Wordlists manipulation and generation with Backtrack 5R2 Crunch application
Tutorial provided by
Keeper
Brief Introduction:
Ok. This tutorial is going to introduce you with a Backtrack application...
Hashing Algorithms and Types
Tutorial provided by
Admin
DES(Unix)
Example: IvS7aeT4NzQPM
Used in Linux and other similar OS.
Length: 13 characters.
Description: The first two characters are the salt (random characters; in our example the salt is the string "Iv"), then there follows the actual...
Full Ultimate Cross-Site Scripting (XSS) Tutorial
Tutorial provided by
Zer0Pwn
Hello and thanks for reading this tutorial on XSS, written
by me. You may be asking as to why I'm creating this tutorial. My inbox has
lately been flooding, and I've recieved a lot of requests on making this
tutorial....
Local File Inclusion to shell upload
Tutorial provided by
๖ۣۜΗ α x O r ♥
Things you will need:
1) Site vulnerable to LFI ( http://www.bislig.gov.ph )
2) Remote shell ( http://www.sh3ll.org/egy.txt )
3) User-Agent switcher (
https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/...