[ Hacking 101 ] :: Mac Spoofing

This entry is part 8 of 9 in the series [ Hacking 101 ]

I’m going to take you through several different kinds of hiding and spoofing. Learn to use these to keep your hacking safe(er) and fun. The first technique is MAC address spoofing. When to use MAC spoofing Use it when you’re connected to a local area network (LAN), which means you’re inside your target’s network. This …

[ Hacking 101 ] :: [ Introduction ]

Hacking 101
This entry is part 2 of 9 in the series [ Hacking 101 ]

Hacking 101: Just the Basics.  Okay, I’m picking up another video series, and this time I’m working to answer the question I see on so many pentesting and CTF videos: How do you get started doing this? Watch this video and then: Assignments: Introduction (Video 1) 1. Set up at least three email/user accounts. Try …

[ Hacking 101 ] :: [ Javascript ]

This entry is part 7 of 9 in the series [ Hacking 101 ]

Javascript Javascript runs locally, in your browser. That means you can view it with your browser’s debug console, run it and tinker with it. One issue is locating the scripts your target page uses, which may be listed in META tags or called from HTML (DOM) objects. Another issue is that people hide, obfuscate and …