Google is known worldwide for its search engine and its superb technology. The way it makes so fast searches even before we could finish typing the keywords and developing softwares like chrome, android OS 4 and a lot many more things most of us haven’t even heard of. But with all this techno look, it is witty, funny and loves to surprise people with its pranks, goofs, and put-ons. Google calls them Easter eggs.Continue reading “Google Easter Eggs – All that you want to know”
Sam still believes saving the password in a file is still the best way to remember it and keep it secured, time to prove him wrong once again. As the description says the password is in the same directory(folder) as we are.
This time Network Security Sam has saved the unencrypted level7 password in an obscurely named file saved in this very directory.
The second line of the description tell us about one another news that came from Sam, about setting up an UNIX cal command script and with that we are provided with the script even.Continue reading “HACKTHISSITE.ORG | Basic 7: Unix”
Sam has got a lot wiser, he understood that a password if encrypted is a lot difficult to crack. But like every other time he made a mistake. He used such an encryption system that is publicly available and is not good enough. Well, the rest of the hack is a lot easier as we have already got the encrypted password ‘a6c;459?‘.Continue reading “HACKTHISSITE.ORG | Basic 6: Decrypt an encryption”
This time Sam hardcoded the password into the script. However, the password is long and complex, and Sam is often forgetful. So he wrote a script that would email his password to him automatically in case he forgot.
Now, as we see, Sam is quite forgetful, and he forgets his password all the time, so he wrote some script that would mail him the password. Lets begin with checking the source code as we always do.Continue reading “HACKTHISSITE.ORG | Basic 4: Changing the scripts”
This level takes us little more deeper into HTML. Lessons learnt in previous levels should be remembered they can be useful any time.
This time Network Security Sam remembered to upload the password file, but there were deeper problems than that.
This time the password file is there, but with deeper problems. Lets just follow the simple steps we had learn in level 1 i.e. check out the source code.Continue reading “HACKTHISSITE.ORG | Basic 3: Deep into HTML”