In the Shack

Rainbow Tables: Bookkeeping for Password Crackers
When trying to solve a computational problem, you have two resources. Time and memory (space). Methods like dictionary attacks and brute-forcing are time-based attacks because it takes very long each...
Rainbow Tables: Bookkeeping for Password Crackers
When trying to solve a computational problem, you have two resources. Time and memory (space). Methods like dictionary attacks and brute-forcing are time-based attacks because it takes very long each...

Hash Cracking Crash Course
There was a time when passwords were stored in plaintext on servers where people made accounts. This was a time many hackers reminisce about. This was also a time where...
Hash Cracking Crash Course
There was a time when passwords were stored in plaintext on servers where people made accounts. This was a time many hackers reminisce about. This was also a time where...

How to Build a Packet Sniffer in C — From Scratch
By the end of this blog post, you will have made a packet sniffer in C. It is a program that Tells you which packets are flowing in and out...
How to Build a Packet Sniffer in C — From Scratch
By the end of this blog post, you will have made a packet sniffer in C. It is a program that Tells you which packets are flowing in and out...

It's Time to Grow Up and Learn GDB
By the end of this blog post, you will know how to use GDB to debug not just any piece of C code, but any binary executable in general. Even...
It's Time to Grow Up and Learn GDB
By the end of this blog post, you will know how to use GDB to debug not just any piece of C code, but any binary executable in general. Even...