Skip to main content

Questions tagged [black-hat]

The tag has no usage guidance.

21 votes
2 answers
360 views

Downvoting anything that looks like "how do I write malware"

I recently posted a question about methods for preventing alterations to a file or program. A short while after posting, it occurred to me that malware often tries to do that. Sure enough, when I came ...
anaximander's user avatar
  • 1,521
5 votes
1 answer
78 views

How do I break X vs. How do I defend X? [duplicate]

Do we care to have questions similar to Exploiting PHP via GET params? Why or why not?
Jeff Ferland's user avatar
  • 38.4k
7 votes
3 answers
323 views

Is asking a question about the legality and ethics of hacking back out of scope for this forum?

I've posted a question about the usefulness of hacking back to corporations, asking the question to be taken apart from legal and ethical concerns. The legal and ethical concerns are an interesting ...
GdD's user avatar
  • 17.4k
4 votes
1 answer
49 views

How to ask question about checking for specific vulnerability in black box circumstances?

I do a black box penetration test. I found something that looks suspicious to being a vulnerability but I don't know whether it can be exploited and to what extent. Policy in company is such that ...
Andrei Botalov's user avatar
8 votes
1 answer
438 views

Should white hats know methods that can be used by black hats to attack them?

In my opinion to be sure that protection mechanisms work, you should know what attacks can be performed against them. Only if you know techniques that can be used to attack you, you can be sure ...
Andrei Botalov's user avatar
33 votes
9 answers
2k views

Clarify our stance on black hat questions

In the site FAQ, it is written: Black Hat vs White Hat - This site is not intended to be a resource for Black Hats, or malicious hackers. While we understand discussion of exploits may require ...
Gilles 'SO- stop being evil''s user avatar
10 votes
4 answers
389 views

What determines if a question should be considered Blackhat?

I asked this question recently which got a lot of votes and people thought was interesting, as well as some very interesting answers. It could have been the start of a very interesting discussion, ...
Sonny Ordell's user avatar
  • 3,596
15 votes
4 answers
350 views

How do we provide value to white and grey hats?

So it's something we're kicking around in chat for a while about a specific question, but I think it goes to the style of the site. We as a community are answering blackhat style questions. Do we ...
Ori's user avatar
  • 2,777
9 votes
4 answers
411 views

Should we allow questions/answers that appear to include or request exploit code?

I don't speak SQL myself, so I'm not sure if this is a good example, but here is the question that prompted this query: How to exploit the "PHP_MAGIC_QUOTES ON" vulnerability in order to ...
Iszi's user avatar
  • 27.2k
15 votes
5 answers
440 views

Should we accept question about making exploit or building malware?

The kind of question I am referring to is a little bit like this one : Malwares source repositories. Where? Question that are around the subject of "How can I make virus/malware/exploit/etc." are ...
HoLyVieR's user avatar
  • 372