Wednesday, August 29, 2012

Wordlists manipulation and generation with Backtrack 5R2 Crunch application Tutorial provided by Keeper Brief Introduction: Ok. This tutorial is going to introduce you with a Backtrack application...

Hashing Algorithms and Types Tutorial provided by Admin DES(Unix) Example: IvS7aeT4NzQPM Used in Linux and other similar OS. Length: 13 characters. Description: The first two characters are the salt (random characters; in our example the salt is the string "Iv"), then there follows the actual...

Tuesday, August 28, 2012

Full Ultimate Cross-Site Scripting (XSS) Tutorial Tutorial provided by Zer0Pwn Hello and thanks for reading this tutorial on XSS, written by me. You may be asking as to why I'm creating this tutorial. My inbox has lately been flooding, and I've recieved a lot of requests on making this tutorial....

Monday, August 27, 2012

This summary is not available. Please click here to view the po...

Local File Inclusion to shell upload Tutorial provided by ๖ۣۜΗ α x O r ♥ Things you will need: 1) Site vulnerable to LFI ( http://www.bislig.gov.ph ) 2) Remote shell ( http://www.sh3ll.org/egy.txt ) 3) User-Agent switcher ( https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/...