So You’re Sick Of Being A SKIDDIE? Let’s Hack For Real

This post below is an article written by michaeljay from HackForums, you can see the original post here.  I find it quite informative and it has quality over other similar threads.

Then what can you do about it?

Sick of just being able to push buttons and not know what you’re doing? Tired of seeing error messages in aircrack and being frozen because you have no real idea of what you’re typing? I saw a thread here from someone saying he’s sick of being a skiddie, so I figured I’d write this post up to explain how I went from being a skiddie to someone who knows his way around various protocols and techniques. Not that I consider myself a l337 hax0r, by any means. Most of the posters here would blow me away with their skill and knowledge. But I feel I’ve got some stuff to share, and my girlfriend is doing her own thing tonight, so I’m going to write this post up for you. For good or for evil. Read the rest of this entry »

Nessus + Metasploit = db_autopwn

Have you ever wanted to use 1 line of code that can do all the wonders of hacking for you, eg. entering the remote computer in your network without the target knowing?  Or remotely install a program into the computer and start running that program without their consent?  Wondering which exploit exists in Metasploit that is similar to the vulnerability you have found using Nessus?

Enter the world of combination between Metasploit and Nessus.  By linking both of them together, you can now run a simple code in Metasploit to do both of it at the same time!


Read on to find out more on what hydra is and how it is used by hackers to crack password in matter of hours! Be it email, ftp or Facebook! With the right set of skills, you can do whatever you want with it as long as it is in the area you are allowed to. In this article, I will be writing a quick description on how to install it and how to use it on a basic level.

Read the rest of this entry »

HTTP File Downloader for Linux and Windows in C | Source Code

A member in HackForums by the handle Jakash3 has posted a source code on how to download files from the Internet that can be compiled in both Linux and Windows.  Another great feature is that it supports IPv6. Read the rest of this entry »

The official way of writing a crypter in C | Source Code

mindlessdeath, a member from HackForums have posted a thread regarding how to write a crypter in C!  I find this source code a very good example for people that are trying to learn to write their own crypter.  Compared to any other source codes that are posted on the internet, the author of this source code gave a very detailed information on each line on what the statements does.  In order to use this source code without much trouble, there are some prerequisites that was mentioned by the author himself.  Read the rest of this entry »

Googlestruction, the ultimate power!

Do you know that Google is a very powerful search tool?  I am not trying to pull your leg here asking you to use Uncle Google in time of needs.  I had a lesson today in one of my lecturer classes given by my professor in the subject Malicious Software and Security Programming.  Do you know that googling may give you result you may never expected?  Try googling for “ allintext:exam paper filetype:doc OR filetype:pdf”.  This may just give you your coming exams paper!  Today i will be posting some of the amazing links that can be helpful with Google!

1.) IHS | GHDB
2.) Google Hacking Database, GHDB, Google Dorks

I would like to highlight that the first link posted above is the person that has discovered GHDB according to my professor.  If you like this post or require some study materials in learning Google Hacking, write a comment below so i will update it further.

Decrypt Firefox 3.5 and 3.6 stored passwords in C | Source Code | Application

If you have already decrypted passwords for Firefox 1, 2 and 3 (if you need them, it’s here), here is the source code in C that helps you decrypt Firefox passwords for version 3.5 and 3.6!  This source code is written by ZeR0 from  This source code is generally open source by the author but the terms of use is to give credits if you use it.

Download source code here (link removed).
Download binary / application here (link removed).


Can someone out there tell us what are the differences between a hacker and an ethical hacker?  The first thing that comes in mind would be (1) a hacker is someone bad hacking computers whereas (2) an ethical hacker is someone that hacks but it is for the goodness.  Alright here comes the contradiction, my professor called Ali says that “if there is an ethical hacker, can there be an ethical liar or an ethical murderer Read the rest of this entry »


This is our world now. The world of the electron and the switch; the beauty of the baud. We exist without nationality, skin color, or religious bias. You wage wars, murder, cheat, lie to us and try to make us believe it’s for our own good, yet we’re the criminals. Yes, I am a criminal. My crime is that of curiosity. I am a hacker, and this is my manifesto. You may stop me, but you can’t stop us all.


What do you think of the term hacker?  Do you think of crime, danger or intrusion when you hear it?  Or maybe security, programming and computer analysis.  Do you call yourself a hacker because you know how to make malicious applications or use applications that have been programmed by professionals to do your malicious tasks?  I personally believe that a hacker is someone that has an expertise in the computer system, finding exploits and has the ability to find holes on system and mend it.  Do not believe in what i said, but let’s hear what do you think of the word hacker.

Posted in Random. Tags: , . Leave a Comment »

List some of your favourite forums

Looking for a forum to hang around but no idea which to join or where to join?  Take a look at our list of forums that explains their environment and how great they are!  If you want to promote your forum, you can post a comment below and we will scout around your forum to analyze them before placing them in our list. Read the rest of this entry »