Click here to Skip to main content
15,890,579 members
Everything / Hacking

Hacking

hacking

Great Reads

by Alexander Eremeev
The Windows kernel-hacking library and development framework written on C++17
by ASP.NET Community
suppose your url ishttp://www.xyz.com/defaultand some hacker try for hacking the website so type some script text on url
by _Ravikant Tiwari_
Code Injection - A Generic Approach for 32bit and 64bit Versions

Latest Articles

by Alexander Eremeev
The Windows kernel-hacking library and development framework written on C++17
by _Ravikant Tiwari_
Code Injection - A Generic Approach for 32bit and 64bit Versions
by ASP.NET Community
suppose your url ishttp://www.xyz.com/defaultand some hacker try for hacking the website so type some script text on url

All Articles

Sort by Updated

Hacking 

4 Nov 2011 by #realJSOP
What company do you work for?
7 Mar 2014 by _Ravikant Tiwari_
Code Injection - A Generic Approach for 32bit and 64bit Versions
18 Nov 2015 by AdamASPGeek
Just find yesterday post on social media, it is good explanation and maybe it will be helpful for you, just readt http://bit.ly/1lhLnHh
16 Nov 2015 by Afzaal Ahmad Zeeshan
This is a very broad question. But, start by revoking any "write" access to your users, unless they are admin and then try to secure your control panel. Unless that is someone from within, he won't be able to access it. Also, try to see who makes changes, thus "source control" is always a...
1 Nov 2018 by Alexander Eremeev
The Windows kernel-hacking library and development framework written on C++17
11 Oct 2013 by ASP.NET Community
suppose your url ishttp://www.xyz.com/defaultand some hacker try for hacking the website so type some script text on url
4 Nov 2011 by cechode
thought i do not disagree with the other comments above. here's an answeruse a proxy server[^]just google internet proxy you'll get plenty of ways to get fired
4 Jan 2014 by Christian Graus
What does this have to do with Linux, or MySQL ? PHP can't do this. It runs on the server, which I assume you don't want to put to sleep. It generates HTML, which runs in a browser. HTML and javascript cannot put a computer to sleep.
10 Dec 2018 by CPallini
Videos are stored in files. Files are binary (even text files are actually binary), so if you start with a video file (e.g. AVI, MP4) the you already have the binary data you need.
16 Sep 2012 by Dave Kreskowiak
You would have to write your own firewall to do this. You would also need to write a filter driver to insert into the network stack so you can pick out all the inbound traffic and get the addresses you're interested in.Oh, and you'll probably need to write some heuristics into your "filter"...
8 Dec 2016 by Dave Kreskowiak
Contact your cloud host provider and explain it to them.
25 Jun 2017 by Dave Kreskowiak
Nope. Not going to help you cheat.
16 Nov 2015 by Devendra lodha
Hi All,Hope you are doing well.I've suffering from hacker attack for one of my client website.Each and ever time anonymous user adding unwanted code and hyperlink on my website home page(default.aspx).These hyperlinks he added bottom of my default.aspx page.Due to above code web page...
25 Nov 2015 by Devendra lodha
Thanks for the help.I have checked the vulnerabilities and removed all unwanted filed from the root directory and changed the all Access credentials of C Panel including FTP.Currently site is safe.Thanks.Have a good day.
4 Nov 2011 by Dr.Walt Fair, PE
I would ask your IT group. If they won't help, then wait until you get outside the company firewall. If you don't want to talk to them about it, then why do you want to bypass your employer's policy? That would probably be grounds for dismissal.
13 Nov 2013 by Dycz
Hi everybody, I am currently working on a .NET portal and today my collegue and I stopped a moment to think about our portal security from hackers. I realized I am not prepared enough to discuss this issue professionally, so I was wondering... Is there any good reading you'd suggest on...
10 Oct 2014 by E.F. Nijboer
The APK is signed with a private key to detect changes to the package and prevent installation when it is changed. This is for security reasons. Maybe you might be able to install it when you disable security options. Check settings for apps/security/dev options.Good luck!
28 Sep 2015 by F-ES Sitecore
Every scammer wants to do this as well, this is not an appropriate forum for such questions.
16 Nov 2015 by F-ES Sitecore
The main things to look for are SQL Injection attacks, and possibly XSS, as well as other issues like weak passwords etc. Ultimately it's a massive subject, far too big for here. If you're serious then get the code scanned using a tool like HP's Fortify, and there will be others. You can also...
4 Aug 2016 by F-ES Sitecore
c0nTakt ur sys4dm1n bR0 n t311 m u w4Nt 4l1 teh int3RN3tz!!1
1 Jul 2012 by FahdSanaullah
Hi genius people!I'm a beginner (of computer security). Now, there's A LOT of stuff out there on internet regarding hacking. But, there's nothing really powerful. I mean there are just small hacks and tricks. What to do to get into real hacking for becoming a security expert? How to really...
4 Nov 2011 by fire_hawk
Need help, my company is blocking facebook, i need help on how to bypass it, he blocked from our router.any help pls.David.
26 Oct 2012 by Frank R. Haugen
Step 1: Look through relevant articles here: http://www.codeproject.com/KB/IP/[^]Step 2: Then read relevant articles here: http://www.codeproject.com/KB/security/[^]Step 3: And do a lot of google-ing, and look on youtube for collage lectures on the subjectTHEN come back and ask a...
6 Nov 2022 by GinCanhViet
I just checked the Event Viewer and saw multiple requests trying to login my mssql server, with multiple random IDs and passwords (sa, mssql, hawai, etc). All from multiple IP addresses How can I prevent that or what can I do to protect my...
6 Dec 2013 by Hamassss
Well since password is hashed with md5 and u already know it is first letter m + 1-4 digits it should be fast;[edit]Hacking code removed[/edit]
3 Dec 2013 by hamed.shams40
HiIs it possible for a cracker to gain D of a RSA Key (The Private Key) when he has it's Modulus, Exponent, P, Q, DP, DQ, InverseQ ?Means can these (Except of D) be shared with others ?Or All of them are as secure as D ?
1 Jul 2012 by idle63
Like Mehdi Gholam wrote take your time to learn the basics. Start with simple example. Try to understand “simple” things e.g. “what is a synch attack”. Then step by step and a lot of brain power are needed. You have to understand the things to in theirs basics to figure out the weak...
4 Aug 2013 by Infinity Signal
I have EasyPHP installed,I am considering following as root directory:http://127.0.0.1/projects/Web%20Developement/aureus/files/I want user to be restricted to this directory and not able to get access to directory named aureus.I want all this configuration using .htaccess how can I...
4 Nov 2011 by Jackie00100
wrong forum this is a programming kind of forum and why the... will you be on facebook? they sell your privatcy, you're most likely working and there migth be a good reason to why it is blocked... however use a proxy server or a phone modem or a facebook backdoor...
27 Feb 2015 by JeseemRazak619
My college is conducting a national level tech fest on next month.. pls provide me some ideas to conduct hacking . Sorry I know this is not the right . BT this is the only technical site am following so far. pls help me.....
14 Sep 2012 by JF2015
Try this code:using System.Net;IPAddress[] localIPs = Dns.GetHostAddresses(Dns.GetHostName());foreach(IPAddress address in localIPs) MessageBox.Show(address.ToString());
4 Apr 2016 by Jochen Arndt
You should check the return values of all API functions. It is very probable that one of them fails. If so, call GetLastError() to know why it fails.See also the OpenProcess function (Windows)[^]:Quote:To open a handle to another local process and obtain full access rights, you must enable...
4 Aug 2013 by Joezer BH
A possible algorithm for preventing directory traversal would be to:- Process URI requests that do not result in a file request, e.g., executing a hook into user code, before continuing below.- When a URI request for a file/directory is to be made, build a full path to the file/directory if...
14 Sep 2012 by Kuthuparakkal
1.1 Framework:StringBuilder sb = new StringBuilder();string strHostName = Dns.GetHostName();IPHostEntry ipEntry = Dns.GetHostByName(strHostName);IPAddress[] addr = ipEntry.AddressList;for (int i = 0; i
24 May 2012 by Maciej Los
No, it isn't!Why could it be?
1 Jul 2012 by Mehdi Gholam
Like any specialty it requires a lot of time and investment in gathering knowledge. You can not expect to become one over night.
13 Nov 2013 by Mehdi Gholam
Start here : ASP.NET web application security review: Do's & Don'ts[^]
3 Dec 2013 by Mehdi Gholam
Yes it is possible through brute force but it is not probable.You are advised to stick to the RSA guidelines on publishing and securing keys and not deviate.
6 Dec 2013 by Member 10449498
I need to know how to break the password in this code, its just a test question nothing malicious.http://i.imgur.com/I4F5lK4.png[^]
4 Apr 2016 by Member 11747036
Hello; I've been trying to get this code to work but all it does is give me weird numbers;#include #include #include using namespace std;int main(){ static int base = 0x00509B74; static int health = 0xF8; const int value =...
4 Aug 2016 by Member 12361187
In my college , i was trying to open youtube , but i am able to open youtube. please , tell me how to solve this problem??What I have tried:I was searched in internet and tried , but no use. with some websites , i am opening youtube but i was not supposed to download them..
23 Dec 2016 by Member 12919601
So I've been very paranoid that someone could be hacking into my phone and viewing deleted data and files by simply having my WhatsApp accountWhat I have tried:I've asked many tech people and they haven't replied yet so please guys reply asap!
16 Dec 2020 by Member 14056957
[+] Request >> Exception TypeError: "'module' object has no attribute '__getitem__'" in 'netfilterqueue.global_callback' ignored Exception IndexError: IndexError('Layer [TCP] not found',) in 'netfilterqueue.global_callback' ignored These two errors come while executing my python code given: ...
9 Dec 2018 by Member 14082835
SqlDateTime overflow.Will causes any issues ? If yes what are those ? is any kind of hacking or bypassing age restriction is possible in this case ? I don't have any knowledge on programming... What I have tried: We have a website with age restriction. If a user want to register in our...
10 Dec 2018 by Member 14084535
I have been trying to send a video to a small receiver using a series of high pitched noises that only the receiver can hear, but I can't find a way to convert the video into binary so that it is a text file. It is fine if it is in anything other than binary, but binary is preferred, as long as...
13 Jul 2020 by Member 14888563
hi I would change your if statement to: if scapy.Raw in scapy_packet and scapy.TCP in scapy_packet: instead of: if scapy_packet.haslayer(scapy.Raw):
16 Dec 2020 by Member 15022892
Compare this with yours though its the same code but I changed some variables. Make sure your are testing it on http(port 80) not https(port443) and be mindful of your indents too import netfilterqueue import scapy.all as scapy import re def...
7 Dec 2022 by Member 15855006
Hi, I have this website which was made for the specific reason to try sql injection, hence why it is not parametrized or uses prepared statements. I am new to SQL injection and I am trying to see how I can maybe bypa What I have tried: I have...
7 Oct 2012 by Member 8476555
How to write my own firewall to detect the infiltrator ip . It is not a web application . How to make application like Wireshark or EtherealHow to Detect IP address in console/windows application in c# ?Doing it in Web site is easy but i am not getting how to detect the ip of...
20 Aug 2013 by Member 8620759
I want to implement a feature in my project, where I need the details of mail sent and received on my laptop when the laptop is not with me. I also want to send a copy of the same email to my email Id. And need to do this stealth where user don't know about it. I want to implement this in c or...
14 Sep 2012 by Mr. Mahesh Patel
hi deartry below code public void getLocalIPAddress(){ try { string sHostName = Dns.GetHostName(); IPHostEntry ipE = Dns.GetHostByName(sHostName); IPAddress[] IpA = ipE.AddressList; for (int i = 0; i
25 Jun 2012 by OriginalGriff
Do you seriously think that a professional site, for professionals, by professionals, is a good place to try to learn to be a dickhead?
23 Oct 2012 by OriginalGriff
The way to get the security key is to ask the owner of the network for it.
20 Aug 2013 by OriginalGriff
I don't think you will get too much help with this: at best it is malicious, at worst it is illegal.Monitoring and / or intercepting communications, including electronic (particularly without the prior knowledge and consent of the user) is illegal in many countries. Indeed, it is one of the...
6 Dec 2013 by OriginalGriff
No.We do not assist with any form of hacking cracking or other activity that could be seen as malicious. And password hacking is that.Please do not ask again.
28 Dec 2013 by OriginalGriff
We do not support, assist or condone hacking in any form.This is a site for professional developers, not script kiddies.I suggest you go to a hacking site and ask there. But don't forget to disable your firewall and antivirus to show you trust them first...or they may not speak to you.
27 Feb 2015 by OriginalGriff
We do not condone, support or assist in the production of malicious code in any way, form or manner. This is a professional site for professional developers. If you want to know how to create such things, you need to visit a hacking site: but be sure to disable all firewalls and antivirus...
25 Feb 2016 by OriginalGriff
Even if we had enough information to tell you, we wouldn't.We do not condone, support or assist in the production of malicious code in any way, form or manner. This is a professional site for professional developers. And trying to circumvent the site restrictions is certainly malicious, if not...
4 Aug 2016 by OriginalGriff
The chances are that the college has prohibited YouTube and other sites deliberately to prevent students from wasting bandwidth on movies when they should be using the internet for research.As such, we are not here to help you bypass that restriction: it is their internet connection, it is...
9 Dec 2018 by OriginalGriff
The first thing you need to learn is to validate inputs: That means checking what the user typed to make sure it is correct, valid, and reasonable data. For a "year of birth" value, "0001" is not valid - it is not reasonable to assume that anyone born over 2,000 years ago is still alive! So read...
5 Dec 2022 by OriginalGriff
We do not condone, support, or assist in the production of malicious code in any way, form, or manner. This is a professional site for professional developers. If you want to know how to create such things, you need to visit a hacking site: but...