Many times it is not necessary to hack into anything to get credentials or confidential data.
🇬🇧http://hackinglethani.com/hacking-github-with-scrapy/
🇪🇸http://hackinglethani.com/es/hacking-github-con-scrapy/
🇬🇧http://hackinglethani.com/hacking-github-with-scrapy/
🇪🇸http://hackinglethani.com/es/hacking-github-con-scrapy/
Your password may be secure, but the hash function that protects it isn't… Find out how to crack hashes with a powerful tool.
🇬🇧http://hackinglethani.com/the-art-of-breaking-a-hash/
🇪🇸http://hackinglethani.com/es/el-arte-de-romper-un-hash-hashcat/
🇬🇧http://hackinglethani.com/the-art-of-breaking-a-hash/
🇪🇸http://hackinglethani.com/es/el-arte-de-romper-un-hash-hashcat/
Physical Hacking with USB. Let's see how the magic of hacking movies works.
🇬🇧http://hackinglethani.com/physical-hacking-with-usb/
🇪🇸http://hackinglethani.com/es/hacking-fisico-usb-maliciosos/
🇬🇧http://hackinglethani.com/physical-hacking-with-usb/
🇪🇸http://hackinglethani.com/es/hacking-fisico-usb-maliciosos/
I’ve been working on a manual that indicates how to do a step-by-step ethical hacking audit.
🇬🇧http://hackinglethani.com/penetration-tester-manual/
🇪🇸http://hackinglethani.com/es/manual-del-pentester/
🇬🇧http://hackinglethani.com/penetration-tester-manual/
🇪🇸http://hackinglethani.com/es/manual-del-pentester/
Hacking Lethani
Manual del pentester » Hacking Lethani
Hoy traigo un post muy especial para mí. Esta publicación se ha retrasado un par de semanas porque estaba acabando de pulirlo, y quería que…
New post! Hacking Google!! Come in to discover the magic of google dorks.
🇬🇧http://www.hackinglethani.com/google-dorks
🇪🇸http://www.hackinglethani.com/dorks-de-google
🇬🇧http://www.hackinglethani.com/google-dorks
🇪🇸http://www.hackinglethani.com/dorks-de-google
Do you want to know what the advantages of the Tor network are? Look at this! >>>>
🇬🇧http://www.hackinglethani.com/tor-network-and-deep-web/
🇪🇸http://www.hackinglethani.com/es/red-tor-y-deep-web/
🇬🇧http://www.hackinglethani.com/tor-network-and-deep-web/
🇪🇸http://www.hackinglethani.com/es/red-tor-y-deep-web/
My web is now secure! In this post I bring you the keys I used to shield my website
.
🇬🇧https://hackinglethani.com/wordpress-shielding/
🇪🇸https://hackinglethani.com/es/securizando-wordpress/
.
🇬🇧https://hackinglethani.com/wordpress-shielding/
🇪🇸https://hackinglethani.com/es/securizando-wordpress/
Hacking Lethani
Securizando Wordpress » Hacking Lethani
A medida que pasa el tiempo este dominio se va haciendo más y más grande.. ¡Gracias a ti! Con menos de un año de vida,…
Do you know what non-relational databases are, and how to take advantage of their vulnerabilities to get an injection? Find out in this post.
🇬🇧https://hackinglethani.com/nosql-injection
🇪🇸https://hackinglethani.com/es/inyeccion-nosql
🇬🇧https://hackinglethani.com/nosql-injection
🇪🇸https://hackinglethani.com/es/inyeccion-nosql
In this post I show you one of the most famous kinds of code injections: the XSS injection. Find out what they are and how to avoid XSS filters by obfuscation!
🇬🇧 https://hackinglethani.com/cross-site-scripting-xss-injection/
🇪🇸 https://hackinglethani.com/es/cross-site-scripting-inyeccion-xss/
🇬🇧 https://hackinglethani.com/cross-site-scripting-xss-injection/
🇪🇸 https://hackinglethani.com/es/cross-site-scripting-inyeccion-xss/
Hacking Lethani
Cross-Site Scripting: Inyección XSS » Hacking Lethani
Tras los posts sobre SQL Injection y NoSQL Injection, hoy te traigo la XSS Injection. Este ataque consiste en inyectar código malicioso en páginas web benignas. El atacante inyecta código desde el lado del cliente, de forma que por una mala configuración…
I have recently changed the look of my website, with a cleaner and more professional design. I hope you like it, I encourage you to take a look and give me feedback!
Do you know what dlls libraries are and how they are used by Windows programs? Reading this post you will also know how to replace them with malware.
🇬🇧 https://hackinglethani.com/dll-hijacking-pe/
🇪🇸 https://hackinglethani.com/es/dll-hijacking/
🇬🇧 https://hackinglethani.com/dll-hijacking-pe/
🇪🇸 https://hackinglethani.com/es/dll-hijacking/
Hacking Lethani
DLL Hijacking » Hacking Lethani
Recientemente estoy realizando unos cursos de Pentester Academy muy interesantes. Gracias a ellos estoy aprendiendo bastante, dado que tratan temas muy particulares con ejemplos claros. Hoy voy a mostrarte lo que he aprendido sobre DLL Hijacking. Un DLL…
This is the first of a number of posts in which I will explain the evil potential of compressed:
🇬🇧 https://hackinglethani.com/zip-bomb-i/
🇪🇸 https://hackinglethani.com/es/bomba-zip/
🇬🇧 https://hackinglethani.com/zip-bomb-i/
🇪🇸 https://hackinglethani.com/es/bomba-zip/
I continue last week's post with the infinite bombs, made by means of "quine" programs.
🇬🇧 https://hackinglethani.com/zip-bombs-ii/
🇪🇸 https://hackinglethani.com/es/bombas-zip-ii/
🇬🇧 https://hackinglethani.com/zip-bombs-ii/
🇪🇸 https://hackinglethani.com/es/bombas-zip-ii/
Hacking Lethani
Bombas Zip II: Bombas quine » Hacking Lethani
En el post de la semana pasada introduje las bombas zip y expliqué como crear una bomba zip mediante la técnica de recursión. Te recomiendo…
This is the latest entry on zip bombs. In this post we will see the last technique that has been discovered: overlapping bombs.
🇬🇧 https://hackinglethani.com/zip-bombs-iii/
🇪🇸 https://hackinglethani.com/es/bombas-zip-iii/
🇬🇧 https://hackinglethani.com/zip-bombs-iii/
🇪🇸 https://hackinglethani.com/es/bombas-zip-iii/
Hacking Lethani
Bombas Zip III: Bombas de superposición » Hacking Lethani
En este último post de la serie de bombas zip, voy a hablaros de un nuevo método que ha surgido en el último mes: las…
Cross-Site Scripting II: Advanced
In this post I will show you advanced techniques of injection, in order to automatice it or create a DDoS with the victims.
🇬🇧 https://hackinglethani.com/cross-site-scripting-xss-injection/
🇪🇸 https://hackinglethani.com/es/cross-site-scripting-ii-inyecciones-avanzadas/
In this post I will show you advanced techniques of injection, in order to automatice it or create a DDoS with the victims.
🇬🇧 https://hackinglethani.com/cross-site-scripting-xss-injection/
🇪🇸 https://hackinglethani.com/es/cross-site-scripting-ii-inyecciones-avanzadas/
Hacking Lethani
Cross-Site Scripting II: Inyecciones avanzadas » Hacking Lethani
Este post es la continuación de otro que publiqué hace unos meses. Si todavía no lo has leído, te recomiendo echarle un vistazo. Ya sabes que…
Post Explotation Backdooring I
First entry of PE Backdooring. Let's turn a program into a persistent Trojan!
🇬🇧 https://hackinglethani.com/post-explotation-backdooring-i-en/
🇪🇸 https://hackinglethani.com/es/post-explotation-backdooring-i/
First entry of PE Backdooring. Let's turn a program into a persistent Trojan!
🇬🇧 https://hackinglethani.com/post-explotation-backdooring-i-en/
🇪🇸 https://hackinglethani.com/es/post-explotation-backdooring-i/
Hacking Lethani
Post Explotation Backdooring I » Hacking Lethani
A few months ago I was in a post-exploitation course taught by my ex colleagueOscarAkaElvis (creator of the tool to audit Airgeddon, which I recommend you try). I also want to warn that this is an advanced technique and you need to have basic knowledge of…
Post Explotation Backdooring II
Second entry of PE Backdooring, this time with natural code caves. Let's turn a program into a persistent Trojan!
🇬🇧 https://hackinglethani.com/post-explotation-backdooring-ii-en/
🇪🇸 https://hackinglethani.com/es/post-explotation-backdooring-ii/
Second entry of PE Backdooring, this time with natural code caves. Let's turn a program into a persistent Trojan!
🇬🇧 https://hackinglethani.com/post-explotation-backdooring-ii-en/
🇪🇸 https://hackinglethani.com/es/post-explotation-backdooring-ii/
Post Explotation Backdooring III
Third entry of PE Backdooring, with cipher natural code caves. The final version of the backdoor is here!
🇬🇧 https://hackinglethani.com/post-explotation-backdooring-iii-en/
🇪🇸 https://hackinglethani.com/es/post-explotation-backdooring-iii/
Third entry of PE Backdooring, with cipher natural code caves. The final version of the backdoor is here!
🇬🇧 https://hackinglethani.com/post-explotation-backdooring-iii-en/
🇪🇸 https://hackinglethani.com/es/post-explotation-backdooring-iii/
SQL Injection: OAST techniques
Maybe you've never heard about this kind of
SQL injection. Check it out!
🇬🇧 https://hackinglethani.com/sql-injection-oast/
🇪🇸 https://hackinglethani.com/es/inyeccion-sql-oast/
Maybe you've never heard about this kind of
SQL injection. Check it out!
🇬🇧 https://hackinglethani.com/sql-injection-oast/
🇪🇸 https://hackinglethani.com/es/inyeccion-sql-oast/
Shodan
I'm sure you've heard of one of the most famous search engines in the world of hacking, but do you know its full potential?
🇬🇧 https://hackinglethani.com/shodan-en/
🇪🇸 https://hackinglethani.com/es/shodan/
I'm sure you've heard of one of the most famous search engines in the world of hacking, but do you know its full potential?
🇬🇧 https://hackinglethani.com/shodan-en/
🇪🇸 https://hackinglethani.com/es/shodan/
Hacking Lethani
Shodan » Hacking Lethani
Shodan es un motor de búsqueda para encontrar servicios concretos como webcams, sistemas SCADA, linksys… Su funcionamiento es simple pero efectivo: escanea todo internet y…