Friday, 26 January 2024

perPage: 7,

We had an overwhelming turnout out of submissions for Call for Papers and Call for Training for the OWASP Global AppSec DC 2019 (formerly AppSec USA)  We want to give each submission the time deserved to evaluate each before choosing.  Keeping that in mind the notifications of acceptance and thanks will be CHANGED to July 1, 2019.  We appreciate your understanding and patience in this matter.

More articles


  1. Physical Pentest Tools
  2. Pentest Reporting Tools
  3. Hacker Tools Mac
  4. Pentest Tools For Ubuntu
  5. Hack Rom Tools
  6. Nsa Hack Tools
  7. Hacking Tools Download
  8. Hacking Tools Mac
  9. Github Hacking Tools
  10. Hacking Tools Pc
  11. Underground Hacker Sites
  12. Pentest Box Tools Download
  13. Hacking Tools For Games
  14. New Hack Tools
  15. Hacking Tools For Pc
  16. Free Pentest Tools For Windows
  17. Pentest Tools Open Source
  18. Tools 4 Hack
  19. Pentest Tools Port Scanner
  20. How To Hack
  21. Hack And Tools
  22. Hacking Tools For Kali Linux
  23. Hacking Tools Windows 10
  24. Pentest Tools Open Source
  25. Hacker Tools Free
  26. Hacking Tools Hardware
  27. New Hacker Tools
  28. Hacker Tools Apk Download
  29. Hacker Tools For Ios
  30. Hacking Tools Name
  31. Pentest Automation Tools
  32. Pentest Tools Download
  33. Install Pentest Tools Ubuntu
  34. Pentest Tools Free
  35. Hacking Tools Name
  36. Pentest Reporting Tools
  37. How To Make Hacking Tools
  38. Pentest Tools Android
  39. Pentest Tools List
  40. Beginner Hacker Tools
  41. Hacker Tools For Mac
  42. Hacker Tools For Windows
  43. Hacking Tools For Windows 7
  44. Pentest Tools Nmap
  45. Pentest Recon Tools
  46. Pentest Tools Website Vulnerability
  47. Hacking Tools Online
  48. Hack Tools For Windows
  49. Hacker Tools
  50. Pentest Tools Bluekeep
  51. Hacking Tools For Games
  52. Hackrf Tools
  53. Computer Hacker
  54. Hack App
  55. Beginner Hacker Tools
  56. Hacker Tools Hardware
  57. Hacker Tools Free Download
  58. Hacking Tools Kit
  59. Pentest Tools Github
  60. Pentest Automation Tools
  61. Pentest Tools Framework
  62. Hacking Tools And Software
  63. Best Pentesting Tools 2018
  64. Hacker Tools Linux
  65. Hacking App
  66. New Hacker Tools
  67. Hacking Tools Usb
  68. Hack Tools Download
  69. New Hacker Tools
  70. Pentest Recon Tools
  71. Hacker Tools Github
  72. Hack Tools Github
  73. Underground Hacker Sites
  74. Pentest Tools For Ubuntu
  75. Nsa Hacker Tools
  76. Pentest Tools Bluekeep
  77. Hacking Tools Download
  78. Hack Tools
  79. Hacker Tools For Pc
  80. Hacker Tools Apk
  81. Hacking Tools For Windows Free Download
  82. Hack Tool Apk
  83. Pentest Tools Find Subdomains
  84. Hack Tools For Pc
  85. Hack Tools For Games
  86. Pentest Tools Linux
  87. Nsa Hacker Tools
  88. Hacking Apps
  89. Hacker Search Tools
  90. Pentest Tools Download

Thursday, 25 January 2024

perPage: 7,

Many of people want to start PHP programming embedded with MYSQL databases concepts. So i thought that I should start a series about PHP and MYSQL. So in this series of video tutorials you exactly got the content about PHP and MYSQL.

As PHP is server side scripting language. So it requires a server to get execute over the web browser. First of all you have to download and install a server that may be XAMPP, WAMPP or LAMPP. I'm using XAMPP server in the tutorials. So if you wanna follow me then download a XAMPP server. I'm using this because it has a good interface to work  and it's really simple. XAMPP is compatible with windows, MAC and Linux operating as well. WAMPP is only for windows and LAMPP is used for MAC and Linux operating system. So i prefer XAMPP for this series.

How to create Database

Step 1:

Open Your XAMPP control panel and start Apache and Mysql services.

Step 2:

Go to your Web browser and type "localhost/phpmyadmin". It will open your databases area. If you have an error then your services are not in running state. If you have any error then comment below.

Step 3:

Click over the "new" to create a new database.

Step 4:

Write Database_Name and click over the Create button. For example Facebook, Students etc.

Step 5:

Write Table_Name like admin, users etc. your can increase and decrease the size of rows. Click over Save/Create button.

Step 6:

Write your Attribute_Names in first column like Username, Email, Passwords etc. In the next data type column you have to select the data type whether it is integer or string type etc. In the next column you have to set the length of string/words.

Step 7:

If you wanna go through with a Primary_Key. Then just you have to checked the Auto_Increment box as you will shown in the video. For further watch the video for better understanding. 


Continue reading


  1. Pentest Tools Bluekeep
  2. Hackers Toolbox
  3. Pentest Tools Android
  4. Pentest Tools Online
  5. Tools Used For Hacking
  6. Pentest Tools Website Vulnerability
  7. Hackers Toolbox
  8. Pentest Tools Windows
  9. Hack Tools Online
  10. Termux Hacking Tools 2019
  11. Hacker Tools Linux
  12. Hack Tools For Pc
  13. Pentest Tools Port Scanner
  14. World No 1 Hacker Software
  15. Hacking Tools 2020
  16. Hacker Tools For Windows
  17. Pentest Tools Find Subdomains
  18. New Hack Tools
  19. New Hacker Tools
  20. How To Make Hacking Tools
  21. Github Hacking Tools
  22. Hacking Tools For Kali Linux
  23. Hacking Tools For Windows 7
  24. Hack Tools Online
  25. Ethical Hacker Tools
  26. Hackers Toolbox
  27. New Hacker Tools
  28. Tools Used For Hacking
  29. Hacking Tools Free Download
  30. Nsa Hack Tools Download
  31. Hacking Tools Download
  32. What Is Hacking Tools
  33. Game Hacking
  34. Pentest Tools Subdomain
  35. Tools 4 Hack
  36. Hack Tools Github
  37. Hack Tools For Ubuntu
  38. Hacking Tools Usb
  39. Pentest Reporting Tools
  40. Pentest Tools Linux
  41. Tools Used For Hacking
  42. Hacking Tools Download
  43. Hacking Tools
  44. Hack Tools For Ubuntu
  45. Free Pentest Tools For Windows
  46. Pentest Tools Framework
  47. Github Hacking Tools
  48. Hacking Tools For Windows Free Download
  49. Hacker Tools Hardware
  50. Hack Tool Apk No Root
  51. Wifi Hacker Tools For Windows
  52. Hacking Tools For Windows
  53. Termux Hacking Tools 2019
  54. Hacking Tools Online
  55. Pentest Automation Tools
  56. Hacker Tools Apk Download
  57. New Hack Tools
  58. Pentest Tools Windows
  59. Hacking Tools Hardware
  60. Hack Tools Online
  61. Hack And Tools
  62. Pentest Tools Github
  63. Wifi Hacker Tools For Windows
  64. Hack Tools Download
  65. Nsa Hack Tools
  66. New Hacker Tools
  67. Nsa Hack Tools Download
  68. Hacker Tools Free
  69. Pentest Tools Nmap
  70. Hacking Tools For Mac
  71. Hacker Search Tools
  72. Pentest Tools Github
  73. Hacking Tools For Games
  74. Game Hacking
  75. New Hack Tools
  76. Pentest Tools For Mac
  77. Hacker Security Tools
  78. Pentest Recon Tools
  79. Pentest Tools Open Source
  80. Hacker Tools 2020
  81. Hacking Tools For Games
  82. New Hack Tools
  83. Wifi Hacker Tools For Windows
  84. Hacker Tool Kit
  85. Termux Hacking Tools 2019
  86. Hacker Tools Github
  87. Nsa Hack Tools Download
  88. Bluetooth Hacking Tools Kali
  89. Pentest Tools For Windows
  90. Pentest Tools Framework
  91. Hack Tool Apk
  92. Pentest Recon Tools
  93. Game Hacking
  94. Beginner Hacker Tools
  95. Pentest Tools Kali Linux
  96. Pentest Tools Open Source
  97. Hacking Tools For Games
  98. Hack Tools 2019
  99. Hacker Search Tools
  100. Hacker Tools Github
  101. How To Hack
  102. World No 1 Hacker Software
  103. Free Pentest Tools For Windows
  104. Usb Pentest Tools
  105. Hacker Hardware Tools
  106. Hacker Tools For Windows
  107. Hacking Tools Download
  108. Hacker Tools For Mac
  109. Best Pentesting Tools 2018
  110. Hacking Tools For Windows Free Download
  111. Tools For Hacker
  112. Pentest Tools Online
  113. Hack Tools Mac
  114. Best Hacking Tools 2019
  115. Install Pentest Tools Ubuntu
  116. Pentest Tools Url Fuzzer
  117. Pentest Tools
  118. Hacker Tools For Ios
  119. Game Hacking
  120. How To Hack
  121. Hacker Tools For Pc
  122. Pentest Tools Github
  123. Hackers Toolbox
  124. Beginner Hacker Tools
  125. Pentest Tools Free
  126. Pentest Tools Download
  127. Github Hacking Tools
perPage: 7,

Connecting Hardware to Your Real Car: 

 I realized the other day I posted Part 2 of this series to my youtube awhile ago but not blogger so this one will be quick and mostly via video walkthrough. I often post random followup videos which may never arrive on this blog. So if you're waiting on something specific I mentioned or the next part to a series its always a good idea to subscribe to the YouTube. This is almost always true if there is video associated with the post.  

In the last blog we went over using virtual CAN devices to interact with a virtual car simulators of a CAN network This was awesome because it allowed us to learn how to interact with he underlying CAN network without fear of hacking around on an expensive automobile. But now it's time to put on your big boy pants and create a real CAN interface with hardware and plug your hardware device into your ODB2 port. 

The video I created below will show you where to plug your device in, how to configure it and how to take the information you learned while hacking around on the virtual car from part1 and apply it directly to a real car.   

Video Walk Through Using Hardware on a Real Car




As a reference here are the two device options I used in the video and the needed cable: 

Hardware Used: 

Get OBD2 Cable:
https://amzn.to/2QSmtyL

Get CANtact:
https://amzn.to/2xCqhMt

Get USB2CAN:
https://shop.8devices.com/usb2can


Creating Network Interfaces: 

As a reference here are the commands from the video for creating a CAN network interface: 

USB2Can Setup: 
The following command will bring up your can interface and you should see the device light color change: 
sudo ip link set can0 up type can bitrate 125000

Contact Setup: 
Set your jumpers on 3,5 and 7 as seen in the picture in the video
Sudo slcand -o -s6 /dev/ttyACM can0 <— whatever device you see in your DMESG output
Ifconfig can0 up

Summary: 

That should get you started connecting to physical cars and hacking around. I was also doing a bit of python coding over these interfaces to perform actions and sniff traffic. I might post that if anyone is interested. Mostly I have been hacking around on blockchain stuff and creating full course content recently so keep a look out for that in the future. 

More articles


  1. Underground Hacker Sites
  2. Hacker Tools Hardware
  3. Hacker Tools Windows
  4. Android Hack Tools Github
  5. Pentest Tools
  6. Hacker Tools Mac
  7. Pentest Reporting Tools
  8. Hack Apps
  9. Hacker Tools 2019
  10. Hack Tools Github
  11. Hacking Tools Mac
  12. Hacking Tools For Windows
  13. Blackhat Hacker Tools
  14. Pentest Tools Website
  15. Pentest Tools For Ubuntu
  16. Install Pentest Tools Ubuntu
  17. Hackrf Tools
  18. Github Hacking Tools
  19. Hacking Tools For Beginners
  20. Hacking Tools For Pc
  21. Ethical Hacker Tools
  22. Pentest Tools Nmap
  23. Hacking Tools For Mac
  24. Pentest Tools Tcp Port Scanner
  25. Pentest Box Tools Download
  26. Hacker Search Tools
  27. Hacking Tools Free Download
  28. Pentest Recon Tools
  29. Hacking Tools Software
  30. Hack Tools
  31. Hack Tools Github
  32. Hacking Tools Windows 10
  33. Tools 4 Hack
  34. New Hack Tools
  35. New Hacker Tools
  36. Hacker Tools 2020
  37. Hacker Tool Kit
  38. Hacker Tools For Mac
  39. Bluetooth Hacking Tools Kali
  40. Hacking Tools For Windows Free Download
  41. Hacking Tools For Beginners
  42. Pentest Tools List
  43. Pentest Recon Tools
  44. How To Install Pentest Tools In Ubuntu
  45. Pentest Tools For Ubuntu
  46. Hacking Tools Kit
  47. Computer Hacker
  48. Hacking Tools Download
  49. Hack Tool Apk
  50. Hacker Tools Windows
  51. Hackers Toolbox
  52. Pentest Tools Port Scanner
  53. Pentest Tools Find Subdomains
  54. Pentest Tools Nmap
  55. Pentest Tools Port Scanner
  56. Hacking App
  57. Hacker Tools Windows
  58. Hack Tools 2019
  59. Pentest Tools Nmap
  60. Hacker Tools Free Download
  61. Pentest Tools Download
  62. Pentest Tools Port Scanner
  63. Hacking Tools Download
  64. Hack Tools Pc
  65. Pentest Tools Website
  66. Pentest Tools Windows
  67. Hacking Tools 2019
  68. Hackrf Tools
  69. Hacker Tools Free
  70. Hacker Tools 2019
  71. Nsa Hacker Tools
  72. Hacker Tools
  73. Hacking Tools For Windows
  74. How To Make Hacking Tools
  75. Hacker Security Tools
  76. What Are Hacking Tools
  77. Easy Hack Tools
  78. Pentest Recon Tools
  79. Usb Pentest Tools
  80. Android Hack Tools Github
perPage: 7,
Hackerhubb.blogspot.com

Related posts


  1. Pentest Tools Website Vulnerability
  2. Hacking Tools Download
  3. Hacker Tools 2020
  4. Hack Apps
  5. Nsa Hack Tools Download
  6. Pentest Tools For Ubuntu
  7. Hacker Tools 2020
  8. Best Hacking Tools 2019
  9. Hacker Tools List
  10. Nsa Hack Tools Download
  11. Hacking Tools Download
  12. What Are Hacking Tools
  13. Hacking Tools For Windows Free Download
  14. Computer Hacker
  15. Hacker Tools Apk
  16. Hacking Tools 2020
  17. Hacking Tools For Windows
  18. Hack Tools For Windows
  19. Pentest Box Tools Download
  20. Hacking Tools For Pc
  21. Hacking Tools Kit
  22. Pentest Tools Find Subdomains
  23. Pentest Box Tools Download
  24. Hak5 Tools
  25. Pentest Tools Port Scanner
  26. Hacking Tools Windows
  27. Pentest Tools For Ubuntu
  28. Pentest Tools For Android
  29. Hacker Techniques Tools And Incident Handling
  30. Hacking Tools For Pc
  31. Hacker Hardware Tools
  32. Hacker Tools List
  33. Hack Tools Download
  34. Kik Hack Tools
  35. Hack And Tools
  36. Hacker Tools For Ios
  37. Hack Tools For Pc
  38. Pentest Tools Nmap
  39. Nsa Hack Tools Download
  40. Hacking Tools Github
  41. Hacker Tools Linux
  42. Hack Tools For Games
  43. Black Hat Hacker Tools
  44. Hacker Tools Hardware
  45. Hack App
  46. Hacker Tools 2019
  47. Hacking Tools For Beginners
  48. Hacking Tools Download
  49. Hack Tools
  50. Hacking Tools Kit
  51. Easy Hack Tools
  52. Hack Tools Github
  53. Pentest Tools For Windows
  54. Hacker Tools Mac
  55. Pentest Tools Url Fuzzer
  56. Hacking Tools For Mac
  57. Hacker Search Tools
  58. How To Hack
  59. Hacker Tools
  60. Blackhat Hacker Tools
  61. Hacking Tools 2019
  62. Pentest Tools Port Scanner
  63. Nsa Hacker Tools
  64. Hacker Tools Hardware
  65. Pentest Tools Kali Linux
  66. Pentest Tools For Ubuntu
  67. Hack Tools
  68. World No 1 Hacker Software
  69. Hak5 Tools
  70. Hacker Search Tools
  71. Hacking Tools 2019
  72. Pentest Tools Review
  73. Pentest Tools Subdomain
  74. Pentest Tools For Ubuntu
  75. Pentest Tools Github
  76. Hacking Apps
  77. Beginner Hacker Tools
  78. Hackrf Tools
  79. Pentest Automation Tools
  80. Kik Hack Tools
  81. Hack Tools

Wednesday, 24 January 2024

perPage: 7,

Welcome back, hope you are enjoying this series, I don't know about you but I'm enjoying it a lot. This is part 3 of the series and in this article we're going to learn some new commands. Let's get started

Command: w
Syntax:      w
Function:   This simple function is used to see who is currently logged in and what they are doing, that is, their processes.

Command:  whoami
Syntax:       whoami
Function: This is another simple command which is used to print  the  user  name  associated  with the current effective user ID.

Try it and it will show up your user name.

If you want to know information about a particular user no matter whether it is you or someone else there is a command for doing that as well.

Command: finger
Syntax:      finger [option] [username]
Function:   finger is a user information lookup program. The [] around the arguments means that these arguments are optional this convention is used everywhere in this whole series.

In order to find information about your current user you can simply type:

finger username

Here username is your current username.
To find information about root you can type:

finger root

and it will display info about root user.

Command: uname
Syntax:      uname [options]
Function:   uname is used to display information about the system.

uname is mostly used with the flag -a, which means display all information like this:

uname -a

Command: df
Syntax:      df [option] [FILE ...] 
Function:   df is used to display the amount of space available.
If you type df in your terminal and then hit enter you'll see the used and available space of every drive currently mounted on the system. However the information is displayed in block-size, which is not so much human friendly. But don't worry we can have a human friendly output as well using df by typing:

df -h

the -h flag is used to display the used and available space in a more user friendly format.
We can also view the info of a single drive by specifying the drive name after df like this:

df -h /dev/sda2

That's it for now about df, let's move on.

Command:  free
Syntax:       free [options]
Function:    free is used to display the amount of free and used physical memory and swap memory in the system.
Again the displayed information is in block-size to get a more human readable format use the -h flag like this:

free -h

Command: cal
Syntax:      cal [options]
Function:    cal stands for calendar. It is used to display the calendar.

If you want to display current date on the calendar you can simply type:

cal

and wohooo! you get a nice looking calendar on screen with current date marked but what if you want to display calendar of a previous month well you can do that as well. Say you want to display calendar of Jan 2010, then you'll have to type:

cal -d 2010-01

Nice little handy tool, isn't it?

Command: file
Syntax:      file filename ...
Function:   file is an awesome tool, it's used to classify a file. It is used to determine the file type.

Let's demonstrate the usage of this command by solving a Noob's CTF challenge using file and base64 commands. We'll talk about base64 command in a bit. Go to InfoSecInstitute CTF Website. What you need to do here is to save the broken image file on your local computer in your home directory. After saving the file open your terminal (if it isn't already). Move to your home directory and then check what type of file it is using the file command:

cd
file image.jpg

Shocking output? The file command has identified the above file as an ASCII text file which means the above file is not an image file rather it is a text file now it's time to see it's contents so we'll type:

cat image.jpg

What is that? It's some kind of gibberish. Well it's base64 encoded text. We need to decode it. Let's learn how to do that.

Command: base64
Syntax:       base64 [option] FILE ...
Function:    base64 command is used to encode/decode data and then print it to stdout.

If we're to encode some text in base64 format we'd simply type base64 hit enter and then start typing the text in the terminal after you're done hit enter again and then press CTRL+D like this:

base64
some text here
<CTRL+D>
c29tZSB0ZXh0IGhlcmUK        # output - the encoded string

But in the above CTF we've got base64 encoded data we need to decode it, how are we going to do that? It's simple:

base64 -d image.jpg

There you go you've captured the flag.
The -d flag here specifies that we want to decode instead of encode and after it is the name of file we want to decode.

Voila!
So now you're officially a Hacker! Sorry no certificates available here :)

That's it for this article meet ya soon in the upcoming article.
Related links

Blog Archive

GET THE LOVE OF YOUR LIFE

Popular Posts

Recent Posts