[ Hacking 101 ] :: [ Introduction ]

Hacking 101
This entry is part 2 of 11 in the series [ Hacking 101 ]

Hacking 101: Just the Basics.  Okay, I’m picking up another video series, and this time I’m working to answer the question I see on so many pentesting and CTF videos: How do you get started doing this? Watch this video and then: Assignments: Introduction (Video 1) 1. Set up at least three email/user accounts. Try …

[ Hacking 101 ] :: [ What We Mean By Hacking]

This entry is part 4 of 11 in the series [ Hacking 101 ]

Yet Another Explanation of What “Hacking” Really Means If you’ve read a book or two about networking or security (and if you’re here I’ll bet you have), you’ve already had to read some version of where the word “hacker” comes from and what “hacking” really means. But what began as a title of honor has …

[ Hacking 101 ] :: [ Do You Need A Handle? ]

This entry is part 5 of 11 in the series [ Hacking 101 ]

Do You Need A Handle? Yeah breaker one nine this here’s the Rubber Duck Uh, you got a copy on me Pig Pen C’mon Uh yeah Ten-Four Pig Pen fer sure fer sure. -C.W. McCall, “Convoy” Long before there were hackers, there were truckers. Truckers understand the need for handles in the Citizens’ Band (CB) …

[ Hacking 101 ] :: Mac Spoofing

This entry is part 8 of 11 in the series [ Hacking 101 ]

I’m going to take you through several different kinds of hiding and spoofing. Learn to use these to keep your hacking safe(er) and fun. The first technique is MAC address spoofing. When to use MAC spoofing Use it when you’re connected to a local area network (LAN), which means you’re inside your target’s network. This …

[ Hacking 101 ] :: VPNs

This entry is part 11 of 11 in the series [ Hacking 101 ]

A VPN gives you some degree of confidentiality (encryption) and privacy (anonymity), and works great in a business situation where you can have end-to-end encryption. But consumer VPNs aren’t the same, because encryption isn’t end-to-end, and providers are a privacy issue. Here’s a look at different connection types from the perspective of a hacker: web …