Articles: Social Engeneering
the long lost form of social engineering
How to turn your 20, into a 30.
Story of mine about how I hacked an HBH member's accounts on the entire web. Then I go over each method I used and why the method worked.
A tutorial for my favorite ways of using SE to gain access to peoples' myspaces and email accounts. As simple as it gets.
Someone that you aren\\\\\\\'t.
How to SE your way into a hotmail account.
How to use and abuse mozilla to get some passwords.
This is a more in depth look into social engineering and how to use NLP to increase your success in social engineering.
It is simple, all you need to do this is server with PHP support, fake mailer and basic knowledge
Why steal it when you can get someone to give it to you.
Who\\\\\\\\\\\\\\\'s to say you don\\\\\\\\\\\\\\\'t always get what you want? Put a little social engineering into your life and you\\\\\\\\\\\\\\\'ll never have to beg for anything again.
A quick description of what SE really is.
Please excuse the shortness of the article.
This is an article on the many ways and how a person can preform Social Engineering
yea it workx!!!
Most Read Articles
If you are stuck wondering were to start in your programming adventure this is the article for you.
Essay for school on Gold Rush. Not really about western society. Just added "western society" to make it sound more specific. But good Gold Rush info. Please comment. I can expand on it.
For Schools and Such
Guide to cracking wep keys for BEGINNERS!
A quick overview on a psychological condition known as "The Tetris Effect."
This tutorial will show you many Cgi-Bin exploits out there and tell you what they mean.
MySQL injection tutorial by sam207... please rate/comment it
Brute-Forcing Logins on Remote Services.
This article is for...wait....you got it....BASIC 1 TO 17!
This is a :"how-to-" and may contain some spoliers.
A small article examining the influence of Conway's Game of Life on the hacker culture.
A good place to start. Simple instructions for every challenge. *VERY MINOR spoilers*
50 WAYS TO CONFUSE, WORRY, OR JUST SCARE THE PEOPLE IN THE COMPUTER LAB. COPIED FROM www.duckshit.com
This is a list of strings that you could type into google and find a unprotected network camera.Enjoy!
How to become Admin on your school. This way works for most schools.
A quick intro on parsing web pages in python
Python, Ruby, C, C++ and Java.
How to be Anonymous online and more.
An overview of how electronics play a role in PLC development.
Basic overview of a PLC
This article hopefully teaches you how to use Google Search AJAX API in Python.
a walk through on the pen testing 2
Easy Home Networking Tips!
If you need hints because you are still stucked with pen test 2, this article is written for you.
Here's a list of Firefox Addons that everyone should have and use.
A guide to help you with the 'insane' realistic 18.
Offensive Security vs. Defensive Security general questions and answers essay.
This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng Results.
This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng options and syntax.
This is a quick guide that will help you understand the OSI model and the TCP/IP model. Both are fundamental when dealing with any kind of networking.
This is a guide on how to utilize Airmon-ng to be able to place a wireless interface into monitor mode, and be able to successfully use it.