Posts tagged with: security

Introduction to “CPU Register”

If we want to master the Buffer Overflow technique, first we must have a knowledge in CPU Register. Register is the part of the processor’s memory that can be accessed with a high speed and always used by microprocessor as the medium to do its work.

An x86 based CPU used 8 register : EAX, EBX, ECX, EDX, ESI, EDI, EBP, and ESP. Each of them designed for a specific job that make the CPU process the information eficiently.

1. EAX Register
Used to perform calculations and store the value returned from the function call. Basic operations such ass add, subtract, and compare is optimized in EAX Register. Special operations such as multiplication and divide are done by EAX Register. Continue Reading


“Buffer Overflow” at Glance

Buffer overflow is one of hacking technique to gain root/adminstrator privileges access by exploiting the weak application vulnerabilities installed/running in a system. How can this be done? The hacker make an application/program that will make the buffer memories provided by the system for the target application will overload and then overwrite the other buffer.

Continue Reading


“Reverse Engineering” at Glance

Lets talk about Reverse Engineering briefly, because this is also important thing to know when you want to become an expert hacker.

Reverse Engineering is an activity to discover the material how a something is made, how something is works and what is its purpose. In the other word, discovering the technological principles of something by analizing its structure, function and operation. Usually the thing that want to be reverse engineered is taken apart from its original form then analyze each part one by one throughly.

Continue Reading


Introduction to “SQL Injection” and “Blind SQL Injection”

MySQL is one of the most famous database server used by many people in the world. However, many administrator don’t set the MySQL correctly and that will make the database can be Injected by a hacker.

SQL Injection is a hacking technique that utilize the low security settings or poorly designed database on a server. SQL Injection usually done by inserting a series of code to the url or a form of a website. The vulnerability appear when the user input is not filtered correctly, so when the user insert a SQL character into a form, that code will be executed by the database server. To know where is a site is injectable or not, simply put ‘ character after the url of the site. If an error appear like “You have an error in your SQL syntax, bla bla bla…” then the site is 99% injectable. Continue Reading


Introduction to “TOR” and “ProxyChains”

Lets talk about TOR and Proxychains. These two things are a great tools to make us stay “Anonymous” while hacking.

TOR first..
Tor is a virtual network tunnels that allows Internet user to greatly imrove their privcy and security while surfing on the Internet. Actually, tor was designed, implemented, and deployed as a third-generation onion routing project of the U.S Naval Research Laboratory. But the information about it is leaked and now everyone can use it on a wide variety of purposes. Originally developed with the U.S. Navy in mind for the purpose of protecting government communications.

Why do we need TOR? Continue Reading