Register
Help
Remember Me?
What's New?
Articles
Home
Forum
Blogs
G4H Team
IRC
Ranchoddas
Events and Conferences
Advanced Search
Home
G4H Tutorial and Papers
The forum is
frozen forever
- but it won't die; it'll stay for long in search engine results and we hope it would keep helping newbies in some way or other - cheers!
'); loadVbCss(yuipath + '/treeview/assets/skins/sam/treeview.css'); //-->
Menu
G4H Tutorial and Papers
G4H Tools and Scripts
G4H Exploits
CTF & Meet Writeups
Google Hall of Fame
Teensy
Bug Bounty Listing
Web Application Security
Exploitation Techniques
RWS Webcast Recording
Blogs
G4H Tutorial and Papers
G4H Tools and Scripts
G4H Exploits
CTF & Meet Writeups
Google Hall of Fame
Teensy
Bug Bounty Listing
Web Application Security
Exploitation Techniques
RWS Webcast Recording
Blogs
G4H Tutorial and Papers
Hacking and Securing iOS Applications - Clubhack 2012 [ppt & Demos]
by
satishb3
View Profile
View Forum Posts
Private Message
View Blog Entries
View Articles
Published on 12-09-2012 11:52 AM Number of Views: 3178
Abstract:
iOS applications share common set of classes and highly depends on the operating system solutions for data ...
Read More
Performing Android malware analysis
by
prashant_uniyal
View Profile
View Forum Posts
Private Message
View Blog Entries
Visit Homepage
View Articles
Published on 05-26-2012 09:53 AM Number of Views: 5758
In the past few years, malware and Trojans have moved with a rapid pace when it comes to mobile portability. Many famous ...
Read More
Network Architecture Review Checklist
by
AnArKI
View Profile
View Forum Posts
Private Message
View Blog Entries
Visit Homepage
View Articles
Published on 04-22-2012 05:15 PM Number of Views: 4127
The primary goal of the checklist is to make it useful and as a trusted guide for IT Auditors,Security Consultant in Network ...
Read More
Bloodshed Dev-C++ 4.9.9.2 Compiler Analysis [Reversing Engineering Tips] Part-I
by
nishant
View Profile
View Forum Posts
Private Message
View Blog Entries
View Articles
Published on 03-02-2012 02:12 PM Number of Views: 6477
Okay folks,
This is one idea that came to my mind. Its pretty simple, I'm trying to write some sample programs ...
Read More
Bloodshed Dev-C++ 4.9.9.2 Compiler Analysis [Reversing Engineering Tips] Part-II
by
nishant
View Profile
View Forum Posts
Private Message
View Blog Entries
View Articles
Published on 03-02-2012 02:09 PM Number of Views: 3280
Okay now if we closely analyse all the C source codes and their corresponding ASM files we seem to see a pattern in the ...
Read More
Breaking The Crypt - Advanced Hash Cracking
by
c0d3inj3cT
View Profile
View Forum Posts
Private Message
View Blog Entries
View Articles
Published on 01-10-2012 10:16 PM Number of Views: 5190
Advanced Hash Cracking Techniques
This is a series of articles where I will cover the following topics: ...
Read More
2 Comments
John The Ripper (JTR) - Tweak That Attack!
by
c0d3inj3cT
View Profile
View Forum Posts
Private Message
View Blog Entries
View Articles
Published on 01-09-2012 05:27 PM Number of Views: 5246
I decided to blog about an overview of few methods and concepts I used for cracking hashes during DEFCON 2011, Crack Me ...
Read More
2 Comments
Database protection Techniques : a different prespective
by
Anant Shrivastava
View Profile
View Forum Posts
Private Message
View Blog Entries
Visit Homepage
View Articles
Published on 06-28-2011 09:27 PM Number of Views: 4131
Tips for Db Security
Disclaimer : This post keeps in mind the web frontends and web applications based ...
Read More
Penetration Testing Biometric System: Part II:- Remotel Attacks
by
fb1h2s
View Profile
View Forum Posts
Private Message
View Blog Entries
Visit Homepage
View Articles
Published on 03-02-2011 01:59 PM Number of Views: 6138
Continued from
Biometrics: The Technical part:
Remote Attack: The attack vectors.
...
Read More
4 Comments
Bypassing a Cisco IOS firewall
by
fb1h2s
View Profile
View Forum Posts
Private Message
View Blog Entries
Visit Homepage
View Articles
Published on 12-13-2010 07:04 PM Number of Views: 5998
This documentation is about a successful attack Strategy on something which I was trying out form last 15 days. It all ...
Read More
Story of a PoC - F5 BIG-IP Cookie Information Disclosure
by
the_empty
View Profile
View Forum Posts
Private Message
View Blog Entries
View Articles
Published on 11-07-2010 06:40 PM Number of Views: 5564
Originally Posted by
the_empty
Curiosity is the biggest virtue of a hacker’s mindset. Only because curiosity people like me loose focus of the actual target
...
Read More
NatSec worm Source code --- Lets discus...
by
"vinnu"
View Profile
View Forum Posts
Private Message
View Blog Entries
View Articles
Published on 10-13-2010 10:44 PM Number of Views: 5928
Author : "vinnu"
Developer : "vinnu"
Team : Legion Of Xtremers
Year : 2006-2007 ...
Read More
1 Comment
Demystifying The Ashi virus--"vinnu"
by
prashant_uniyal
View Profile
View Forum Posts
Private Message
View Blog Entries
Visit Homepage
View Articles
Published on 08-25-2010 05:08 PM Number of Views: 4608
Ashi Virus was developed by "vinnu" bhai last year. It was a perfect example of a self propogating virus. Let ...
Read More
1 Comment
Cracking Salted Hashes
by
fb1h2s
View Profile
View Forum Posts
Private Message
View Blog Entries
Visit Homepage
View Articles
Published on 08-23-2010 02:31 PM Number of Views: 4816
Cracking Salted Hashes
Web Application Security: - The Do’s and Don’ts of “Salt Cryptography”
Overview: ...
Read More
1 Comment
Penetration testing - [MSSQL P4wnage]
by
fb1h2s
View Profile
View Forum Posts
Private Message
View Blog Entries
Visit Homepage
View Articles
Published on 07-25-2010 11:19 PM
Well MSSQl which is my favorite DB back end which I always look for when trying to 0wn something or in an Internal or External ...
Read More
3 Comments
Penetration testing - [Intel CBA CreateProcess() on Symantec ]
by
fb1h2s
View Profile
View Forum Posts
Private Message
View Blog Entries
Visit Homepage
View Articles
Published on 07-13-2010 11:09 AM Number of Views: 3856
One of the best way of getting a good output form a PT when you have a huge no of IPs for audit,and considerably less time, ...
Read More
2 Comments
G4H Facebook
G4H Twitter
Tweets by @garage4hackers