Sneaker's Stub - The Grey Stuff!

Recent Posts

SQL Injection Part 2

In this article we will be looking at SQL Injection and how we can exploit different types of SQL vulnerabilities present on a website.SQL Injection is one most dangerous ways to get into some site and ruin it totally! Database contains every precious information. It […]

Dos with Slowloris!

In this article, we are looking at how Dos attack works. There are many tools out there for the Dos purpose, which also varies in the type of platform they effect. Like if we talk about Pyloris(http Based), LOIC(TCP,UDP,Http), R-U-DEAD-YET( targets the web server resources) […]

What is DDos Attack?

This topic is little scary! This is the nightmare for Big companies across the World. DDos Attack is an abbreviation for Distributed Denial Of Service Attack, which means it works as DOS attack but in a vast manner. DOS attack which stands for Denial of […]

SMTP Relay Attacks

I have had already told you about What is SMTP, How does that work and How can you extract emails using SMTP. In this article I will be telling you how you can use SMTP relays to send spams to any person. SMTP relay is […]

Stagefright – The Nightmare

In this article, We will be talking about the most famous vulnerability in Android world which is Stagefright. Let’s start with “What is Stagefright?” Stagefright is a library that exist in Android systems and supports multimedia formats. Android Architecture is in modular form that means […]

SMTP – Extracting Emails

In my article about What is SMTP?, We took a look on what exactly SMTP works for! In SMTP – Extracting Emails, I will be providing a tutorial on Extracting Emails from the SMTP server. There are several programs and scripts that are available for […]

What is SMTP?

Emails have always been an important part of our lives. We send emails through agents such as Gmail, Yahoo, etc. and we also get emails regarding different subjects from numerous other email clients. These email clients works on SMTP at port 25. What is SMTP? […]

SQL Injection Part 1

SQL Injection is the most devastating vulnerability on web platform.In this article, I will be telling how costly and severe this vulnerability is, if exploited. SQL is a database language. Everything related to person’s identification is stored in the database, such as Emails,Usernames,Passwords, and credit […]

Spoofing The IP address:Engage Packet Builder usage

Spoofing is a wide topic.This entire website will tell you how to be anonymous and therefore Spoofing is important.The best people are the people who never get caught! So in this article we will be learning about Spoofing the IP address with the use of […]

Using Netcat: The Covert Way

Netcat is a really useful tool. It is also featured with network debugging conventions and also used to conduct investigation on network. We can open connection on any port and we can start listening and writing data from one computer to another. When It was […]