HACKERBOT

shotting.cc

DEFCON-1

HOME

WELCOME TO SHOTTING.CC

hackers. They are the elite one per cent of computer people in cyberspace.

cyberspace

it takes years of training to find a working exploit. But, with researching exploits, one finds that if one exploit exists, such as xss, then in cyberspace people who build the web leave holes behind that the fly can pass through - and basically hack the box.

Hack the box

how do they do it? By exploits such as xss, buffer overflows on the command or terminal line, and open ports. If you open a port on your system, you can be exploited. There are not many defences for an open port.

Open systems

Is shottings inputs sanitary? Sure! We limit input by the char, we do not allow certain characters. And strip input for insertion in the database.

databass

GET and POST requests can be overflowed if there is no limit checks on input. Think twitter. And an overflow can result in GET rooted.

rooted

But the hacker doesn't always want server root. They may just want your password. And use social engineering to extract the password from you or a colleague.

Value purchase - by ,March 25, 2011
4/5stars
Great microwave for the price. It is small and fits in my apartment.

Excuse the noise.

Valid CSS!