Waraxe IT Security Portal
Login or Register
November 21, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 149
Members: 0
Total: 149
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Tutorials -> Things Which A Wannabe Hacker Must Be Knowing!
Post new topicReply to topic View previous topic :: View next topic
Things Which A Wannabe Hacker Must Be Knowing!
PostPosted: Sun Aug 10, 2008 4:52 pm Reply with quote
F4r4Zm0In
Active user
Active user
Joined: Feb 17, 2008
Posts: 30




This Article Is Not Meant For Advanced Users

Things Which A Wannabe Hacker Must Be Knowing!

Open Source Software Disadvantages

Open Source software can be downloaded and analysed manually and locally on the attackers’ host. If it is self made it’s harder
to get the source code what really helps on finding a bug to slip trough and get access.

There are so many different bugs in different applications especially in audited Open
Source software that it becomes easier to get into the targeted site.


buffer overflows:

A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold.


Shellcode

"Shellcode" is the name given to small pieces of assembly language which are used to launch shells, typically as a result of a buffer overflow.


SQL Injection

SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application.
SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution.
It allows attacker to execute database query in url and gain access to some confidential information.


Script kiddie

The lowest form of cracker; script kiddies do mischief with scripts and rootkits written by others, often without understanding the exploit .
script kiddie is someone who tries to get their name known in the underground community by using publicly available exploits/programs that
were made by real hackers


Sandbox

sandbox is used to test applications and make sure they are safe
You can choose any operating system you would like to use.

Defacement

Chances are you have probably seen those "HACKED BY SAUDI_H4CK3R & DaRkViRuZ"
type of webpages. This is what is called a defacement

Original Source Hackers-Community.Uk.To

Say Thanks If You Like My Work Cool


Last edited by F4r4Zm0In on Sat Dec 26, 2009 7:08 pm; edited 1 time in total

_________________
http://hacking.isgreat.org
View user's profile Send private message Visit poster's website
PostPosted: Sun Aug 10, 2008 5:09 pm Reply with quote
calumrulez
Regular user
Regular user
Joined: Apr 22, 2008
Posts: 12




gd post, thanks
View user's profile Send private message
PostPosted: Sun Aug 10, 2008 8:32 pm Reply with quote
lenny
Valuable expert
Valuable expert
Joined: May 15, 2008
Posts: 275




Emphasis on the mocking people give script kiddies. Script kiddies are the *lowest* of the low.
View user's profile Send private message
PostPosted: Mon Jun 14, 2010 4:55 pm Reply with quote
earthquaker
Advanced user
Advanced user
Joined: Jun 02, 2008
Posts: 111
Location: q8




this is neat and clear i liked it, ill translate it into arabic and use it in one of my lectures so regular users can get more knowledge about it since regular people cant realize the difference between hackers\crackers\skids

P.S: who should i give the credit to?
View user's profile Send private message
Things Which A Wannabe Hacker Must Be Knowing!
www.waraxe.us Forum Index -> Tutorials
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.036 Seconds