Activities to break into computer(s) or technology systems without authorized access and making them do things they were not originally designed to do.
1
vote
1answer
34 views
My admin control panel is hackable and I have no idea why
I have the following setup on my admin cpanel:
/admincpanel/index.php
/admincpanel/login.php
/admincpanel/sendEmailsToAll.php
If a user is not logged in, it automatically goes back to login.php. ...
0
votes
1answer
31 views
gae security - is hacking app engine application as hard as hacking google?
I have been suffered from hackers and malware attacks. I want to know if I change my host to app engine does it mean I will get same security as google website? Its obvious that google account ...
0
votes
0answers
21 views
Fields in ip/tcp header required to be changed when data is modified in an IP packet
This is an extension to my other question- modifying ip packet using libipq
I have a linux bridge set up between a client and a server machine. I forward the tcp packets coming from the server to the ...
0
votes
0answers
13 views
how to update metasploit offline
For security reasons I can not connect to the Internet in my network. How can I update metasploit in backtrack5 r3 offline? I downloaded the latest version of metasploit from rapid7 website. How can I ...
0
votes
0answers
18 views
modifying ip packet using libipq
I am using libipq to modify some data in the incoming packets in the network. Here's my setup:
I have both the client program and the sniffer (using libipq) programs running on the same machine. I ...
0
votes
1answer
30 views
How to crack Windows 7 password [closed]
My dad forget his laptops password.
How to recover it?
// I am posting my first question how much lines i have to write. this is to satisfy this validation
1
vote
0answers
14 views
Multiple system calls from PID 0 in Windows [migrated]
Recently, one of my old PC at home lags at times. I open the Process Monitor (from sysinternals.com) and find multiple system calls from a process with PID 0, including CreateFile operation. I thought ...
0
votes
1answer
13 views
filter asp.net healthmonitoring
We have activated health monitoring on our website. Recently we are getting a lot of hack attempts which are caused by bots, but also spawn a lot of server errors.
Exception type: ...
-1
votes
1answer
26 views
Is intercepting TCP/IP traffic easy if i use RC4 SSL Cipher suites? [closed]
I am having a server which supports RC4 SSL Cipher suites. I just want to know whether it is easy for a attacker to determine the contents and IP of the users who are connecting to my server?
0
votes
1answer
28 views
Inspect Element can change anything, and its ok?
I found it handy to style my webpages with google chrome by changing css values via 'inspect element'.
A lot of you may already know this but I just recently found out that I can also edit the whole ...
0
votes
0answers
29 views
Sign in with facebook button causes Facebook to think it's being hacked
I'm testing a site for someone else, and there's a strange issue occuring.
One of the ways for users to login is with their Facebook account, so on the login page, there's a big "Sign up with ...
-2
votes
1answer
83 views
wordpress site hacked - explanation of code left? [closed]
a friend's word press site was hacked and in some of the php files was left some code - does anyone know what it might mean or how to decrypt it? i.e.
What was left has been pasted here: ...
1
vote
2answers
198 views
Is this site hacked?
At a particular web site (not mine), I'm alerted that it wants to use Java and I see a domain in India referenced. Since this doesn't look normal to me I look at the page source. There is a large ...
2
votes
1answer
60 views
c++ bit shifting a float
float length = 32.32f;
long i = *(long*)&length ; // casting a float pointer to a long pointer...
i >>= 1; // right shift i but 1 ... or div by 2
length = *(float*)&i; // is this ...
0
votes
0answers
36 views
Getting a unique token from a page using CURL
And so I setup some security in my application by generating a unique token everytime the page reloads, so there won't be a spam-clicking
Lets say I set it up like this:
<a href="#" ...
1
vote
1answer
34 views
Do CURL uses cookies php
So I created a poll using php, this poll does not need an account in order to vote, but I was scared that it can be hacked , spam vote.
I can somehow vote again if I deleted the cookies in the ...
-1
votes
0answers
23 views
Website Hacking using LDAP Module [closed]
Recently my website was under hacking attack where certain files with root previledge had been changed. When I did deeep analysis I found that hacker first installed open-ldap on my CentOS6 Linux and ...
0
votes
3answers
120 views
PHP: Website getting hacked weirdly [duplicate]
I'm currently developing a web interface in PHP/HTML for a Database course project.
Basically, there is an input field :
<form action="<?php echo $_SERVER['PHP_SELF']; ?>" method="POST">
...
1
vote
1answer
27 views
What kind of security injection are these traces of? [closed]
I've tried to secure all information going to the server to make sure there are no SQL injections.
However there are new folders on my server with weird names.
One of our online services is such that ...
2
votes
2answers
65 views
Best way without an internet lookup to secure a paid for application
I have an application that I am currently selling that I want to expand.
However I don't want people to just be able to copy the EXE and give to their friends etc. I know its an almost impossible ...
0
votes
1answer
53 views
buffer overflow exploit example from “Hacking: The Art of Exploitation”
I've found a few related posts about this on the site but non of them explained my problem.
The code is described here:
Link
My issue is the following:
The author tries to rewrite the return address ...
8
votes
1answer
168 views
“Hacking” a way to a remote shell in 5 characters [closed]
This weekend, there was a CTF wargame happening, Secuinside CTF 2013 ( http://war.secuinside.com/ )
Being a computer security enthousiast, I took a look at the challenges, and at their solutions ...
1
vote
2answers
55 views
Is this login structure safe from SQL injection? [duplicate]
I want to / am busy with completely re-writing my whole site. At this point I am working on what I call "members- and safety engine". I have been reading a lot about security and SQL injection, and it ...
0
votes
1answer
72 views
a shellcode to get the shell,but segment default happened
Let me just show you my code first.
char shellcode[] =
"\xeb\x1a\x5e\x31\xc0\x88\x46\x07\x8d\x1e\x89\x5e\x08\x89\x46"
"\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\xe8\xe1"
...
0
votes
1answer
40 views
Creating encryption for cheap secret cameras
I have a friend who uses small, cheap cameras for filming human rights abuses. I am interested in finding a method to write software or firmware to modify standard "gum" secret cameras such as the ...
1
vote
1answer
42 views
Free casino link appearing on Wordpress site
I have recently set up a Wordpress site but I am getting a ' free online casino' link on my site which I can't get rid of.
I have tried looking in the header.php but I can't seem to find it. All of ...
-2
votes
0answers
32 views
I can Access my Modem from Internet [closed]
I recently found that I can access my modem from internet from my IP and using default user name and password for modem.
I need to Know that if one can access my modem from internet how he can access ...
-4
votes
0answers
27 views
Private medical data breach by hackers [closed]
I want to do an academic study about medical data breaches by hacker.
I would like to find if there are patient data retrieved by hacking from medical institutions and available online.
I would also ...
-2
votes
1answer
34 views
Prevent hacking. Need experts advice [closed]
What are all the possible ways to get my files unauthorized from my web server? For example, I have some PDF files in my server and someone downloaded the file and posted in many blogspots. And I am ...
0
votes
1answer
24 views
Find and delete everything and between and including two strings with SSH?
I am struggling to write an ssh command that searches every file on my server that contains
<!--4e530a--> ... malcious code ... <!--/4e530a-->
And then deletes the tags and the ...