When you think of hacking, what picture comes to mind? For me, it's a young guy in a hoodie, typing commands into a … [Read More...]
Featured Articles
Detect attacks on Linux servers
Even if you harden your server to the most paranoid level, it's always possible that an attacker may sneak past your … [Read More...]
Setting up your own personal VPN
A VPN lets you access the internet from a network other than your local one. If you've watched Youtube, you've doubtless … [Read More...]
Editorial Picks
Linux Commands Cheat Sheet
Linux is the software layer on top of the computer hardware and gives the command. Unlike traditional OS such as Windows … [Read More...]
Understanding Google Dorks and How Hackers Use Them
The idea of using Google as a hacking tool or platform certainly isn't novel, and hackers have been leveraging this … [Read More...]
Latest Blog Updates
Linux server hardening for beginners
Linux controls 97% of the server market. As such, any budding hacker ought to know the basic defenses of a modern Linux server. For that reason, we prepared this guide as an intro to basic methods for Linux server hardening. And since the best way to learn is by doing, we'll walk you through setting up these defenses one command at a time. Linux security is a deep rabbit hole with plenty of nooks and crannies to explore. But you'll never become a master unless you take the first steps and start playing around with the many parts of this complex system. So open up your Linux command line and follow along, as … [Read More...]
Clickjacking: a hacker’s guide
Clickjacking helps hackers trick victims into doing things without meaning to. We're going to walk you through the attack step by step using a realistic example. But first, let's start by describing the attack in abstract. So, suppose you want to trick the admin of a site into doing something. Like, say, delete a post on a social media site. Here's the plan: you load the social media site in an iframe. Then you make and iframe invisible. Underneath the iframe, you have fake content that the user will think they're interacting with, when really, they're performing actions in the social media site! Confused? … [Read More...]
Hacker imageboards: guide to underground chans
On imageboards (aka chans), users share text and images anonymously. Thus, their users call themselves "anons". Since anons can post without their real name, many people post content that would otherwise be disallowed or too controversial. This mix of social outcasts and lax rules gave birth to a strong hacker trend you've probably heard of: Anonymous. But even as the era of Anonymous came and past, the chan scene still hosts a lot of unique hacking content and hacker groups. Hacker imageboards are alive and kicking, and we're going to give you a tour. If you already browse imageboards, you likely know about … [Read More...]
What programming languages to learn for hacking?
We've all been there - you want to level up your hacking repertoire, but there are hundreds of exciting new programming languages, and you don't know which one to start with. So what do you do? No need to stress out! We've created this little guide to give you an overview of what languages matter the most for hackers, and why each one is essential, so you don't have to blindly ponder what programming languages to learn for hacking. Coding is a core skill of hacking. It lets you understand the apps you want to break, read their source code to see how they work, and write payloads to exploit other machines. So … [Read More...]
Urbit for hackers
Urbit is a mysterious networking technology that's had the techie underground conflicted for decades. Is Urbit the future of the internet, or a backwater of weirdos too controversial for the normal internet? In this article, we'll ignore all of the politics and focus on the benefits (and drawbacks) of Urbit for hackers. Like any cutting-edge tech, Urbit has unique strengths and weaknesses that hackers can leverage. Urbit's unique architecture makes it ideal for certain hacking tasks, but horrendous for others. Let's start so you can see what I mean! Learn the basics of Urbit for hackers Just like the … [Read More...]