Creating Custom Linux Command

Sometimes you may need to repeat lots of linux command on terminal for any aim. It is some time so boring to type all the commands again and again so the solution to create  own commands to execute all the repetition in one.

All the commands are kept on /bin directory s we just need to create a file and name as the command that we’ll use. Then we need to make the file readable and executable. Continue Reading


Today's Linux Console Command

It is good if you are working on console and you don’t want to change it for any little text addition to any file. Here is the command:

echo “this text will be added” | sudo tee “path/to/the/file.txt”


HackThisSite like sites you might want to know

I posted a question to Quora about ‘s benefits and reality. I got well defined answer that I want to share with you. Here is the question and the answer.

Question: Do you think is a good tool to master web hacking?

Answer: Thanks to Frank Smith

The missions on that website are pretty realistic in terms of real world hacking. But if you finish all the missions you will have only scratched the surface of “hacking”. There are literally dozens** of site that will provide you similar missions but they all lack one thing, fundamentals. Finishing all the challenges is great but it won’t teach you ABCs of security. If you really want to understand Web Application security I recommend Web Application Hackers Handbook. This books is the single best source of learning security for Web Applications.…

Since this book only focuses on WebApplications, I would recommend Counter Hack Reloaded as a good counterpart. Its a bit dated (2006) but it goes in great details about fundamentals and covers a huge ground.…

**List of sites similar to


What is "long long" type in c++?

long long is not the same as long (although they can have the same size, e.g. in most 64-bit POSIX system). It is just guaranteed that a long long is at least as long as a long. In most platforms, a long long represents a 64-bit signed integer type.

You could use long long to store the 8-byte value safely in most conventional platforms, but it’s better to use int64_t/int_least64_t from <stdint.h>/<cstdint> to clarify that you want an integer type having ≥64-bit.


Sql injection – hack this site "Realistic Mission 2"

Today it is the turn for the realistic mission 2 on

This mission is all about looking the home page source code. Finding the hidden link on page to directs you to admin page then use basic SQL injection to accomplish the mission.

SQL injection is about typing some malformed values to html forms to make some changes on the application database or get some data that the application owner does not expect us to see them or change. You can learn more about SQL injection from this link.

You need to be able to pass the mission after all the explanation and the reading from the above reference site. If you cannot, it means you need to work some more on hacking the sites. However for the lazy brains here I give the instructions as follows:

  1. Open the source file of the page.
  2. See the update.php link on the source. It is hidden on the visuals on the page.
  3. Find the hidden link and click on it to go to admin login page.
  4. Now use one of the tricks that you know about sql injection. I used this for both input  x’ OR 1 = 1;

That’s all 🙂