The Null Byte Exploit

January 13, 2010 0 Comments 0 tags

Many web forums have mushroomed on internet and they are setup in a jiffy,so they wont pay much attention to security. An older exploit I m discussing here is The

Finding vulnerabilities in PHP scripts

January 11, 2010 0 Comments 0 tags

Contents : * 1) About * 2) Some stuff * 3) Remote File Inclusion * 3.0 – Basic example * 3.1 – Simple example * 3.2 – How to fix

Reverse SSH Tunneling (NAT)

January 7, 2010 0 Comments 0 tags

Have you ever wanted to ssh to your Linux box that sits behind NAT? Now you can with reverse SSH tunneling. This document will show you step by step how

NMAP Tutorial

January 6, 2010 0 Comments 0 tags

So… let’s say that you donwloaded NMAP in one of its latest versions, if you didn’t then go get it immediately! And come back only when you have it. http://nmap.org/download.html

Subnetting an IP address

January 2, 2010 0 Comments 0 tags

IP subnetting is a fundamental subject that’s critical for any IP network engineer to understand, yet students have traditionally had a difficult time grasping it. Over the years, I’ve watched

Local File Download Theory

December 29, 2009 0 Comments 0 tags

1 What's Local File Download(LFD)? - Local file download is kind of misconfigured web master or webdeveloper on php application. 2 Effect 2.1 Personal/website - You will able to view

Make your own Hardend Internet Firewall

December 26, 2009 0 Comments 0 tags

Make your own “Hardend Internet Firewall” using that forgotton PC in your basement. Yes.. You know the PC I am talking about. We all have them. Remember that $3000 Pentium