Search:

Type: Posts; User: [s]

Page 1 of 12 1 2 3 4

Search: Search took 0.11 seconds.

  1. Replies
    1
    Views
    1,752

    Welcome usman007, have pleasant stay and keep...

    Welcome usman007, have pleasant stay and keep sharing the stuff and your cyber security experience.
  2. Replies
    1
    Views
    2,652

    Welcome uNknowN_AnGeL, I hope you will find good...

    Welcome uNknowN_AnGeL, I hope you will find good stuff here and always share whatever you learn from the community. :-)
  3. Replies
    0
    Views
    5,254

    Finding Secret Key in the Assembly code

    So we have follow given assembly code and we need to find the secrete key out of it. The following method, I've used to extract secrete key.



    >>>...
  4. Replies
    6
    Views
    2,850

    Great no problem, it would be helpful get kick...

    Great no problem, it would be helpful get kick start.
  5. Replies
    6
    Views
    2,850

    B0nd has the point to make different post for...

    B0nd has the point to make different post for each crackMe. The following crackMe I found really interesting, could please just pass the binary file AD_CM#1.EXE. We can also perform the weekly...
  6. Replies
    1
    Views
    6,204

    Well done kiraak, next time possibility of...

    Well done kiraak, next time possibility of getting the Garage4Hacker special member pass in the Nullcon. I hope you keep contributing in the open security community.
  7. Thread: Hi from UK..

    by [s]
    Replies
    1
    Views
    865

    Welcome to Garage4Hackers. Yes All newbie here,...

    Welcome to Garage4Hackers. Yes All newbie here, we believe in sharing is caring and learning.
  8. Replies
    2
    Views
    1,323

    We had meeting for 15 mins and then we went for...

    We had meeting for 15 mins and then we went for the lunch. I think next time in Nullcon we can have good discussion about G4H projects. @B0nd, try and join in the Nullcon :P
  9. Replies
    2
    Views
    1,207

    Welcome NeoLex, welcome to the board. Yes,...

    Welcome NeoLex, welcome to the board. Yes, Gynvael has contributed to webcast series to the community.
  10. Replies
    6
    Views
    7,038

    Certainly yes, see if you can upload the PHP.ini...

    Certainly yes, see if you can upload the PHP.ini on the same path as the shell file located.

    Upload php.ini with following settings.


    safe_mode = Off

    There one more way where you can try...
  11. Nullcon HackIm 2017 CTF - Prepare Yourself for the Warzone

    The every first hint before you start the Nullcon HACKIM 2017.


    Data! Data! Data!.. I can't make bricks without clay. - Sherlock Holmes
    ...
  12. Replies
    0
    Views
    1,259

    x33fcon 2017 - Our New Community partner

    https://pbs.twimg.com/media/C3J6SozVcAE6b-y.jpg



    We are glad to announce that Garage4hackers is now a community partner for X33fCon 2017

    About x33fcon

    Yet another security con? Nope.
  13. Announcement of Nullcon 2017 Conference Tickets Winners

    Dear G4H members,

    I'm glad to announce the winners of Nullcon 2017 Conference Tickets. Selecting process we already released on the our portal, you can view the post here.

    You can find here...
  14. Replies
    0
    Views
    1,682

    How to avail the G4H community facilities

    Hi G4H Members,

    At Garage4Hackers, we perform number of activities with the aim of sharing the knowledge with the community and enhancing the skill set of individuals by sharing the thoughts on...
  15. Replies
    1
    Views
    10,954

    Hi , The simple answer to this question is...

    Hi ,

    The simple answer to this question is NO. The Parameterized or prepared statements are usually good enough to prevent SQL injection but not fully. If you do not set the character encoding...
  16. Replies
    1
    Views
    3,383

    I would like to encourage you to make post on the...

    I would like to encourage you to make post on the answers.garage4hackers.com.
  17. I've approved your all threats. Keep on...

    I've approved your all threats. Keep on submitting your exciting forum post :-)
  18. Thread: Hello Friend

    by [s]
    Replies
    1
    Views
    1,174

    Super! Your profile is completely fit to start in...

    Super! Your profile is completely fit to start in infosec. Enjoy the stay buddy!
  19. Replies
    1
    Views
    4,337

    I would like to suggest you to make post on the...

    I would like to suggest you to make post on the http://answers.garage4hackers.com
  20. Thread: Hello Guys

    by [s]
    Replies
    1
    Views
    1,299

    Welcome bro, we have good number section where...

    Welcome bro, we have good number section where you can demonstrate your skill set and enjoy!
  21. Replies
    1
    Views
    1,087

    Welcome Omega! I hope you will share your unique...

    Welcome Omega! I hope you will share your unique research in the forum. It will be helpful for other members.
  22. Thread: Need a hacker ;)

    by [s]
    Replies
    1
    Views
    3,566

    I need a BMW Series car :D ........

    I need a BMW Series car :D ........
  23. Replies
    4
    Views
    19,412

    limited shell bypass

    Exactly! simply echo os.system('/bin/bash') is good option.
  24. Replies
    0
    Views
    1,434

    Windows Registry Rootkit

    Rootkit uses the zero day vulnerability in win32k.sys (buffer overflow in function win32k!bInitializeEUDC()) to get the execution at the OS startup.

    Features:

    NDIS-based network backdoor (+...
  25. Oracle out-of-band release for Java SE Vulnerability

    It has a form of the check For TypeAlias method, which is invoked for each successfully resolved MemberName object and it was leading to the out-of-band vulnerability.

    POC :...
Results 1 to 25 of 300
Page 1 of 12 1 2 3 4