A created Fake AP can be used for many evil stuff like sniffing credentials (Rogue AP) or reqesting credentials (Evil
Continue readingCategory: Technology
Cyclic dependencies (C++)
Issue The cyclic dependency is a problem which occurs if two classes includes each other in their header. hen.hpp egg.hpp
Continue readingSQL Injection
If you are trying to get access to an account of a target and your dictionaries aren’t containing the password,
Continue readingARP Spoofing
This technique creates a Man-In-The-Middle situation, so that we can modifiy the communication in any way we want or just
Continue readingSession Hijacking (via Sniffing or XSS)
If a user is communicating with a site on a webserver via HTTP the website will give him a Session-ID.
Continue readingUsage of variables in regex
If you want to replace lots of text and all of them are based on the same pattern, it would
Continue readingAntriebsstrang
Motor –> Kupplung –> Getriebe (–> Kardanwelle) (–> Zentraldifferential) –> Achsdifferential –> Antriebswelle –> Räder Motor (4-Takt-Ottomotor): Beim betätigen des
Continue readingOperating System APIs (C++)
Before using the OS APIs directly, take a look if the STL or boost already provides this functionality. Also be
Continue readingPush rejection (Git)
Reason: If you have updated a local branch and then trying to push it on remote you may got the
Continue readingCode documentation (Doxygen)
If you are working at a huge software project it’s important to always write a documentation. This is important cause
Continue reading