[ Hacking 101 ] :: Mac Spoofing

This entry is part 8 of 9 in the series [ Hacking 101 ]

I’m going to take you through several different kinds of hiding and spoofing. Learn to use these to keep your hacking safe(er) and fun. The first technique is MAC address spoofing. When to use MAC spoofing Use it when you’re connected to a local area network (LAN), which means you’re inside your target’s network. This …

[ Hacking 101 ] :: [ Javascript ]

This entry is part 7 of 9 in the series [ Hacking 101 ]

Javascript Javascript runs locally, in your browser. That means you can view it with your browser’s debug console, run it and tinker with it. One issue is locating the scripts your target page uses, which may be listed in META tags or called from HTML (DOM) objects. Another issue is that people hide, obfuscate and …

[ Hacking 101 ] :: [ Do You Need A Handle? ]

[ Hacking 101 ]
This entry is part 5 of 9 in the series [ Hacking 101 ]

Do You Need A Handle? Yeah breaker one nine this here’s the Rubber Duck Uh, you got a copy on me Pig Pen C’mon Uh yeah Ten-Four Pig Pen fer sure fer sure. -C.W. McCall, “Convoy” Long before there were hackers, there were truckers. Truckers understand the need for handles in the Citizens’ Band (CB) …

[ Hacking 101 ] :: [ What We Mean By Hacking]

[ Hacking 101 ]
This entry is part 4 of 9 in the series [ Hacking 101 ]

Yet Another Explanation of What “Hacking” Really Means If you’ve read a book or two about networking or security (and if you’re here I’ll bet you have), you’ve already had to read some version of where the word “hacker” comes from and what “hacking” really means. But what began as a title of honor has …