POGDEN.CO.UK

 

Home

 

‘If you know your enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither your enemy nor yourself, you will succumb in every battle.’  Sun Tzu – The Art Of War

 

 

 

All of the information provided here Can be built on with a little research on the web. Remember the difference between Good and Bad is PERMISSION!!. You don’t want to spend the best part of your life sitting in a cell with Bubba so remember that the techniques explained in these tutorials are meant to give you an insight into computer security. These tutorials should give you an idea of what malicious users can do to your (or your corporate) Network. If you are going to attempt any of the methods described here please make sure you own or have permission to use the target for this purpose.

 

 

 

 

 

What Is a Hacker?                          Social Engineering Part 1

 

Buffer Overflows for Beginners                  Social Engineering Part 2

 

Bluetooth Hacking                           SQL Injection Basic Tutorial

 

CGI Abuse                                   Demo Videos

 

          Advanced SQL Injection Techniques           Sniffing via remote GRE Tunnels

 

          Pen Test                                    XP-SP2 Registry Back Door

 

          Avoiding older style wire taps

 

3G and UMTS Networks                            (XDA Exec/3g Network Tools)

 

 

These are some very (Very) basic tutorials, and give an overview of the types of attacks that can occur. Please don’t email me asking to teach you to hack. Its an invitation to be ridiculed… I’ve learned through years of research, several painful exams, hard work and even now I don’t consider myself to be fully conversant in all areas of security. It’s a learning curve that will continue right through my career. There’s always something new to learn J