Attacks against databases have become one of the most popular and lucrative activities for hackers recently. New data breache ...
Hacking web applications can sometimes be challenging due to the sheer amount of moving parts they possess. At the core of th ...
Password cracking is a specialty of some hackers, and it's often thought that raw computing power trumps everything else. Tha ...
File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't ...
Anyone who has used Linux long enough is familiar with sudo. Short for superuser do (or substitute user do, depending on who ...
It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important ...
Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web ...
There are many password-cracking tools out there, but one of the mainstays has always been John the Ripper. It's a powerful p ...
One of the first steps when pentesting a website should be scanning for hidden directories. It is essential for finding valua ...
No operating system is stricken with as many vulnerabilities as Windows, and it's often a race to release the latest patches ...