Skip to content

Max's Blog

  • Home
  • About
Max's Blog

Category: Technology

September 7, 2018 max-sperling

Destruction order (C++)

The variables/fields getting cleanup in the reverse order they have been declared (not initialized). … Objects are created # Cleanup

Continue reading
August 28, 2018 max-sperling

USB device classes – MSD vs. MTP

I think most of you guys will get in contact with this matter when you are connectiong your Android phone

Continue reading
August 24, 2018 max-sperling

SSL-Stripping

Let’s say you are already a Man-In-The-Middle for example based on ARP-Spoofing or a Rogue AP. Now you are sniffing

Continue reading
August 21, 2018 max-sperling

Handling features/fixes (Git)

1. Create a feature/fix branch Don’t work straight on the parent branch if you have to implement a feature/fix, atleast

Continue reading
July 20, 2018 max-sperling

Fake Access Point

A created Fake AP can be used for many evil stuff like sniffing credentials (Rogue AP) or reqesting credentials (Evil

Continue reading
July 10, 2018 max-sperling

Cyclic dependencies (C++)

Issue The cyclic dependency is a problem which occurs if two classes includes each other in their header. hen.hpp egg.hpp

Continue reading
June 21, 2018 max-sperling

SQL Injection

If you are trying to get access to an account of a target and your dictionaries aren’t containing the password,

Continue reading
June 21, 2018 max-sperling

ARP Spoofing

This technique creates a Man-In-The-Middle situation, so that we can modifiy the communication in any way we want or just

Continue reading
June 19, 2018 max-sperling

Session Hijacking (via Sniffing or XSS)

If a user is communicating with a site on a webserver via HTTP the website will give him a Session-ID.

Continue reading
June 7, 2018 max-sperling

Usage of variables in regex

If you want to replace lots of text and all of them are based on the same pattern, it would

Continue reading

Posts navigation

«Previous Posts 1 … 24 25 26 27 28 29 Next Posts»

Categories

  • Other (19)
    • Games (13)
    • Nutrition (4)
    • Traveling (2)
  • Science (17)
    • Chemistry (3)
    • Linguistics (2)
    • Math (10)
    • Physics (2)
  • Sport (73)
    • Climbing (5)
    • Diving (20)
    • Fitness (8)
    • Martial arts (34)
      • Ground fighting (9)
      • Mixed martial arts (4)
      • Stand-up fighting (12)
    • Running (1)
    • Surfing (2)
    • Swimming (1)
    • Volleyball (2)
  • Technology (290)
    • Computer (260)
      • Architecture & Design (15)
      • Artificial intelligence (3)
      • Audio & Video (11)
      • Building & Reversing (15)
        • CMake (2)
      • Computational complexity (3)
      • Computer architecture (4)
      • Debugging & Memory (29)
      • Development (73)
        • CI/CD (1)
        • Programming (62)
          • Concurrency (12)
          • Data structures (14)
          • Pointers & References (7)
        • Scripting (4)
        • Testing (6)
      • Development process (5)
      • Hacking & Security (17)
      • Hardware & Protocols (8)
      • Networking (11)
      • Operating system (22)
        • Linux (13)
        • Windows (8)
      • Regular expression (2)
      • Tool configuration (5)
      • Version control (22)
      • Virtualization (7)
      • Web (29)
    • Electrics (9)
    • Mechanics (15)
    • Medicine (2)
    • Photography (4)
WordPress Theme: Wellington by ThemeZee.