Skip to content

Max's Blog

  • Home
  • About
Max's Blog

Category: Hacking & Security

January 29, 2019 max-sperling

HTTP hacking – Vote counter (Example 2)

I have acted like they would have been more intelligent to make it harder to hack their counter. 🙂 But

Continue reading
August 24, 2018 max-sperling

SSL-Stripping

Let’s say you are already a Man-In-The-Middle for example based on ARP-Spoofing or a Rogue AP. Now you are sniffing

Continue reading
July 20, 2018 max-sperling

Fake Access Point

A created Fake AP can be used for many evil stuff like sniffing credentials (Rogue AP) or reqesting credentials (Evil

Continue reading
June 21, 2018 max-sperling

SQL Injection

If you are trying to get access to an account of a target and your dictionaries aren’t containing the password,

Continue reading
June 21, 2018 max-sperling

ARP Spoofing

This technique creates a Man-In-The-Middle situation, so that we can modifiy the communication in any way we want or just

Continue reading
June 19, 2018 max-sperling

Session Hijacking (via Sniffing or XSS)

If a user is communicating with a site on a webserver via HTTP the website will give him a Session-ID.

Continue reading
August 9, 2017 max-sperling

HTTP hacking – Vote counter (Example 1)

1. Scan the traffic Just capture the network traffic while simulate one sequence of voting. Possible tools you can use

Continue reading

Posts navigation

«Previous Posts 1 2

Categories

  • Other (17)
    • Games (11)
    • Nutrition (4)
    • Traveling (2)
  • Science (17)
    • Chemistry (3)
    • Linguistics (2)
    • Math (10)
    • Physics (2)
  • Sport (71)
    • Climbing (5)
    • Diving (20)
    • Fitness (7)
    • Martial arts (33)
      • Ground fighting (9)
      • Mixed martial arts (4)
      • Stand-up fighting (11)
    • Running (1)
    • Surfing (2)
    • Swimming (1)
    • Volleyball (2)
  • Technology (268)
    • Computer (238)
      • Architecture & Design (15)
      • Artificial intelligence (3)
      • Audio & Video (11)
      • Building & Reversing (15)
        • CMake (2)
      • Computational complexity (3)
      • Computer architecture (5)
      • Debugging & Memory (26)
      • Development (58)
        • CI/CD (1)
        • Programming (48)
          • Concurrency (5)
          • Data structures (12)
          • Pointers & References (7)
        • Scripting (3)
        • Testing (6)
      • Development process (5)
      • Hacking & Security (17)
      • Hardware & Protocols (8)
      • Networking (11)
      • Operating system (18)
        • Linux (11)
        • Windows (7)
      • Regular expression (2)
      • Tool configuration (5)
      • Version control (22)
      • Virtualization (7)
      • Web (27)
    • Electrics (9)
    • Mechanics (15)
    • Medicine (2)
    • Photography (4)
WordPress Theme: Wellington by ThemeZee.