Generate Alpha-Numeric Strings in Python (for BruteForce Attacks)

While I was coding the ‘Twitter Short Handles Finder‘ I needed an efficient Alpha-Numeric Strings generator in Python. I coded this from scratch:

Read More

Both of Qatar Telecoms: Ooredoo and Vodafone do NOT use HTTPS by Default

I was astonished by the fact that both Ooredoo and Vodafone the only telecom operators in Qatar still do not use HTTPS by default leaving user credentials to be easy targets for hackers.

To make a change I just pushed a Github commit to the famous HTTPS Everywhere Browsers Extension for both operators websites:

You can also contribute to this project by adding rules and tweak the code on Github.

Read More

Check All Checkboxes at Once from Browser’s URL

If you face a website with lot of checkboxes to check but they did not implement a ‘check all’ button. You can copy and past this code into your browser’s URL address:

Note that sometimes your browsers (Chrome in my case) scizes the ‘javascript:‘ part from such addresses. You need to type ‘Javascript:‘ manually

Read More

C0de-Puzzle: Printing int in reverse without IF statement

Challenge:  Write a function, that delivers following output: "1 2 3 4 5 4 3 2 1".
Rules:

  • You only can use: 1 for loop, 2 int variables.
  • You must not use: IF terms, another function.
  • Do not hardcode the output (do NOT do: print("123454321")

 

STOP and think about a solution.

Read More

Finding longest path of a specially-shaped graph in O(Log(n))

First of all let’s clear thing up:

Finding the longest path of a graph algorithm is NOT the inverse of Dijkstra’s algorithm of finding the shortest path. In fact finding the longest path of a graph in NP-Hard problem.

In our case, the graph is a tree-shaped graph, more like a triangle.

Read More

Reversing a doubly linked list data structure in C++

 

Read More

Hacking short distance devices

Intro:
Hacking is not only for computer, software, or websites. Any device can be hacked. I lately started having interests in Software Defined Radio where I was able to ‘sniff’ data of signals around me. One particularly interesting signal was the short distances devices. These include:

  • Car remotes system. Also called: Remote Keyless System
  • Garage Remotes
  • Other home equipment remotes switches.

Some of these systems are known to have security flaws in them. Some have no security mechanisms. It is worth reading how these stuff work before going deeper into hacking them.

Requirements:

  • Programming skills in: C++ or Java or Python.
  • A micro-conotroller (Teensy, Aurdino) Raspberry Pi is ok too.
  • 315Mhz / 430Mhz Transceiver. I bough this one > XD-RD-5V.

Connections:

to-be-updated

Coding:
to-...

Read More

Clean Your Mac OS X from the Ads Injecting Malware

If you’re suffering from an ads injecting malware like this one:

Usually it is a black box showing at the button of any website you visit form any browser: Safari, Chrome, Firefox.
Don’t try to remove a plugin or extension. This malware is not a browser add-in.
I have wrote a tiny bash script to run in your mac and it will clean your system.
You can download it form here – just run it as sudo.

You can easily view the source of the script by opening it in your fav text editor.

credits: Thanks to this guy here who mentioned the process name and how to clean it.

Read More

Mixing different RAM Sizes in One Computer

Can you install different sizes of RAM into a single motherboard and it will still work? Yes you can!
There a tiny tricks you will need:

  1. Make sure you’re buying same speed/voltage/non-ECC sticks.
  2. When installing them install them in this way:   || Slot#1:[1GB+512Mb] || Slot#2:[1GB+512Mb] ||

I tried to install them in other order but all my tries have failed. The only thing that worked is installing them in the order I mentioned above.

~ Happy upgrading.

Read More

Attacking Attackers to Protect a WordPress Website

I have previously demonstrated how to protect wp-admin and wp-login files in word-press website.
I wanted to do more. Something like: Attacking those attackers.

What Crashes Browsers?
What crashes applications is what hackers call: Buffer Overflow Exploit. Hackers use them to take control of applications/browsers to gain full system access later on. More about buffer-overflows here.
We are not interested to take control of the attacker’s system; Although that will be very ‘cool’ – maybe the next stage? 😉
We are more interested to stop them i.e: Crash their browsers, fuzzing and brute-force tools.

Results.
Amazingly I was able to reduce attacks from 4000~ to around 70 only!

What is happening behind the scenes?

Read More