En.hackndo.com is a subdomain of Hackndo.com, which was created on 2014-07-25,making it 10 years ago.
Description:This blog talks about computer security. Tutorials about buffer overflow, Active Directory, everything is explained with...
Discover en.hackndo.com website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site
HomePage size: 19.142 KB |
Page Load Time: 0.210223 Seconds |
Website IP Address: 185.199.111.153 |
Lunch Box & Bento box - monbento – Buy your new high quality bento box, bottle and accessories en.monbento.com |
Think Dirty® Shop Clean - Clean Beauty App - Shop Clean Products - Think Dirty® Shop Clean. get.thinkdirtyapp.com |
G-Box™ - World's Best Android TV Box | Matricom helpdesk.matricom.net |
Quality Fiber Optic Termination Box & Fiber Optic Splitter Box factory from China m.fibreopticbox.com |
- Out of the Box Rescue - Floral City, FL - AVAILABLE PETS outoftheboxrescue.rescueme.org |
think!® Official Site & Online Store | Protein Bars & Healthy Snacks
– Think Products shop.thinkproducts.com |
Allure Beauty Box: Best Monthly Makeup & Skincare Subscription Box beautybox.allure.com |
Subscription Box Ramblings - Monthly Subscription Box Reviews, Spoilers & Discounts boxes.subscriptionboxramblings.com |
Think Tank – Antiquities Coalition Think Tank thinktank.theantiquitiescoalition.org |
Dining Out For Life - Dine Out. End HIV. m.diningoutforlife.com |
OUT AND OUT – Out for points. Out for money. outandout.boardingarea.com |
Innovare Solutions – Out of the box custom software solutions site.innovaresol.com |
Makeup Box For Gift 2023 - Best ideas, tips and information on ebay makeup storage box largemakeup.crustacean.nl |
Out of the Box - Discover the Claremont Center for Engagement with Primary Sources cceps-blog.library.claremont.edu |
hackndo - Think out of the box https://en.hackndo.com/ |
Projects https://en.hackndo.com/projects/ |
Kerberoasting https://en.hackndo.com/kerberoasting/ |
Ethereum https://en.hackndo.com/ethereum/ |
Blockchain 101 https://en.hackndo.com/blockchain/ |
BloodHound https://en.hackndo.com/bloodhound/ |
Kerberos in Active Directory https://en.hackndo.com/kerberos/ |
About https://en.hackndo.com/about/ |
Archives https://en.hackndo.com/archives/ |
Disclaimer https://en.hackndo.com/disclaimer/ |
NTLM Relay - hackndo https://en.hackndo.com/ntlm-relay/ |
Ethereum Virtual Machine - hackndo https://en.hackndo.com/ethereum-virtual-machine/ |
Sensitive Data in smart contracts - hackndo https://en.hackndo.com/sensitive-data/ |
Tokens ERC20 et ERC721 - hackndo https://en.hackndo.com/tokens-standards/ |
ROP - Return Oriented Programming - hackndo https://en.hackndo.com/return-oriented-programming/ |
Connection: keep-alive |
Content-Length: 17701 |
Server: GitHub.com |
Content-Type: text/html; charset=utf-8 |
Last-Modified: Wed, 18 Oct 2023 11:17:36 GMT |
Access-Control-Allow-Origin: * |
ETag: "652fbed0-4525" |
expires: Sun, 12 May 2024 05:02:56 GMT |
Cache-Control: max-age=600 |
x-proxy-cache: MISS |
X-GitHub-Request-Id: 3056:3EE311:C86068:D349EC:66404B25 |
Accept-Ranges: bytes |
Age: 0 |
Date: Mon, 13 May 2024 02:42:59 GMT |
Via: 1.1 varnish |
X-Served-By: cache-mel11238-MEL |
X-Cache: HIT |
X-Cache-Hits: 0 |
X-Timer: S1715568179.762013,VS0,VE342 |
Vary: Accept-Encoding |
X-Fastly-Request-ID: d702184e11dc839ab4925d12e45992a7cf9e907c |
content="IE=edge" http-equiv="X-UA-Compatible"/ |
content="text/html; charset=utf-8" http-equiv="content-type"/ |
content="JeRPv2CEcpONAy8C7dMr1nzjlpZxlxYCtt2PnuQ78g8" name="google-site-verification" |
content="width=device-width, initial-scale=1.0, maximum-scale=1" name="viewport"/ |
content="#ffffff" name="msapplication-TileColor"/ |
content="/assets/icones/favicon/ms-icon-144x144.png" name="msapplication-TileImage"/ |
content="#ffffff" name="theme-color"/ |
content="summary" name="twitter:card" |
content="@hackanddo" name="twitter:site" |
content="@hackanddo" name="twitter:creator" |
content="Home" name="twitter:title" |
content="This blog talks about computer security. Tutorials about buffer overflow, Active Directory, everything is explained with examples" name="twitter:description" |
alt="hackndo logo" content="https://en.hackndo.com/assets/icones/logo.png" name="twitter:image"/ |
content="Jekyll v3.9.3" name="generator"/ |
content="Home" property="og:title"/ |
content="Pixis" name="author"/ |
content="en_US" property="og:locale"/ |
content="This blog talks about computer security. Tutorials about buffer overflow, Active Directory, everything is explained with examples" name="description"/ |
content="This blog talks about computer security. Tutorials about buffer overflow, Active Directory, everything is explained with examples" property="og:description"/ |
content="https://en.hackndo.com/" property="og:url"/ |
content="hackndo" property="og:site_name"/ |
content="website" property="og:type"/ |
content="summary" name="twitter:card"/ |
content="Home" property="twitter:title"/ |
Ip Country: United States |
Latitude: 34.0544 |
Longitude: -118.244 |
hackndo Menu hackndo Think out of the box Home About Archives Contact me Disclaimer Projects Links Login Sécurité © 2023. All rights reserved. Tokens ERC20 et ERC721 16 Oct 2023 · 23 min Author : Pixis A large proportion of decentralised applications use tokens to work properly. While coins are inherent to each blockchain (Ether for Ethereum, for example, Sol for Solana, etc.), tokens are tokens that are created on an existing blockchain using smart contracts. So, using a smart contract, it is possible to create a token called a HackndoToken” whose symbol would be HND”, for example. This token could exist in a limited number, and we could even ensure that each HND token is unique. Read more → Sensitive Data in smart contracts 03 Oct 2023 · 20 min Author : Pixis Do you remember the different storage spaces to which the EVM has access? The one comparable to a computer hard disk is the account storage . This is the memory area in which the state of the contract is recorded. But you’ll also remember that the Ethereum blockchain is a decentralised state machine that can be read by anyone. Do you see where I’m going with this? All the data recorded by a smart contract can be read by anyone. If any sensitive data is recorded by a smart contract, we will be able to read it. Read more → Ethereum Virtual Machine 19 Jul 2023 · 27 min Author : Pixis Ethereum Virtual Machine (EVM) is a virtual machine used to manage transactions on the Ethereum blockchain via smarts contracts. It’s an essential component of Ethereum, which we’re going to try and understand together. Read more → Ethereum 10 Jul 2023 · 13 min Author : Pixis Unlike blockchains such as Bitcoin, which essentially allow Bitcoin cryptocurrency transactions to be sent, Ethereum also has something quite extraordinary: decentralized code execution. Yes, decentralized. This means that we can write a program, code that is, and have it run not on one server, but on thousands of servers, or nodes . And the output of our program is also recorded in a decentralized way. I don’t know about you, but I think it’s incredible, and it really made me want to dig a little deeper into the subject. Read more → Blockchain 101 03 Jul 2023 · 10 min Author : Pixis For several years now, I’ve been interested in a subject you’ve probably heard of: blockchains . I find it fascinating that a technology allows thousands of people to agree on so many subjects without the need for an intermediary . Decentralization is a subject that I believe has a lot of potential, and we’ll see in the long term whether this technology will endure or not. In any case, as it stands, it’s a hot topic! More recently, I’ve become interested in the Ethereum blockchain, smart contracts , and the security of smart contracts . We’re going to talk about all that here, here we go. Read more → Kerberos Delegation 18 Apr 2020 · 14 min Author : Pixis Within an Active Directory, services can be used by users. Sometimes these services need to contact others, on behalf of the user, like a web service might need to contact a file server. In order to allow a service to access another service on behalf of the user , a solution has been implemented (introduced in Windows Server 2000) to meet this need : Kerberos Delegation. Read more → NTLM Relay 01 Apr 2020 · 46 min Author : Pixis NTLM relay is a technique of standing between a client and a server to perform actions on the server while impersonating the client. It can be very powerful and can be used to take control of an Active Directory domain from a black box context (no credentials). The purpose of this article is to explain NTLM relay, and to present its limits. Read more → Kerberoasting 26 Mar 2020 · 5 min Author : Pixis With the help of previously discussed notions, we have everything in hand to explain the Kerberoasting attack principle, based on the TGS request and the SPN attributes of Active Directory accounts. Read more → Older...
Domain Name: HACKNDO.COM Registry Domain ID: 1868353652_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.ovh.com Registrar URL: http://www.ovh.com Updated Date: 2023-07-01T02:24:09Z Creation Date: 2014-07-25T13:09:11Z Registry Expiry Date: 2024-07-25T13:09:11Z Registrar: OVH sas Registrar IANA ID: 433 Registrar Abuse Contact Email: abuse@ovh.net Registrar Abuse Contact Phone: +33.972101007 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Name Server: DNS200.ANYCAST.ME Name Server: NS200.ANYCAST.ME DNSSEC: signedDelegation DNSSEC DS Data: 21416 8 2 AA50639C57EA34CBC1D4D7282889782D626A1354E7DB312CFD6D4343D8BB89E8 >>> Last update of whois database: 2024-05-17T17:45:11Z <<<