
Habib O
Founder
Self proclaimed tech enthusiast looking to expand my personal portfolio. If you give me anything i will probably break it.
I have a deep intrest into cyber security, networking and webdevelopment. You can find my personal website at
Xeondevelopment.xyz, if you want to contact me directly use [email protected]
Feel free to check out my site and my posts below.
Habib’s Highlighted Posts
A Beginner Guide To Hacking
This in no way will turn you into a hacker just unskid yourself--Introduction--So you want to learn hacking? First we need to ask ourselves why we are doing this? Is it for financial gain? Is it because you watched Mr. Robot and are now hype? Once we have figured out...
A PHP Login and Register System With MYSQL
In this short guide i will cover the basics of setting up a PHP login and registration system. I will include the mysql file and PHP code files for you to feel free to copy and paste.Its very important to have a secure login and registration system that uses...
PHP Sanitisation
In this little guide/post we will cover the basics of sanitisation in PHP, with some code snippets and why you should use them. User inputted data. If a user inputs data onto your site directly into a mysql database, it can often be a direct point of vulnrability. The...
All posts by Habib.
Protect Yourself From Skype Resolvers
Skype resolvers – what do they do?Imagine a website, where you can simply put in a Skype username and press “Go” – and instantly you have their IP address.Well that’s simply what a Skype resolvers does; they fetch your IP from your Skype username.Unfortunately, it’s...
Windows Password Cracking
We are going to learn to understand and learn to crack windows passwordT A B L E O F C O N T E N T S :1 – What is NTLM?2 – How does NTLM work?3 – Windows Integrated Authentication4 – Pass the Hash5 – NTLM Relaying Methods (including EXTERNAL relaying)6 – Security...
Understanding Doxing and Footprint Removal
INDEX:– What is doxing?– Where do you begin?– What methods of gaining user info exist?– Googling– Social Media Websites– Social Engineering– Databases– Whois– Final Word– Credits– Sources– WebsitesWhat is doxing?Doxing (named after documents, “dox”) is the act of...
An Introduction To Computer Ethics
Table of Contents I. IntroductionII. Remain IncognitoIII. Protecting Yourselfi. Onlineii. OfflineIV. Resources IntroductionThis guide is brought to you by Insight. Before I begin, I would first like to introduce myself. My name is .Sinister, and I will be...
Staying Safe Online (Basic)
We are going to be covering how to stay safe on the internet now there are a lot of benefits to this.1. You can hide your IP address which means you won’t get DDOS attacks sent to your home connection.2. To stay hidden on websites that you don’t want tracked by your...
How Malware Is Spread
First of all these methods are posted in order to allow you to understand basic methods people use to spread malware this should not be treated as a guide to spread malware.[Method 1]This strategy is a truly no doubt understood system yet regardless it lives up to...
Choose Your Password
There are a bunch of articles here on internets that speaks about the choice of a password. What stroke me in these is the lack of example.Authors usually say “Use a password of a minimal length of 8 characters”, without explaining. This kind of article never made me...
Safely Setup A Rat
So far it seems there are no clear tutorials on how to setup a fully functioning rat, i will add some extra security tips. Please note this is purely for educational purposes and should only be used in legal situations.What we will need.A Functioning Rat (DarkComet...
Tor : The Basics
How Tor has the answerThere are two key aspects to onion routing. First, the Tor network is composed of volunteers who use their computers as “nodes.” As mentioned earlier, during normal browsing, information travels across the Internet in packets. When a Tor user...
Modern Day Hacking Group – Lizard Squad
Lizard SquadThis group came to a short burst of fame before slowly dying out. They made a name for themselves during the Christmas of 2014. This was not the groups first attack that was documented.The first documented recall of this group goes back to the League Of...
Are IOT devices simply screwed? Or do manufactures simply not care about security?
Reports have claimed the discovery of a botnet that controls upwards of 25,000 compromised internet connected CCTV cameras. The botnet was discovered during an investigation of a ddos attack on a regular jewelry store by security firm Sucuri.While a DDOS attack may at...
Nmap’s Usage as a Vulnerability Scanner
One commonly overlooked function of Nmap is its usage as a vulnerability scanner and and even an exploit payload deliverer. Through the NSE (Nmap Scripting Engine) pentesters and security researchers have developed scripts for nmap that enable the framework to scan...
Five of the Most Destructive Viruses Ever
Sometimes getting rid of a computer virus is as easy as pressing scan on your favorite antivirus software, but sometimes viruses can be much harder to get rid of. Here are five of the most destructive and widely spread computer worms and viruses in history.5. ZeusZeus...
The Deep Web and the Dark Web
As a Hackers Education reader, you probably have heard the terms 'Deep Web' and 'Dark Web' before. Although these terms sound alike and are often confused, the two act very differently from each other. Although the Deep Web sounds like something confusing and unknown,...
A Beginner Guide To Hacking
This in no way will turn you into a hacker just unskid yourself--Introduction--So you want to learn hacking? First we need to ask ourselves why we are doing this? Is it for financial gain? Is it because you watched Mr. Robot and are now hype? Once we have figured out...
A PHP Login and Register System With MYSQL
In this short guide i will cover the basics of setting up a PHP login and registration system. I will include the mysql file and PHP code files for you to feel free to copy and paste.Its very important to have a secure login and registration system that uses...
PHP Sanitisation
In this little guide/post we will cover the basics of sanitisation in PHP, with some code snippets and why you should use them. User inputted data. If a user inputs data onto your site directly into a mysql database, it can often be a direct point of vulnrability. The...
Understanding Orcus Rat, and Why the Owner may be facing jailtime.
In modern day society there are a lot of threats that come about the internet. The biggest risk to the average user is a smart developer, now there are two types of developers legal and illegal with many big differences. The bigest issue with malware in the modern day...