|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 149
Members: 0
Total: 149
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Things Which A Wannabe Hacker Must Be Knowing! |
|
Posted: Sun Aug 10, 2008 4:52 pm |
|
|
F4r4Zm0In |
Active user |
|
|
Joined: Feb 17, 2008 |
Posts: 30 |
|
|
|
|
|
|
|
This Article Is Not Meant For Advanced Users
Things Which A Wannabe Hacker Must Be Knowing!
Open Source Software Disadvantages
Open Source software can be downloaded and analysed manually and locally on the attackers’ host. If it is self made it’s harder
to get the source code what really helps on finding a bug to slip trough and get access.
There are so many different bugs in different applications especially in audited Open
Source software that it becomes easier to get into the targeted site.
buffer overflows:
A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold.
Shellcode
"Shellcode" is the name given to small pieces of assembly language which are used to launch shells, typically as a result of a buffer overflow.
SQL Injection
SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application.
SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution.
It allows attacker to execute database query in url and gain access to some confidential information.
Script kiddie
The lowest form of cracker; script kiddies do mischief with scripts and rootkits written by others, often without understanding the exploit .
script kiddie is someone who tries to get their name known in the underground community by using publicly available exploits/programs that
were made by real hackers
Sandbox
sandbox is used to test applications and make sure they are safe
You can choose any operating system you would like to use.
Defacement
Chances are you have probably seen those "HACKED BY SAUDI_H4CK3R & DaRkViRuZ"
type of webpages. This is what is called a defacement
Original Source Hackers-Community.Uk.To
Say Thanks If You Like My Work |
|
|
|
|
|
|
|
|
Posted: Sun Aug 10, 2008 5:09 pm |
|
|
calumrulez |
Regular user |
|
|
Joined: Apr 22, 2008 |
Posts: 12 |
|
|
|
|
|
|
|
|
|
|
|
Posted: Sun Aug 10, 2008 8:32 pm |
|
|
lenny |
Valuable expert |
|
|
Joined: May 15, 2008 |
Posts: 275 |
|
|
|
|
|
|
|
Emphasis on the mocking people give script kiddies. Script kiddies are the *lowest* of the low. |
|
|
|
|
Posted: Mon Jun 14, 2010 4:55 pm |
|
|
earthquaker |
Advanced user |
|
|
Joined: Jun 02, 2008 |
Posts: 111 |
Location: q8 |
|
|
|
|
|
|
this is neat and clear i liked it, ill translate it into arabic and use it in one of my lectures so regular users can get more knowledge about it since regular people cant realize the difference between hackers\crackers\skids
P.S: who should i give the credit to? |
|
|
|
|
www.waraxe.us Forum Index -> Tutorials
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|