Understanding /etc/passwd and /etc/shadow

May 13, 2008 0 Comments 0 tags

Q. Can you explain /etc/passwd file format for Linux and UNIX operating systems? A. /etc/passwd file stores essential information, which is required during login i.e. user account information. /etc/passwd is

How to prevent SQL Injection

April 28, 2008 0 Comments 0 tags

SQL Injection: What It Is There was once a famous doctor that had it completely right: never trust your patients. Now this doctor may have only been a sitcom doctor

TCP/IP Tutorial

April 25, 2008 0 Comments 0 tags

This tutorial is intended to supply a brief overview of TCP/IP protocol. Explanations of IP addresses, classes, netmasks, subnetting, and routing are provided, and several example networks are considered. The

FBI Fears Chinese Hackers and/or Government Agents Have Back Door Into US Government & Military Computer Networks

April 21, 2008 0 Comments 0 tags

ome months ago, my contacts in the defense industry had alerted me to a startling development that has escalated to the point of near-panick in nearly all corners of Government

Hacking a Windows 2000 system through IPC$

April 21, 2008 0 Comments 0 tags

1: Scanning for open Win2k systems2: Connecting to the IPC$3: Connecting and using Computer Management.4. Disable NTLM5: Starting the Telnet service6: Creating user accounts and adding them to a group7:

Project: The Wifi Predator

April 13, 2008 0 Comments 0 tags

Picture this: You find yourself sitting in a hotel room that does not offer wireless internet… As you look out the window, you spot that the three hotels & a

CRLF Injection

April 2, 2008 0 Comments 0 tags

CRLF Injection Overview CRLF Injection is typically used in HTTP Response Splitting. In the HTTP specification there is a spec stating that the HTTP header is to be split from