[ Hacking 101 ] :: [ Introduction ]

Hacking 101
This entry is part 2 of 11 in the series [ Hacking 101 ]

Hacking 101: Just the Basics.  Okay, I’m picking up another video series, and this time I’m working to answer the question I see on so many pentesting and CTF videos: How do you get started doing this? Watch this video and then: Assignments: Introduction (Video 1) 1. Set up at least three email/user accounts. Try …

[ Hacking 101 ] :: [ What We Mean By Hacking]

[ Hacking 101 ]
This entry is part 4 of 11 in the series [ Hacking 101 ]

Yet Another Explanation of What “Hacking” Really Means If you’ve read a book or two about networking or security (and if you’re here I’ll bet you have), you’ve already had to read some version of where the word “hacker” comes from and what “hacking” really means. But what began as a title of honor has …

[ Hacking 101 ] :: [ Do You Need A Handle? ]

[ Hacking 101 ]
This entry is part 5 of 11 in the series [ Hacking 101 ]

Do You Need A Handle? Yeah breaker one nine this here’s the Rubber Duck Uh, you got a copy on me Pig Pen C’mon Uh yeah Ten-Four Pig Pen fer sure fer sure. -C.W. McCall, “Convoy” Long before there were hackers, there were truckers. Truckers understand the need for handles in the Citizens’ Band (CB) …

[ Hacking 101 ] :: [ Javascript ]

This entry is part 7 of 11 in the series [ Hacking 101 ]

Javascript Javascript runs locally, in your browser. That means you can view it with your browser’s debug console, run it and tinker with it. One issue is locating the scripts your target page uses, which may be listed in META tags or called from HTML (DOM) objects. Another issue is that people hide, obfuscate and …