A created Fake AP can be used for many evil stuff like sniffing credentials (Rogue AP) or reqesting credentials (Evil
Continue readingCategory: Computer
Cyclic dependencies (C++)
Issue The cyclic dependency is a problem which occurs if two classes includes each other in their header. hen.hpp egg.hpp
Continue readingSQL Injection
If you are trying to get access to an account of a target and your dictionaries aren’t containing the password,
Continue readingARP Spoofing
This technique creates a Man-In-The-Middle situation, so that we can modifiy the communication in any way we want or just
Continue readingSession Hijacking (via Sniffing or XSS)
If a user is communicating with a site on a webserver via HTTP the website will give him a Session-ID.
Continue readingUsage of variables in regex
If you want to replace lots of text and all of them are based on the same pattern, it would
Continue readingOperating System APIs (C++)
Before using the OS APIs directly, take a look if the STL or boost already provides this functionality. Also be
Continue readingPush rejection (Git)
Reason: If you have updated a local branch and then trying to push it on remote you may got the
Continue readingCode documentation (Doxygen)
If you are working at a huge software project, it’s important to always write a documentation. This is important cause
Continue readingWhen to use which cast (C++)
Types Type Area Risk static_cast – Converts fundamental types– Non-const to const– Down-casts (dangerous) Medium dynamic_cast – Down- and side-casts
Continue reading