Click here to Skip to main content
15,890,882 members
Everything / Hacking

Hacking

hacking

Great Reads

by Alexander Eremeev
The Windows kernel-hacking library and development framework written on C++17
by ASP.NET Community
suppose your url ishttp://www.xyz.com/defaultand some hacker try for hacking the website so type some script text on url
by _Ravikant Tiwari_
Code Injection - A Generic Approach for 32bit and 64bit Versions

Latest Articles

by Alexander Eremeev
The Windows kernel-hacking library and development framework written on C++17
by _Ravikant Tiwari_
Code Injection - A Generic Approach for 32bit and 64bit Versions
by ASP.NET Community
suppose your url ishttp://www.xyz.com/defaultand some hacker try for hacking the website so type some script text on url

All Articles

Sort by Title

Hacking 

22 Feb 2018 by Patrice T
Quote: Assistance to use olldbg bypass license verification Sorry, I don't help in such activity which is probably illegal.
22 Feb 2018 by phil.o
Most of us are professional programmers, who will never assist in any form of malicious activity. If you are a professional and need this tool, then pay for it. If you are not a professional or cannot afford its price, then you have to find a product which is cheaper, or free.
21 Sep 2013 by zinajoonjooni
hi expertsi log into my web site errors and any things. in my logs there is some referral links or request from russian websites ( with respect for Russians and all people ) that when i check these web sites ,there isn't any link or request to my site.also i got this error in my log from a...
21 Sep 2013 by phil.o
This probably has nothing to do with any hacking attempt of some sort.It seems to be a well know bug in Entity Framework (described here[^] for example, but you can find numerous of them if you just search for "A parameter named 'p__linq__0' already exists in the parameter collection" in any...
16 May 2020 by Richard MacCutchan
You probably need to initialise your handler by creating a List of the commands in the folder to speed lookup. Every time you read a command from the user you can check your list to see if it is valid. If so then build the actual command and...
16 May 2020 by RickZeeland
Maybe you can use Activator.CreateInstance. See: c# - Create an instance of a class from a string - Stack Overflow[^]
23 Dec 2016 by Member 12919601
So I've been very paranoid that someone could be hacking into my phone and viewing deleted data and files by simply having my WhatsApp accountWhat I have tried:I've asked many tech people and they haven't replied yet so please guys reply asap!
23 Dec 2016 by Patrice T
Quote:So I've been very paranoid that someone could be hacking into my phone and viewing deleted data and files by simply having my WhatsApp accountHacking an account can't allow such things.If ever it was known that an app was allowing those things, it would be discussed on forums by users....
7 Mar 2014 by _Ravikant Tiwari_
Code Injection - A Generic Approach for 32bit and 64bit Versions
4 Aug 2013 by Infinity Signal
I have EasyPHP installed,I am considering following as root directory:http://127.0.0.1/projects/Web%20Developement/aureus/files/I want user to be restricted to this directory and not able to get access to directory named aureus.I want all this configuration using .htaccess how can I...
4 Aug 2013 by Joezer BH
A possible algorithm for preventing directory traversal would be to:- Process URI requests that do not result in a file request, e.g., executing a hook into user code, before continuing below.- When a URI request for a file/directory is to be made, build a full path to the file/directory if...
7 Oct 2012 by Member 8476555
How to write my own firewall to detect the infiltrator ip . It is not a web application . How to make application like Wireshark or EtherealHow to Detect IP address in console/windows application in c# ?Doing it in Web site is easy but i am not getting how to detect the ip of...
14 Sep 2012 by Unareshraju
use below artical: How to get Real IP Address in asp.net?[^]
14 Sep 2012 by JF2015
Try this code:using System.Net;IPAddress[] localIPs = Dns.GetHostAddresses(Dns.GetHostName());foreach(IPAddress address in localIPs) MessageBox.Show(address.ToString());
14 Sep 2012 by Kuthuparakkal
1.1 Framework:StringBuilder sb = new StringBuilder();string strHostName = Dns.GetHostName();IPHostEntry ipEntry = Dns.GetHostByName(strHostName);IPAddress[] addr = ipEntry.AddressList;for (int i = 0; i
14 Sep 2012 by Mr. Mahesh Patel
hi deartry below code public void getLocalIPAddress(){ try { string sHostName = Dns.GetHostName(); IPHostEntry ipE = Dns.GetHostByName(sHostName); IPAddress[] IpA = ipE.AddressList; for (int i = 0; i
16 Sep 2012 by Dave Kreskowiak
You would have to write your own firewall to do this. You would also need to write a filter driver to insert into the network stack so you can pick out all the inbound traffic and get the addresses you're interested in.Oh, and you'll probably need to write some heuristics into your "filter"...
20 Aug 2013 by Member 8620759
I want to implement a feature in my project, where I need the details of mail sent and received on my laptop when the laptop is not with me. I also want to send a copy of the same email to my email Id. And need to do this stealth where user don't know about it. I want to implement this in c or...
20 Aug 2013 by OriginalGriff
I don't think you will get too much help with this: at best it is malicious, at worst it is illegal.Monitoring and / or intercepting communications, including electronic (particularly without the prior knowledge and consent of the user) is illegal in many countries. Indeed, it is one of the...
25 Sep 2013 by Sergey Alexandrovich Kryukov
To get to "admin site", you would need to know username/password of the admin, there is no another way.Besides, in certain sense, there is no such thing as "all pages". It may or may not be possible. Imagine you know just one URL. You can load this page, get all further link, load all pages...
17 Sep 2012 by PBGuy
is the file saved on a shared folder with adequate rights? just use identity property to know all about the remote user...You can try:string...
1 Jul 2012 by FahdSanaullah
Hi genius people!I'm a beginner (of computer security). Now, there's A LOT of stuff out there on internet regarding hacking. But, there's nothing really powerful. I mean there are just small hacks and tricks. What to do to get into real hacking for becoming a security expert? How to really...
1 Jul 2012 by Mehdi Gholam
Like any specialty it requires a lot of time and investment in gathering knowledge. You can not expect to become one over night.
1 Jul 2012 by idle63
Like Mehdi Gholam wrote take your time to learn the basics. Start with simple example. Try to understand “simple” things e.g. “what is a synch attack”. Then step by step and a lot of brain power are needed. You have to understand the things to in theirs basics to figure out the weak...
27 Feb 2015 by JeseemRazak619
My college is conducting a national level tech fest on next month.. pls provide me some ideas to conduct hacking . Sorry I know this is not the right . BT this is the only technical site am following so far. pls help me.....
27 Feb 2015 by OriginalGriff
We do not condone, support or assist in the production of malicious code in any way, form or manner. This is a professional site for professional developers. If you want to know how to create such things, you need to visit a hacking site: but be sure to disable all firewalls and antivirus...
26 Oct 2012 by Frank R. Haugen
Step 1: Look through relevant articles here: http://www.codeproject.com/KB/IP/[^]Step 2: Then read relevant articles here: http://www.codeproject.com/KB/security/[^]Step 3: And do a lot of google-ing, and look on youtube for collage lectures on the subjectTHEN come back and ask a...
10 Dec 2018 by Member 14084535
I have been trying to send a video to a small receiver using a series of high pitched noises that only the receiver can hear, but I can't find a way to convert the video into binary so that it is a text file. It is fine if it is in anything other than binary, but binary is preferred, as long as...
10 Dec 2018 by RickZeeland
Here is a collection of online tools: Convert Binary to Text - Online Binary Tools[^] But there will probably be a limit to the file length you can use ...
10 Dec 2018 by CPallini
Videos are stored in files. Files are binary (even text files are actually binary), so if you start with a video file (e.g. AVI, MP4) the you already have the binary data you need.
25 Feb 2016 by OriginalGriff
Even if we had enough information to tell you, we wouldn't.We do not condone, support or assist in the production of malicious code in any way, form or manner. This is a professional site for professional developers. And trying to circumvent the site restrictions is certainly malicious, if not...
7 Dec 2022 by Member 15855006
Hi, I have this website which was made for the specific reason to try sql injection, hence why it is not parametrized or uses prepared statements. I am new to SQL injection and I am trying to see how I can maybe bypa What I have tried: I have...
5 Dec 2022 by OriginalGriff
We do not condone, support, or assist in the production of malicious code in any way, form, or manner. This is a professional site for professional developers. If you want to know how to create such things, you need to visit a hacking site: but...
5 Dec 2022 by Richard Deeming
Google will find plenty of examples of bypassing simple filters like this. For example: SQL Injection: Bypassing Common Filters - PortSwigger[^]: If you do need to introduce a string in to your attack payload, you can do this without needing to...
25 Jun 2017 by Dave Kreskowiak
Nope. Not going to help you cheat.
6 Nov 2022 by GinCanhViet
I just checked the Event Viewer and saw multiple requests trying to login my mssql server, with multiple random IDs and passwords (sa, mssql, hawai, etc). All from multiple IP addresses How can I prevent that or what can I do to protect my...
6 Nov 2022 by Richard Deeming
Make sure your firewall is configured to block access to the ports used by MS SQL Server - typically TCP 1433, 4022, 135, and 1434, and UDP 1434. If you really need to access it from outside of your network, then look at setting up a VPN, or...
4 Apr 2016 by Member 11747036
Hello; I've been trying to get this code to work but all it does is give me weird numbers;#include #include #include using namespace std;int main(){ static int base = 0x00509B74; static int health = 0xF8; const int value =...
4 Apr 2016 by Jochen Arndt
You should check the return values of all API functions. It is very probable that one of them fails. If so, call GetLastError() to know why it fails.See also the OpenProcess function (Windows)[^]:Quote:To open a handle to another local process and obtain full access rights, you must enable...
10 Oct 2014 by ‫محم د‬‎
Hi I have an .apk file and I want to cange the data in that db file in assets folderBut when I extrack and change and agane compress file I cant install software !!whay ?how I can change data and file in apk files ??
10 Oct 2014 by E.F. Nijboer
The APK is signed with a private key to detect changes to the package and prevent installation when it is changed. This is for security reasons. Maybe you might be able to install it when you disable security options. Check settings for apps/security/dev options.Good luck!
23 Oct 2012 by StackQ
In my laptop it's showing some of the wireless network. But when I m trying to connect, asking for security key. so how can I get security key of wireless network.
23 Oct 2012 by OriginalGriff
The way to get the security key is to ask the owner of the network for it.
30 Jul 2023 by OriginalGriff
We do not condone, support, or assist in the production of malicious code in any way, form, or manner. This is a professional site for professional developers. If you want to know how to create such things, you need to visit a hacking site: but...
28 Dec 2013 by OriginalGriff
We do not support, assist or condone hacking in any form.This is a site for professional developers, not script kiddies.I suggest you go to a hacking site and ask there. But don't forget to disable your firewall and antivirus to show you trust them first...or they may not speak to you.
3 Jan 2013 by shaikh sabir
plz Go To Google And search Question Hurry...........
3 Jan 2013 by Sandeep Mewara
Wrong forum.... wrong website. Find some other place for such questions.
18 Feb 2013 by StackQ
Today i tried to open a .lic file,but i m unable to explore it even i spend 30 minutes on google.Before 2 years ago i used a tool to open install.wim file,and today once again i want to explore it ,but i forgot the name of that tools,Plz tell me the tools name which can explore .wim file and...
4 Aug 2016 by Member 12361187
In my college , i was trying to open youtube , but i am able to open youtube. please , tell me how to solve this problem??What I have tried:I was searched in internet and tried , but no use. with some websites , i am opening youtube but i was not supposed to download them..
4 Aug 2016 by OriginalGriff
The chances are that the college has prohibited YouTube and other sites deliberately to prevent students from wasting bandwidth on movies when they should be using the internet for research.As such, we are not here to help you bypass that restriction: it is their internet connection, it is...
4 Aug 2016 by F-ES Sitecore
c0nTakt ur sys4dm1n bR0 n t311 m u w4Nt 4l1 teh int3RN3tz!!1
4 Aug 2016 by Patrice T
Simple, you just need to get the unlocking pass code from the NetAdmin.But you are a student and the filter is here to prevent what you want to do.And your question just confirmed that the filter is here for good reasons.
16 Nov 2015 by Devendra lodha
Hi All,Hope you are doing well.I've suffering from hacker attack for one of my client website.Each and ever time anonymous user adding unwanted code and hyperlink on my website home page(default.aspx).These hyperlinks he added bottom of my default.aspx page.Due to above code web page...
16 Nov 2015 by Afzaal Ahmad Zeeshan
This is a very broad question. But, start by revoking any "write" access to your users, unless they are admin and then try to secure your control panel. Unless that is someone from within, he won't be able to access it. Also, try to see who makes changes, thus "source control" is always a...
16 Nov 2015 by F-ES Sitecore
The main things to look for are SQL Injection attacks, and possibly XSS, as well as other issues like weak passwords etc. Ultimately it's a massive subject, far too big for here. If you're serious then get the code scanned using a tool like HP's Fortify, and there will be others. You can also...
18 Nov 2015 by AdamASPGeek
Just find yesterday post on social media, it is good explanation and maybe it will be helpful for you, just readt http://bit.ly/1lhLnHh
25 Nov 2015 by Devendra lodha
Thanks for the help.I have checked the vulnerabilities and removed all unwanted filed from the root directory and changed the all Access credentials of C Panel including FTP.Currently site is safe.Thanks.Have a good day.
16 Dec 2020 by Member 14056957
[+] Request >> Exception TypeError: "'module' object has no attribute '__getitem__'" in 'netfilterqueue.global_callback' ignored Exception IndexError: IndexError('Layer [TCP] not found',) in 'netfilterqueue.global_callback' ignored These two errors come while executing my python code given: ...
13 Jul 2020 by Member 14888563
hi I would change your if statement to: if scapy.Raw in scapy_packet and scapy.TCP in scapy_packet: instead of: if scapy_packet.haslayer(scapy.Raw):
16 Dec 2020 by Member 15022892
Compare this with yours though its the same code but I changed some variables. Make sure your are testing it on http(port 80) not https(port443) and be mindful of your indents too import netfilterqueue import scapy.all as scapy import re def...
28 Sep 2015 by F-ES Sitecore
Every scammer wants to do this as well, this is not an appropriate forum for such questions.
24 May 2012 by Prasad_Kulkarni
You must post it in Right Forum[^]
24 May 2012 by Maciej Los
No, it isn't!Why could it be?