VJ XI0xeleven.me·4 hours agoStack LayoutThe Stack is a part of a program's memory that contains the arguments passed to the program, the local variables, and the program's control flow. This makes the stack very important regarding malware analysis and reverse engineering. Malware often ex...Discusshacking
VJ XI0xeleven.me·5 hours agoMemory OverviewWhen a program is loaded into the memory in the Windows Operating System. it sees an abstract view of the memory. This means that the program doesn't have access to the full Memory; instead, it only has access to its Memory. For that program, that is...Discusshacking
Tanmay Dhobaletanmay4l.hashnode.dev·9 hours agoUnveiling the Truth: The Dark Web is Not as Scary as it SoundsIntroduction: Discover the reality behind the Dark Web and how it is often misunderstood. Despite its eerie reputation, the Dark Web shares similarities with the regular internet, leading to misconceptions and the spread of misinformation. Exploring ...Discusshacker
HOT HEADhothead01th.hashnode.dev·18 hours agoGoogle Dorking: 40 Secret Dorks Revealing Exposed Webcams and Vulnerable Camera SystemsIntroduction In today's digital age, online security and privacy are of paramount importance. While we often hear about the significance of protecting our personal data and online accounts, it's equally essential to address the vulnerabilities in the...Discuss·10 likesGoogle
rootforKnowledge Baseiq.thc.org·21 hours agoStarting a VM on Segfault / DockerQuick notes on how to start a headless Linux on a Segfault Root Server (e.g. a VM inside Docker). IMAGE="ubuntu-22.04-server-cloudimg-amd64.img" apt-get install cloud-image-utils libguestfs-tools mkdir -p ~/.vm/ubuntu &>/dev/null cd ~/.vm/ubuntu cat ...Discuss·37 readssegfaulthacking
muhammad zubairmuhammadzubair.hashnode.dev·Sep 22, 2023🔐 Cracking the Code: OSCP 2023 Exam Preparation GuideAre you ready to embark on a journey into the exciting world of ethical hacking and penetration testing? The Offensive Security Certified Professional (OSCP) certification is your ticket to becoming a certified ethical hacker. 🎓 🛡️ Understanding th...Discussoscp
VJ XI0xeleven.me·Sep 21, 2023Tool Chain in x86 AssemblyIn general, the set of programming tools used to create a program is referred to as the toolchain The toolchain in ASM consists of the following: Assembler Linker Loader Debbuger Assemble/Link/Load Overview In broad terms, the assemble, link, a...DiscussAssembly
VJ XI0xeleven.me·Sep 21, 2023Program Format in x86 AssemblyA complete assembly language program is presented to demonstrate the appropriate program formatting. A properly formatted assembly source file consists of several main parts: Data section where initialized data is declared and defined. BSS section ...Discusshacking
h0neyp0tbeesploit.hashnode.dev·Sep 21, 2023The HTTPS Protocol Made EasyHello, 1337 h44xors. Today, I'm going to talk about HTTPS. We can summarize HTTPS in one sentence: "HTTPS is just HTTP + a layer of encryption." In fact, this is true, but to understand the World Wide Web, we need to understand what that "layer of en...Discuss·2 likesWeb HackingWeb Development
VJ XI0xeleven.me·Sep 21, 2023Data RepresentationA major stumbling block many beginners encounter when attempting to learn assembly language is the common use of the binary and hexadecimal numbering systems. Review of the Decimal System You've been using the decimal numbering system for so long tha...Discusshacking