Skip to main content

Articles

Phone Lines, war dialing, laptops & the like

posted onOctober 9, 2002
by hitbsecnews

By: Zaxil

This being the first article I've wrote for something like this I thought I would start out with something simple to stop any of you kiddies from getting yourselves caught for playing with things. A lot of places are very worried and push for legal action to be taken even over nothing. Lets get started. Well make a few assumptions in this. The first and vital part being you know how to think for yourself and how to learn more on things that your not sure on (google.com).

When code goes wrong - Format String Exploition

posted onOctober 9, 2002
by hitbsecnews

By: DangerDuo

This article first appeared over at our affiliates site BCVG. The original article can be found here.

I will try to keep this article as short and as easy to understand as possible so the average people would understand this concept.

What is Format String?

Formatstring are the %d, %s, %u, %x, %p %n in your C langauge that you use when using printf and something similar.

How is it vulernable?

Demystifying Remote Host

posted onOctober 9, 2002
by hitbsecnews

By:Abhisek Datta

This manual will present a concise overview on the methods used to gather necessary information about a remote host targeted for hacking or for some its cracking. Starting from basic newbie friendly methods like Banner Grabbing, TTL value detection, this manual will cover advanced method of detecting the Operating System running by the remote host like ICMP Error Messaging Quenching, ICMP Error Message Quoting, Initial Sequence Number Sampling, Sniffing Packets etc. Note: Basic knowledge about TCP/IP implementation is suggested.

SOTHA #8

posted onOctober 9, 2002
by hitbsecnews

By: MadSaxon

The State of The Hack Awards #8: July, 2002.

M0cking 14m3rZ >= 2K

The State of The Hack Awards #8
July, 2002
by MadSaxon

M0cking 14m3rZ >= 2K

Number of defacements reviewed this month:
1361

Passport Hijacking

posted onJune 26, 2002
by hitbsecnews

Note: This article first appeared over at our affiliates site Eye On Security. The original article can be found here

By: Obscure

Web Applications are made to extend the usability of the HTTP protocol, along with the efficiency of HTML, JavaScript and so on. The big advantage of Web Applications is that they are immediately accessible, relatively easy to use and can be centrally customised by the developer, at the expense of security issues.

Simplenews subscription

Stay informed - subscribe to our newsletter.
The subscriber's email address.
Keeping Knowledge Free for Over a Decade

Copyright © 2018 Hack In The Box. All rights reserved.

36th Floor, Menara Maxis, Kuala Lumpur City Centre 50088 Kuala Lumpur Malaysia
Tel: +603-2615-7299 Fax: +603-2615-0088