I have acted like they would have been more intelligent to make it harder to hack their counter. 🙂 But
Continue readingCategory: Hacking & Security
SSL-Stripping
Let’s say you are already a Man-In-The-Middle for example based on ARP-Spoofing or a Rogue AP. Now you are sniffing
Continue readingFake Access Point
A created Fake AP can be used for many evil stuff like sniffing credentials (Rogue AP) or reqesting credentials (Evil
Continue readingSQL Injection
If you are trying to get access to an account of a target and your dictionaries aren’t containing the password,
Continue readingARP Spoofing
This technique creates a Man-In-The-Middle situation, so that we can modifiy the communication in any way we want or just
Continue readingSession Hijacking (via Sniffing or XSS)
If a user is communicating with a site on a webserver via HTTP the website will give him a Session-ID.
Continue readingHTTP hacking – Vote counter (Example 1)
1. Scan the traffic Just capture the network traffic while simulate one sequence of voting. Possible tools you can use
Continue reading