All Posts

Check out all of the blog posts written by the hackers education team.

Featured Blog Posts

A PHP Login and Register System With MYSQL

In this short guide i will cover the basics of setting up a PHP login and registration system. I will include the mysql file and PHP code files for you to feel free to copy and paste.Its very important to have a secure login and registration system that uses...

PHP Sanitisation

In this little guide/post we will cover the basics of sanitisation in PHP, with some code snippets and why you should use them. User inputted data. If a user inputs data onto your site directly into a mysql database, it can often be a direct point of vulnrability. The...

Understanding Orcus Rat, and Why the Owner may be facing jailtime.

In modern day society there are a lot of threats that come about the internet. The biggest risk to the average user is a smart developer, now there are two types of developers legal and illegal with many big differences. The bigest issue with malware in the modern day...

All Posts

Protect Yourself From Skype Resolvers

Skype resolvers – what do they do?Imagine a website, where you can simply put in a Skype username and press “Go” – and instantly you have their IP address.Well that’s simply what a Skype resolvers does; they fetch your IP from your Skype username.Unfortunately, it’s...

Windows Password Cracking

We are going to learn to understand and learn to crack windows passwordT A B L E O F C O N T E N T S :1 – What is NTLM?2 – How does NTLM work?3 – Windows Integrated Authentication4 – Pass the Hash5 – NTLM Relaying Methods (including EXTERNAL relaying)6 – Security...

Understanding Doxing and Footprint Removal

INDEX:– What is doxing?– Where do you begin?– What methods of gaining user info exist?– Googling– Social Media Websites– Social Engineering– Databases– Whois– Final Word– Credits– Sources– WebsitesWhat is doxing?Doxing (named after documents, “dox”) is the act of...

An Introduction To Computer Ethics

Table of Contents I. IntroductionII. Remain IncognitoIII. Protecting Yourselfi. Onlineii. OfflineIV. Resources     IntroductionThis guide is brought to you by Insight. Before I begin, I would first like to introduce myself. My name is .Sinister, and I will be...

Staying Safe Online (Basic)

We are going to be covering how to stay safe on the internet now there are a lot of benefits to this.1. You can hide your IP address which means you won’t get DDOS attacks sent to your home connection.2. To stay hidden on websites that you don’t want tracked by your...

How Malware Is Spread

First of all these methods are posted in order to allow you to understand basic methods people use to spread malware this should not be treated as a guide to spread malware.[Method 1]This strategy is a truly no doubt understood system yet regardless it lives up to...

Choose Your Password

There are a bunch of articles here on internets that speaks about the choice of a password. What stroke me in these is the lack of example.Authors usually say “Use a password of a minimal length of 8 characters”, without explaining. This kind of article never made me...

Safely Setup A Rat

So far it seems there are no clear tutorials on how to setup a fully functioning rat, i will add some extra security tips. Please note this is purely for educational purposes and should only be used in legal situations.What we will need.A Functioning Rat (DarkComet...

Tor : The Basics

How Tor has the answerThere are two key aspects to onion routing. First, the Tor network is composed of volunteers who use their computers as “nodes.” As mentioned earlier, during normal browsing, information travels across the Internet in packets. When a Tor user...

Modern Day Hacking Group – Lizard Squad

Lizard SquadThis group came to a short burst of fame before slowly dying out. They made a name for themselves during the Christmas of 2014. This was not the groups first attack that was documented.The first documented recall of this group goes back to the League Of...

Nmap’s Usage as a Vulnerability Scanner

One commonly overlooked function of Nmap is its usage as a vulnerability scanner and and even an exploit payload deliverer. Through the NSE (Nmap Scripting Engine) pentesters and security researchers have developed scripts for nmap that enable the framework to scan...

Five of the Most Destructive Viruses Ever

Sometimes getting rid of a computer virus is as easy as pressing scan on your favorite antivirus software, but sometimes viruses can be much harder to get rid of. Here are five of the most destructive and widely spread computer worms and viruses in history.5. ZeusZeus...

The Deep Web and the Dark Web

As a Hackers Education reader, you probably have heard the terms 'Deep Web' and 'Dark Web' before. Although these terms sound alike and are often confused, the two act very differently from each other. Although the Deep Web sounds like something confusing and unknown,...

A Beginner Guide To Hacking

This in no way will turn you into a hacker just unskid yourself--Introduction--So you want to learn hacking? First we need to ask ourselves why we are doing this? Is it for financial gain? Is it because you watched Mr. Robot and are now hype? Once we have figured out...

Follow Along

Want to get updates from the site team, find out about new must to read articles. Get exclusive content only for email subscribers use the form below. We promise we will never spam you.