Learning C – Part 1 Variables
“One man’s constant is another man’s variable” -Alan Perlis, Epigrams on Programming, 1982 To kick off our C series, I figured we should go over one of the most common…
Read more »Attacks Explained – SQL Injection
SQL Injection (SQLi) About SQL Injection is an incredibly common form of attack that comes from non-sanitized inputs that communicate with an SQL Database of some form. While the exact…
Read more »Standards Explained – HTTP Requests
HTTP Requests The Hyper Text Transfer Protocol (HTTP) contains main different standards that work together to give us the protocol we know today. One of the major standards of HTTP…
Read more »Attacks Explained – XSS
Cross Site Scripting (XSS) About Cross Site Scripting (XSS) is a common vulnerability often found in web sites and web applications where an attacker can execute code that affects users….
Read more »Hack The Box: Valentine Writeup
“The existence of this fault on a server undermines any confidence in the confidentially of keys that have been used on that server.” –Erik Heidt on the Heartbleed Exploit Youtube…
Read more »Simple PHP Shell
X9 Security Simple PHP Shell This simple PHP shell contains all of the features a pentester would need to pivot their shell easily or explore a remote system. With a…
Read more »EBuster v1.1
Entropy Buster v1.1 Entropy Buster or EBuster for short was inspired by Mining Mimecast: brute forcing your way to success by Paul Price. The attack he talked about is actually surprisingly…
Read more »Xorus’ Guide to Hacking
“There are few sources of energy so powerful as a procrastinating college student.” -Paul Graham, Hackers & Painters: Big Ideas from the Computer Age What is in a title? Hacking is…
Read more »