Hackerthreads - hackerthreads.org - hackerthreads.org

Latest News:

General | Re: Samsung Galaxy S Duos or Nokia Lumia 520 ? 27 Aug 2013 | 12:20 am

It looks like you're looking at more affordable phones than high end phones. Between the two; If you want Android, go for the Samsung. If you want Windows phone, go get yourself checked out your insan...

*Nix | Re: Blackbuntu 12.04 LTS (Pentesting) 26 Aug 2013 | 02:38 pm

Perhaps I'm being overly paranoid but your post doesn't exactly fill me with confidence. Here's why on the part of your project: - Blackbuntu has officially stopped development last I heard. - Blackb...

*Nix | Re: "Hacker OS's" 18 Aug 2013 | 01:02 pm

That's a good point. Maybe I should look into VM'ing them instead of having a dedicated install. I do find that sometimes I'm hurting for tools that I rarely use, and it would be nice to have them al...

Newbie Corner | Re: Obstacles with Brutus AET2 15 Aug 2013 | 05:10 am

nurich wrote: @stasik (and all the others): First, sorry for my english, I´m German ;-). Now: You are talking about how you can hack into a poppen.de account. Now I found out, that my boyfriend has su...

Newbie Corner | Re: Buffer Overflow using Backtrack 5 13 Aug 2013 | 08:41 am

If it's those three steps in order with nothing in between it should be fine. But often you'll inject your shellcode, then a whole bunch of stuff of the normal program execution happens and then you h...

Newbie Corner | Re: Buffer Overflow using Backtrack 5 12 Aug 2013 | 03:26 pm

Your math is a little off in the "I executed the code, and included the address that I wanted to overwrite EIP" step. You have a buffer of 500 chars + you need 4 to get to the return address you want ...

Newbie Corner | Re: hack java based chat rooms 8 Aug 2013 | 02:05 pm

If there is some way to do a hack that isn't just stealing or guessing admin credentials, you'll find it in the source code of that chat applet. I've attached the sources for your convenience. I don't...

Programming | Re: [C] Inheritance, polymorphism and General coolness. 7 Aug 2013 | 10:10 pm

I would say that it is not polite to use material without citing it. This article is based on the link below: http://modal-echoes.blogspot.co.uk/2007 ... -in-c.html It's a matter of following an hon...

Newbie Corner | Re: Misguided 7 Aug 2013 | 07:03 am

Yeah, well, i'm trying to learn, i can do a lot in linux, and can code a little, but have not created any applications or programs, and have not really been doing much, but then again, i'm 16, and i l...

General | Re: Can files' digital signatures be trusted 5 Aug 2013 | 08:38 pm

There's a few ways of signing files, a pgp signed file needs to be verified with the public key of the person/company that signed it. You need to have this public key beforehand or obtain it trough so...

Recently parsed news:

Recent searches: