, rather, more of \"out of the box\" thinking.


Gaining access to store display computers.

A simple method of gaining admin on store display computers, no longer the need to crack the SAM file!


Game of Life

A small article examining the influence of Conway's Game of Life on the hacker culture.


Get IP over Msn

As it says.


Glossary of Information for HACKER TERMS

just wonder what the terms are that we the people of tomorrow then read this


Glossary-of-the-most-common-hacker-expressions

This article includes description of the most used hacking slang\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'. It doesn\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'t go to much depth, but hopefully gives the general idea...


Google Hacking

Google Hacking


HP printer Display Hack

This tut will allow you to change the display of most HP printers


Hack to View Wii Shop

Now You Can Hack Wiis


Hacker Terminology

An insight into black hat, white hat, grey hat, brown hat and script kiddies - what are they and how to know if you are one.


Hacking into School Folders.... Made Easy

Easiest possible ways to get into school network folders.


Hacking your school

Hack your school,open cmd at school, bypass webfilters, and much more....


Hacktivism: history & stories

originally written for the HBH Zine


Hardware Virus

An article about howto create an Hardware Virus and how to help spread it into the world. I have seen more of these types of viruses. Many on youtube, Most just at my home.


Hex to Asm

List of helpfull ASM commands in Hex


How to build a miniature remote controled spybot

Build a miniature remote controlled spy robot with video and sound capabilities. Cool project I learned a while back and feel it may be interesting to some other \"techno geeks\" out there. With some of the same abilities used by the military and police force. basic electronic / soldering / welding skills may come in handy. I assume most of you have a little coding knowledge. apparently it seems that people did not understand when i wrote that this is a \"project i learned\" I learned it a couple years ago from a torrent file i downloaded called \"electronic projects\" thanks to Goofus i know know that it comes from a book called \"101 projects for the Evil Genius\" though the torrent that i downloaded was only a few chapters from that book. so download the book read the book and see that i wrote it much simpler as you can see this article is not 10 or more pages from a book


Latest Hacker exploit

Aim is the latest to be hit by Hackers


Logging an unsuspecting user on ur network

A great method if ur at work or at a library with alot of computers.


Me and my router

Basically, I forgot my router password, and couldn't find an article on how to reset it without resetting the router, so, I got lucky, figured it out and thought I should share...


Net Send users anonymous over the network

how to send anonymous net send messages across the network.


NetBIOS Hacking

NetBIOS (Network Basic Input/Output System) Hacking


New To Mozilla Firefox? Read This!

a list of good addons for mozilla to get you started and my first article ;)


Newbies?

A guide to get newbies on their feet to learning to hack


Optimising Firefox

An article to help make your browsing experience more enjoyable


Pad Lock Shim

want to get into your school lockers with the little dail


Philosophical like essay

Short essay on the net


Pipelining FireFox

How to speed up your requests using FireFox. (requires highspeed connection, no dial up)


Positional Number Systems

A tutorial on decimal and non-decimal number systems, conversions between them, and a few potential uses.


Quantum Computers

A new 'state' of mind.


RSS Tutorial

A semi decent RSS guide. Just the basics.


Reality Vs. Fantasy: An ongoing war within ourselves.

This is the second article I've written. this deals with the way we perceive things on a daily basis, and what we determine is real, and what is fantasy.


Skype It

Skype: Encrypted and ready to roll. Let\'s replace AIM.


Solidox Bomb

This is how to make a bomb out of Solidox and sugar


Supercharge a Dart gun

wanna anoy a co-worker or shoot your friend or just plain piss off your siblings well this article is for you


Systems and What each is good for.

Building your own computer can cost a lot more than the cost to have someone else build it for you! Here are some tips on what to look for in what kind of machine.


TCP/IP Addresses Explained

A break down of TCP/IP addressing


TCP/UDP A brief overview

This is a basic look at the roles and structures of the transport control protocol and the user datagram protocol.


Telecom-Munist

Well scaning the Internet and found this dont know how good it is but It looks like a Hacker zine so what the hell


Terminal Rentagrade

THE REASON WE ARE By T,I,C Pass this along give it to other send it to the papers NO LITTLE MAN... WE HAVE JUST BEGAIN...


The Right "title"

The right title awaits your choice of action... Hacker or not Hacker? That is the question.


The Computer Fraud And Abuse act

The COmputer Fraud and Abuse act (as amended Oct. 3, 1996)


The Dunning-Kruger Effect

...and how it applies to you


The Fourth Amendment

Search and Seizure


The Meaning of `Hack'

The Meaning of `Hack' Found on Cool Jargon of the Day


The Outbreak of "Chat-Hackers"

It seems as days go by, the acclaimed "Digichat" software is bypassed more and more, and younger kids/teens are gaining Admin using a few simple tools... Read on if you'd like to hear my two cents.


The Rainbow Hat

A new taking on TRH


The Revised Great hacking war

Sources from Wiki and re written


The Tetris Effect

A quick overview on a psychological condition known as "The Tetris Effect."


The great hacker war

short but interesting


The guide to good revision

Hate revision?? want to boost your grade?? follow the link for my guide on how to make revision more productive and less draining.


The things that are wrong with our society and globalization

How developed countries and big buck corporations look at society and globalization of developing countries. Why do they do this?


The truth about truth(s)

An article about truth.


Theory on optimism and pessimism

Theory on optimism and pessimism by system_meltdown.


Trashing, a complete guide!

My first article on a very powerful and usefull way to obtain information on your targets for hacking and social engineering...


Tunneling TCP traffic

THis article will giude you through tunneling TCP traffic over HTTP and ICMP with use of few tools


USB lamp.

To help with the late night hacking although IBM have lamps built in Fn+pgUP


Uniguest bypass

Exploiting the Uniguest kiosk system


Urban Exploration

Going places you aren't supposed to go


Useful Commands in BAT/DOS

BAT/DOS Commands


What Happens If the RIAA Targets You

If you’re pirating music and video using BitTorrent or LimeWire, here’s what to expect if the lawyers come calling.


What makes a leader?

What makes a leader?


When you are this smart they call you MR

This is a talk in IRC (irc.afternet.org #hbh) that I had with a guy.


Who's watching you?

Who's watching you?


Why you Should Care

JUST a banch of things about Hackers nothing really good but who cares


XHTML and HTML

Explaining the differences, and why to use XHTML


_Optimising Firefox

An article to help make your browsing experience more enjoyable, covering extensions, mods in the config and other things


a quick guide to ds homebrew

Details on how to set up, the difference between different kinds of hardware, patching homebrew, types of exploits.


computer lab pranks

endless laughs with easy to use scripts etc...pls rate this


computer survey

ever wanted to take a computer survey FOUND IT JUST BY GOOGING IT you might have to print it out


xss

An article about how I found an xss hole in hbh


Most Read Articles

Selecting Your First Programming Language

Reads: 201688

If you are stuck wondering were to start in your programming adventure this is the article for you.

The Impact of the Gold Rush on Western Society

Reads: 185051

Essay for school on Gold Rush. Not really about western society. Just added \\\"western society\\\" to make it sound more specific. But good Gold Rush info. Please comment. I can expand on it.

Root in Under Five

Reads: 154664

For Schools and Such

Cracking Wep Keys With BackTrack

Reads: 138439

Guide to cracking wep keys for BEGINNERS! By: Exidous

The Tetris Effect

Reads: 130734

A quick overview on a psychological condition known as "The Tetris Effect."

Hydra: Brute-Forcing Passwords (Dictionary Attacks)

Reads: 71757

Brute-Forcing Logins on Remote Services.

Game of Life

Reads: 70516

A small article examining the influence of Conway's Game of Life on the hacker culture.

_Basic 1 to 17_

Reads: 65100

This article is for...wait....you got it....BASIC 1 TO 17! This is a \"how-to\" and may contain some spoliers.

MySQL injection complete tutorial

Reads: 63470

MySQL injection tutorial by sam207... please rate/comment it

Basic Web Hacking *ALL*

Reads: 60496

A good place to start. Simple instructions for every challenge. *VERY MINOR spoilers*

50 WAYS TO CONFUSE, WORRY, OR JUST SCARE THE PEOPLE IN THE COMPUTER LAB

Reads: 57589

50 WAYS TO CONFUSE, WORRY, OR JUST SCARE THE PEOPLE IN THE COMPUTER LAB. COPIED FROM www.duckshit.com

School Network Hacking

Reads: 44051

How to become Admin on your school. This way works for most schools.

Using Python's HTMLParser class

Reads: 41739

A quick intro on parsing web pages in python

Complete Set Of CGI-BIN Exploits and what they do

Reads: 36065

This tutorial will show you many Cgi-Bin exploits out there and tell you what they mean.

Camera Hacking with Google

Reads: 33700

This is a list of strings that you could type into google and find a unprotected network camera.Enjoy!

Latest Articles

Pent testing 2 walk through

Reads: 1129

a walk through on the pent testing 2

Top 10 Simple Home Security Tips

Reads: 1143

Easy Home Networking Tips!

Pen Testing 2

Reads: 2287

If you need hints because you are still stucked with pen test 2, this article is written for you.

5 Firefox Addons Everyone Should Have

Reads: 3990

Here's a list of Firefox Addons that everyone should have and use.

Realistic 18

Reads: 3037

A guide to help you with the 'insane' realistic 18.

IT Security, a way of life.

Reads: 3414

Offensive Security vs. Defensive Security general questions and answers essay.

WIFI - Part 6, Airodump-ng Part 2

Reads: 5525

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng Results.

WIFI - Part 6, Airodump-ng Part 1

Reads: 5976

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng options and syntax.

WIFI - Part 5, OSI and TCP/IP Models

Reads: 3508

This is a quick guide that will help you understand the OSI model and the TCP/IP model. Both are fundamental when dealing with any kind of networking.

WIFI - Part 4, Airmon-ng

Reads: 3921

This is a guide on how to utilize Airmon-ng to be able to place a wireless interface into monitor mode, and be able to successfully use it.

Artificial Intelligence

Reads: 4144

I wrote this a while back and thought it would be good to post on here to start some good debates or conversations. This article is a thought prosses on what gaps the real human mind with that of AI

WiFi - Part 3, Aircrack-ng

Reads: 7329

This is just a summary of the various tools that are included with the Aircrack-ng suite. It also goes over the installation process.

WiFi - Part 2, Protocols, Bands and Channels

Reads: 7085

This section goes over the common 802.11 protocols, talks about bands and channels, and some common characteristics of antennas. Also talks about world regulartoy domains, and how to set them.

WiFi - Part 1, Interfaces and Drivers

Reads: 7698

This section goes over Interfaces, Drivers, and Logs. Depicts what each of the above are, how to view them, and their importance.

WiFi - Part 0, Introduction

Reads: 7814

This is the introduction to my WiFi Tutorial Series. It is basically just a brief summary of what is to come, and what is to be expected. Please leave feedback!