“Reverse Engineering” at Glance

Lets talk about Reverse Engineering briefly, because this is also important thing to know when you want to become an expert hacker.

Reverse Engineering is an activity to discover the material how a something is made, how something is works and what is its purpose. In the other word, discovering the technological principles of something by analizing its structure, function and operation. Usually the thing that want to be reverse engineered is taken apart from its original form then analyze each part one by one throughly.

Continue Reading

Introduction to “SQL Injection” and “Blind SQL Injection”

MySQL is one of the most famous database server used by many people in the world. However, many administrator don’t set the MySQL correctly and that will make the database can be Injected by a hacker.

SQL Injection is a hacking technique that utilize the low security settings or poorly designed database on a server. SQL Injection usually done by inserting a series of code to the url or a form of a website. The vulnerability appear when the user input is not filtered correctly, so when the user insert a SQL character into a form, that code will be executed by the database server. To know where is a site is injectable or not, simply put ‘ character after the url of the site. If an error appear like “You have an error in your SQL syntax, bla bla bla…” then the site is 99% injectable. Continue Reading

Introduction to “TOR” and “ProxyChains”

Lets talk about TOR and Proxychains. These two things are a great tools to make us stay “Anonymous” while hacking.

TOR first..
Tor is a virtual network tunnels that allows Internet user to greatly imrove their privcy and security while surfing on the Internet. Actually, tor was designed, implemented, and deployed as a third-generation onion routing project of the U.S Naval Research Laboratory. But the information about it is leaked and now everyone can use it on a wide variety of purposes. Originally developed with the U.S. Navy in mind for the purpose of protecting government communications.

Why do we need TOR? Continue Reading

Introduction to “Google Hacking”

Google hacking is a hacking technique that utilizes google search and another google services to find security holes or vulnerabilities on a site’s configuration and any information on it.

Google hacking can be done by using advanced operators in the Google search bar to locate specific strings of text within search results. Simply, any advanced operators provided by google can be used to help us to find a vulnurable sites.

Here’s an explanation of google hacking from wikipedia :
“Google hacking is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use. Continue Reading

Introduction to “Shodan”

You know search engine like Google, Yahoo or Bing right?

Shodan is like that. It is also a search engine. The difference between shodan and usual search-engine is the thing that searched. While google,yahoo or bing is good to search for websites, shodan is also a great search engine to find a specific computer (routers, servers, etc.) using various filters to put your searching into more specific.

Shodan lets you find servers or routers easily by using the search bar on its homepage. It can find what web are running what (example, web with ip is running apache version 2.3.3)

Great search engine isn’t it? Continue Reading