Posts Tagged ‘tutorial’

Maemo 5 supports python. But only the 2.5 version. People say that most Python Users haven’t even used Python features that are presented to newest Versions.

I disagree. Trying to Install some Python Modules, many times, I had these unexpected Syntax Errors while using/installing new Modules! Stable ones!

So, why not trying to install a newer Python Version? At first, there are difficulties but, then, it seems an easy Process if you are careful. Let’s see how to work this thing out…. (more…)


Mempodipper is a great Exploit that uses a Vulnerability found on ALL Linux kernels >=2.6.39 that haven’t been Patched, yet!

Extract from the Official Blog:

Mempodipper is an exploit for CVE-2012-0056. /proc/pid/mem is an interface for reading and writing, directly, process memory by seeking around with the same addresses as the process’s virtual memory space. In 2.6.39, the protections against unauthorized access to /proc/pid/mem were deemed sufficient, and so the prior #ifdef that prevented write support for writing to arbitrary process memory was removed. Anyone with the correct permissions could write to process memory. It turns out, of course, that the permissions checking was done poorly. This means that all Linux kernels >=2.6.39 are vulnerable, up until the fix commit for it a couple days ago. Let’s take the old kernel code step by step and learn what’s the matter with it.


Hello guys!

I had recently published my script PostH4x0r! A member of a private forum asked for Video Tutorials

Wish came true!


I created tutorials and I uploaded them on Youtube!
Check them out…


Truecrypt has many great functions. I will explain one of the most interesting ones. Hiding a REAL Encrypted Volume into a Fake-Encrypted Volume. Let me explain the whole notion and give an example:

You create a volume encrypted by a password. In that volume you have some files encrypted. Inside that encrypted volume, you create another encrypted volume that contains the REALLY Encrypted Files. This means that you have two passwords.

Here is an example that can be implemented in real life:


iCon2PHP is a great tool for everyone who uploads a shell on a website in order to extract information or deface it. I was working on it for a while (that’s why I wasn’t posting any new stuff here the last 7 days…) but I achieved to finish it.