Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /homepages/23/d746505582/htdocs/app746505800/wp-content/plugins/revslider/includes/operations.class.php on line 2854

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /homepages/23/d746505582/htdocs/app746505800/wp-content/plugins/revslider/includes/operations.class.php on line 2858

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /homepages/23/d746505582/htdocs/app746505800/wp-content/plugins/revslider/includes/output.class.php on line 3708
programming Archives - Page 2 of 3 - The Geekiest One
a

Lorem ipsum dolor sit amet, elit eget consectetuer adipiscing aenean dolor

programming Tag

Kerckhoff's Principle Kerckhoffs's principle, Wikipedia Encryption This video explains how the RSA public key and private key are created to be fully dependent on each other. The first part of the video explains the concepts with paint and colors. The second part contains heavy duty math, which may not be as easily understood: Public Key Cryptography: RSA

Boldly going where no man has gone before, the Kirk Ransomware brings so much nerdy goodness to the table that it could make anyone in IT interested. We have Star Trek, Low Orbital Ion Cannons, a cryptocurrency payment other than Bitcoin, and a decryptor named Spock! Need I say more? Discovered today by Avast malware researcher Jakub

In my previous post “Pentestit Lab v10 - The Mail Token”, we attained usernames through Intelligence Gathering, brute forced the SMTP Service, attained login credentials, and scored our first token. Today we will take our first steps at compromising the Global Data Security website - which will include the following: Mapping the Attack Surface

Introducing SQL Injection SQL injection has been around for at least 20 years, but it is no less powerful or dangerous than any other attack we have covered so far. It is designed to exploit flaws in a website or web application. The attack works by inserting code into an existing line of code prior

Low Orbit Ion Cannon (LOIC) is one the easiest DDoS tools available, yet its simplicity and remote connection features make it an extremely effective tool. In this guide I will show you just how easy it is to launch a DoS attack using LOIC. For this exercise I used a Windows Server 2008 client with

On Tuesday 7 March 2017, WikiLeaks began its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it's the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated

In my previous post “Pentestit Lab v10 - Introduction & Layout”, I covered the Network layout and VPN Connection. Today I will be covering the first steps taken to attack the lab - which will include the following: Fingerprinting the GW machine Carrying out Intelligence Gathering Brute Forcing SMTP Finding the Mail Token There are 13 Tokens in total scattered