[ Hacking 101 ] :: VPNs

This entry is part 11 of 11 in the series [ Hacking 101 ]

A VPN gives you some degree of confidentiality (encryption) and privacy (anonymity), and works great in a business situation where you can have end-to-end encryption. But consumer VPNs aren’t the same, because encryption isn’t end-to-end, and providers are a privacy issue. Here’s a look at different connection types from the perspective of a hacker: web …

[ Hacking 101 ] :: Mac Spoofing

This entry is part 8 of 11 in the series [ Hacking 101 ]

I’m going to take you through several different kinds of hiding and spoofing. Learn to use these to keep your hacking safe(er) and fun. The first technique is MAC address spoofing. When to use MAC spoofing Use it when you’re connected to a local area network (LAN), which means you’re inside your target’s network. This …

[ Hacking 101 ] :: [ Javascript ]

This entry is part 7 of 11 in the series [ Hacking 101 ]

Javascript Javascript runs locally, in your browser. That means you can view it with your browser’s debug console, run it and tinker with it. One issue is locating the scripts your target page uses, which may be listed in META tags or called from HTML (DOM) objects. Another issue is that people hide, obfuscate and …

[ Hacking 101 ] :: [ Do You Need A Handle? ]

[ Hacking 101 ]
This entry is part 5 of 11 in the series [ Hacking 101 ]

Do You Need A Handle? Yeah breaker one nine this here’s the Rubber Duck Uh, you got a copy on me Pig Pen C’mon Uh yeah Ten-Four Pig Pen fer sure fer sure. -C.W. McCall, “Convoy” Long before there were hackers, there were truckers. Truckers understand the need for handles in the Citizens’ Band (CB) …