Skip to main content

Web Hacking FAQ : Common Web security So...

security solutions

1. The articles contained on the website are for educational purposes only encouraging users and Admins to better understand the environmental security measurement and enable safer digital environment.
Geek-KB.com does not encourage, condone, or orchestrate attempts of hacking into other servers or any other illegal activities. All actions taken by users are strictly independent of Geek-KB.com. We are not responsible for any misuse of the techniques listed on this website.
2. Geek-KB.com has the sole discretion to remove/edit users, articles, external resources, or any other user-submitted content to protect itself from legal harm. This legal disclaimer may be modified at any time without notice.
3. Any damage caused by using any of the techniques taken from https://www.geek-kb.com is at your own risk and responsibility;

Hack Website Admin Account | Basic SQL I...

SQL Injection

1. The articles contained on the website are for educational purposes only encouraging users and Admins to better understand the environmental security measurement and enable safer digital environment.
Geek-KB.com does not encourage, condone, or orchestrate attempts of hacking into other servers or any other illegal activities. All actions taken by users are strictly independent of Geek-KB.com. We are not responsible for any misuse of the techniques listed on this website.
2. Geek-KB.com has the sole discretion to remove/edit users, articles, external resources, or any other user-submitted content to protect itself from legal harm. This legal disclaimer may be modified at any time without notice.
3. Any damage caused by using any of the techniques taken from https://www.geek-kb.com is at your own risk and responsibility;

24 free e-books on hacking

e-books on hacking

We at geek-kb bring you a list of 24 great e-books on hacking with links for their free downloads. Are you an aspiring hacker who wants to get as much info on hacking from online free ebooks as possible but doesn’t know where to get them? We bring you a list of 24 great e-books […]

Nessus: Persistent Changes USB on for BT...

Nessus persistent changes usb

Persistent Changes USB on Nessus for BT5: NOTICE FOR BT5 This how-to will be updated with specifics for Backtrack 5. As it sits, it does not work with Backtrack 5. If you have a 16GB stick, please try this one. ———————————————————— UPDATE 12/16/2010: Updated to use R2 and removed references to R1, the pre-release version and final versions of Backtrack. […]

Hacking Windows Using USB Stick + Social...

I found this tutorial in the hackingtutorial website, works great: Requirements : 1. Metasploit Framework 2. Operating System Windows or Linux (In Backtrack 5, metasploit already included inside) 3. social engineering toolkit Step By Step : 1. Open your console/terminal (CTRL+ALT+T) and then change your working directory to/pentest/exploits/set. cd /pentest/exploits/set 2. Run your Social Engineering Toolkit using ./set command.   3. Choose […]