256 Kilobytes

Hacking the Government Articles

Type ArticlesContent written by the staff, as well as hand-picked user content Category Hacking the GovernmentContent about hacking the US government, such as how to steal computercoins from the US Mint.

Profile Photo - Hash Brown

How I used PHP skills and social engineering to get unbanned from a gay club

Articles in Hacking the Government | By Hash Brown

Published 8 months agoWed, 29 May 2019 19:59:57 -0700 | Last update 8 months agoWed, 29 May 2019 20:00:49 -0700 📌

Profile Photo - Hash Brown

Not your usual post, but real none the l...

MoreI am a man who likes to pour the fuck up, and when I pour up at a high enough level I do things such as: throw bottles from a 12th floor balcony...
🗨
0
🐏
1
👁
1,189
Profile Photo - Huevos Rancheros

The Insane, Unholy Life of John McAfee – A Biography

Articles in Information Security | By Huevos Rancheros

Published 1 year agoTue, 19 Feb 2019 16:48:34 -0800 | Last update 11 months agoThu, 28 Feb 2019 14:16:01 -0800

Profile Photo - Huevos Rancheros

Last Reply After our dear Terry A Davis, the CIA is now officially after McAfee. The CIA has attempted to collect us. We are at sea now and will report more s... Huevos Rancheros,

After our dear Terry A Da...

Fri, 19 Jul 2019 13:52:05 -0700 7 months ago
🗨
8
🐏
2
👁
6,385
Profile Photo - August R. Garcia

Busting reCaptcha Myths: Reverse Engineering Anti-spam Algorithms and Examining Existing Research in Realistic Contexts

Articles in Hacking the Government | By August R. Garcia

Published 10 months agoMon, 22 Apr 2019 22:23:34 -0700 | Last update 8 months agoSat, 08 Jun 2019 01:28:52 -0700

Profile Photo - August R. Garcia

Last Reply The .tar.gz of sorted reCaptcha photos has been moved to this URL on the 256 Kilobytes server, since the old link expired: https://www.256kiloby... August R. Garcia,

The .tar.gz of sorted reC...

Sat, 08 Jun 2019 01:29:54 -0700 8 months ago
🗨
1
🐏
3
👁
2,166
Profile Photo - Hash Brown

Spoofing Browser URL Previews

Articles in Unintended Behavior and Exploits | By Hash Brown

Published 9 months agoWed, 22 May 2019 12:41:22 -0700

Profile Photo - Hash Brown

Last Reply > muh right click -> open in new tab / mousewheel click. There's plausibly some workaround for that. IDK LOL Why would you even do that Hash Brown,

> muh right click...

Wed, 22 May 2019 13:41:17 -0700 9 months ago
🗨
3
🐏
2
👁
441
Profile Photo - August R. Garcia

3.5 Web Dev Security Considerations You Didn’t Know About

Articles in Hacking the Government | By August R. Garcia

Published 10 months agoSun, 21 Apr 2019 01:31:32 -0700 | Last update 10 months agoSun, 21 Apr 2019 05:22:14 -0700

Profile Photo - August R. Garcia

Despite the obscene amounts of time that...

MoreDespite the obscene amounts of time that goes into computer security, there are always new computer security vulnerabilities, bugs, and exploits being...
🗨
0
🐏
0
👁
6,592
Profile Photo - August R. Garcia

Client-Side Input Validation Exploit in KK-Star Ratings Plugin

Articles in Unintended Behavior and Exploits | By August R. Garcia

Published 10 months agoSun, 14 Apr 2019 11:59:00 -0700 | Last update 10 months agoMon, 15 Apr 2019 13:36:23 -0700

Profile Photo - August R. Garcia

The KK-Star Ratings plugin is one of the...

MoreThe KK-Star Ratings plugin is one of the easiest ways to implement structured data to show star ratings next to posts, which I’ve used on WordPr...
🗨
0
🐏
0
👁
2,923
Profile Photo - Louis J. V. Cicalese

What are Integer Overflows?

Articles in Unintended Behavior and Exploits | By Louis J. V. Cicalese

Published 11 months agoWed, 27 Feb 2019 17:17:01 -0800 | Last update 11 months agoThu, 28 Feb 2019 11:42:48 -0800

Profile Photo - Louis J. V. Cicalese

Back in my day, we had to walk up hill b...

MoreWith the prevalence of high-level, dynamically typed programming languages--not to mention drastic increases in memory availability since the early da...
🗨
0
🐏
0
👁
1,079
Profile Photo - August R. Garcia

Spoofing Your User-Agent as Googlebot: Avoid Paywalls, Circumvent Log-In Requirements, and Exploit Other Quality Loopholes

Articles in Hacking the Government | By August R. Garcia

Published 1 year agoMon, 31 Dec 2018 22:55:38 -0800 | Last update 1 year agoMon, 18 Feb 2019 23:51:35 -0800

Profile Photo - August R. Garcia

Last Reply Seems like some websites look at the HTTP_REFERER value as well. I.e., websites check to see if you clicked through from Google. If yes, show the page... August R. Garcia,

Seems like some websites...

Thu, 14 Feb 2019 06:20:33 -0800 1 year ago
🗨
1
🐏
0
👁
14,082
Profile Photo - David Silvester

The Top Five Tricks Web Spammers Use (And Why Your Captchas Don't Stop Them)

Articles in Hacking the Government | By David Silvester

Published 1 year agoThu, 24 Jan 2019 00:04:55 -0800 | Last update 1 year agoTue, 19 Feb 2019 02:01:22 -0800

Profile Photo - David Silvester

"I want to say that this post is amazing...

MoreIf you own or manage a website, blog or any other online resource you will certainly be familiar with web spam. For those of you who are not, web spam...
🗨
0
🐏
1
👁
513
Profile Photo - Maya S.

Can you work for the CIA if you have illegally downloaded music?

Articles in Hacking the Government | By Maya S.

Published 1 year agoSat, 12 Jan 2019 00:16:21 -0800 | Last update 1 year agoTue, 19 Feb 2019 01:58:25 -0800

Profile Photo - Maya S.

Have you downloaded music illegally? You...

MoreHave you done well in school and college? Have you partaken in any school sports? Do you speak foreign languages, or do other languages come at least...
🗨
0
🐏
0
👁
344