Protect Yourself From Skype Resolvers
Skype resolvers – what do they do?Imagine a website, where you can simply put in a Skype username and press “Go” – and instantly you have their IP address.Well that’s simply what a Skype resolvers does; they fetch your IP from your Skype username.Unfortunately, it’s...
Windows Password Cracking
We are going to learn to understand and learn to crack windows passwordT A B L E O F C O N T E N T S :1 – What is NTLM?2 – How does NTLM work?3 – Windows Integrated Authentication4 – Pass the Hash5 – NTLM Relaying Methods (including EXTERNAL relaying)6 – Security...
Understanding Doxing and Footprint Removal
INDEX:– What is doxing?– Where do you begin?– What methods of gaining user info exist?– Googling– Social Media Websites– Social Engineering– Databases– Whois– Final Word– Credits– Sources– WebsitesWhat is doxing?Doxing (named after documents, “dox”) is the act of...
An Introduction To Computer Ethics
Table of Contents I. IntroductionII. Remain IncognitoIII. Protecting Yourselfi. Onlineii. OfflineIV. Resources IntroductionThis guide is brought to you by Insight. Before I begin, I would first like to introduce myself. My name is .Sinister, and I will be...
Staying Safe Online (Basic)
We are going to be covering how to stay safe on the internet now there are a lot of benefits to this.1. You can hide your IP address which means you won’t get DDOS attacks sent to your home connection.2. To stay hidden on websites that you don’t want tracked by your...
How Malware Is Spread
First of all these methods are posted in order to allow you to understand basic methods people use to spread malware this should not be treated as a guide to spread malware.[Method 1]This strategy is a truly no doubt understood system yet regardless it lives up to...
Choose Your Password
There are a bunch of articles here on internets that speaks about the choice of a password. What stroke me in these is the lack of example.Authors usually say “Use a password of a minimal length of 8 characters”, without explaining. This kind of article never made me...
Safely Setup A Rat
So far it seems there are no clear tutorials on how to setup a fully functioning rat, i will add some extra security tips. Please note this is purely for educational purposes and should only be used in legal situations.What we will need.A Functioning Rat (DarkComet...
Tor : The Basics
How Tor has the answerThere are two key aspects to onion routing. First, the Tor network is composed of volunteers who use their computers as “nodes.” As mentioned earlier, during normal browsing, information travels across the Internet in packets. When a Tor user...
A Beginner Guide To Hacking
This in no way will turn you into a hacker just unskid yourself--Introduction--So you want to learn hacking? First we need to ask ourselves why we are doing this? Is it for financial gain? Is it because you watched Mr. Robot and are now hype? Once we have figured out...
A PHP Login and Register System With MYSQL
In this short guide i will cover the basics of setting up a PHP login and registration system. I will include the mysql file and PHP code files for you to feel free to copy and paste.Its very important to have a secure login and registration system that uses...
PHP Sanitisation
In this little guide/post we will cover the basics of sanitisation in PHP, with some code snippets and why you should use them. User inputted data. If a user inputs data onto your site directly into a mysql database, it can often be a direct point of vulnrability. The...