Hacking Lethani
111 subscribers
59 links
Channel for announcements, posts and news on https://www.hackinglethani.com
Download Telegram
Many times it is not necessary to hack into anything to get credentials or confidential data.
🇬🇧http://hackinglethani.com/hacking-github-with-scrapy/
🇪🇸http://hackinglethani.com/es/hacking-github-con-scrapy/
Your password may be secure, but the hash function that protects it isn't… Find out how to crack hashes with a powerful tool.
🇬🇧http://hackinglethani.com/the-art-of-breaking-a-hash/
🇪🇸http://hackinglethani.com/es/el-arte-de-romper-un-hash-hashcat/
Physical Hacking with USB. Let's see how the magic of hacking movies works.
🇬🇧http://hackinglethani.com/physical-hacking-with-usb/
🇪🇸http://hackinglethani.com/es/hacking-fisico-usb-maliciosos/
New post! Hacking Google!! Come in to discover the magic of google dorks.
🇬🇧http://www.hackinglethani.com/google-dorks
🇪🇸http://www.hackinglethani.com/dorks-de-google
Do you want to know what the advantages of the Tor network are? Look at this! >>>>
🇬🇧http://www.hackinglethani.com/tor-network-and-deep-web/
🇪🇸http://www.hackinglethani.com/es/red-tor-y-deep-web/
Do you know what non-relational databases are, and how to take advantage of their vulnerabilities to get an injection? Find out in this post.
🇬🇧https://hackinglethani.com/nosql-injection
🇪🇸https://hackinglethani.com/es/inyeccion-nosql
I have recently changed the look of my website, with a cleaner and more professional design. I hope you like it, I encourage you to take a look and give me feedback!
This is the first of a number of posts in which I will explain the evil potential of compressed:
🇬🇧 https://hackinglethani.com/zip-bomb-i/
🇪🇸 https://hackinglethani.com/es/bomba-zip/
Post Explotation Backdooring II
Second entry of PE Backdooring, this time with natural code caves. Let's turn a program into a persistent Trojan!
🇬🇧 https://hackinglethani.com/post-explotation-backdooring-ii-en/
🇪🇸 https://hackinglethani.com/es/post-explotation-backdooring-ii/
Post Explotation Backdooring III
Third entry of PE Backdooring, with cipher natural code caves. The final version of the backdoor is here!
🇬🇧 https://hackinglethani.com/post-explotation-backdooring-iii-en/
🇪🇸 https://hackinglethani.com/es/post-explotation-backdooring-iii/
SQL Injection: OAST techniques
Maybe you've never heard about this kind of
SQL injection. Check it out!
🇬🇧 https://hackinglethani.com/sql-injection-oast/
🇪🇸 https://hackinglethani.com/es/inyeccion-sql-oast/