The variables/fields getting cleanup in the reverse order they have been declared (not initialized). … Objects are created # Cleanup
Continue readingCategory: Computer
USB device classes – MSD vs. MTP
I think most of you guys will get in contact with this matter when you are connectiong your Android phone
Continue readingSSL-Stripping
Let’s say you are already a Man-In-The-Middle for example based on ARP-Spoofing or a Rogue AP. Now you are sniffing
Continue readingHandling features/fixes (Git)
1. Create a feature/fix branch Don’t work straight on the parent branch if you have to implement a feature/fix, atleast
Continue readingFake Access Point
A created Fake AP can be used for many evil stuff like sniffing credentials (Rogue AP) or reqesting credentials (Evil
Continue readingCyclic dependencies (C++)
Issue The cyclic dependency is a problem which occurs if two classes includes each other in their header. hen.hpp egg.hpp
Continue readingSQL Injection
If you are trying to get access to an account of a target and your dictionaries aren’t containing the password,
Continue readingARP Spoofing
This technique creates a Man-In-The-Middle situation, so that we can modifiy the communication in any way we want or just
Continue readingSession Hijacking (via Sniffing or XSS)
If a user is communicating with a site on a webserver via HTTP the website will give him a Session-ID.
Continue readingUsage of variables in regex
If you want to replace lots of text and all of them are based on the same pattern, it would
Continue reading