haXez is a blog that focuses on hacking and cyber security. Cyber security is a rapidly growing industry as it is a rapidly growing criminal venture. It is haXez mission to share as much information about cyber security as possible. The goal is to spread awareness of the security risks associated with physical and virtual security and to attempt to make the subject more transparent and easier to digest.
Author
The lead author has over ten years of experience in Information Technology and enjoys spending their free time playing labs on Hack The Box, Vuln Hub, Portswigger, and many more. They believe that the best way to learn and understand a technology is to hack it.
About Hacking
You may think hacking is gaining unauthorized access to a computer system. However, the term means more than that. Hacking is a lifestyle, it is a way of looking at the world differently.
Hacking means taking something and making it do something other than its intended function. In other words, you could modify a parameter used by an SQL query to return back more data than intended.
Alternatively, You could also hack a Raspberry Pi so that it blocks all malicious traffic coming into your network.
In conclusion, The point we’re trying to make is that hacking does not mean malicious. It means something different to everyone and it should be embraced as a survival tactic in the ever-evolving digital world we find ourselves in.
Disclaimer
haXez publishes articles containing demonstrations on hacking into computers. The target computers are all part of lab environments provided by various different vendors. These vendors have given their permission for us to hack into these machines as their purpose is for education. You should not hack any devices that you don’t own or have permission to hack.
Recent Posts
- Hack The Box Unique Writeup
- Hack The Box Wander Writeup
- Hack The Box Gawk Writeup
- Hack The Box Sunday Writeup
- Hack The Box Curling Writeup
- Hack The Box ServMon Writeup
- Hack The Box Optimum Writeup
- Hack The Box Active Writeup
- Hack The Box Teacher Writeup
- Hack The Box Writeup Writeup
- How To Hack Wi-Fi Networks
- Hack The Box Delivery Writeup
- Hack The Box ScriptKiddie Writeup
- Hack The Box Spectra Writeup
- Hack The Box Toolbox Writeup
- Hack The Box Armageddon Writeup
- Hack The Box Love Writeup
- Hack The Box Knife Writeup
- Hack The Box Cap Writeup
- Hack The Box Explore Writeup
- Hack The Box BountyHunter Writeup
- Hack The Box Previse Writeup
- Hack The Box Horizontall Writeup
- Hack The Box Validation Writeup
- Hack The Box Return Writeup
- Hack The Box Antique Writeup
- Hack The Box Secret Writeup
- Hack The Box Nunchucks Writeup
- Hack The Box Backdoor Writeup
- Hack The Box Cyber Apocalypse Didactic Octo Paddles
- Hack The Box Cyber Apocalypse Orbital
- Hack The Box Cyber Apocalypse Passman
- Hack The Box Cyber Apocalypse Drobots
- Hack The Box Pandora Writeup
- Hack The Box Cyber Apocalypse Gunhead
- Hack The Box Cyber Apocalypse Trapped Source
- Hack The Box Cyber Apocalypse Debug
- Hack The Box Cyber Apocalypse Critical Flight
- Hack The Box Cyber Apocalypse Timed Transmission
- Hack The Box Cyber Apocalypse 2023 CTF
- Hack The Box NodeBlog Writeup
- Hack The Box Money Flowz Writeup
- Hack The Box Paper Writeup
- Hack The Box You know 0xDiablos Writeup
- Hack The Box SteamCloud Writeup
- Hack The Box GoodGames Writeup
- PrintNightmare Privilege Escalation
- Hack The Box Driver Writeup
- Hack The Box Timelapse Writeup
- Hack The Box Late Writeup
- Hack The Box Infiltration Writeup
- Hack The Box Easy Phish Writeup
- Hack The Box OpenSource Writeup
- Hack The Box Trick Writeup
- Hack The Box RedPanda Writeup
- Hack The Box Support Writeup
- Hack The Box Shoppy Writeup
- Hack The Box Photobomb Writeup
- Hack The Box Weak RSA Writeup
- Hack The Box Squashed Writeup
- Stealing Passwords With The Flipper Zero
- Marauding Wi-Fi Networks With The Flipper Zero
- Making Malicious Microsoft Office Files For Hacking
- Red Team: Initial Access – Weaponization | Try Hack Me
- Red Team: Initial Access – Red Team Reconnaissance | Try Hack Me
- Making Flipper Zero Ultra with RogueMaster Firmware
- Unleashing the power of the Flipper Zero
- Uber HACKED!, What can we learn from it?
- Dumping Windows NTLM Password Hashes With Armitage C2
- Red Team Part 5 – Intro to C2 | TryHackMe
- Red Team Part 4 – Red Team OPSEC | TryHackMe
- Red Team Part 3 – Red Team Threat Intel | TryHackMe
- Hack all the things with the Flipper Zero. Unboxing, Updating, and Playing
- Red Team Part 2 – Red Team Engagements | TryHackMe
- Red Team Part 1 – Red Team Fundamentals | TryHackMe
- Red Team Introduction – Try Hack Me
- Update 08/09/2022 – Hacking Through Paris
- Hacking Tools: John The Ripper
- Hack Any Computer In 2 Seconds With This £2 Device | Digispark
- My First Defcon Talk
- I’M PICKLE RICK! wubba lubba dub dub | TryHackMe
- Hack Like A Jedi | Kenobi | TryHackMe
- Hack To Learn: Vulnerability Scanning
- Hacking Tools: Hydra
- Data Exfiltration, Firewall Evasion, and DNS Encapsulation with Iodine
- Hack This Site: Extended Basic – Mission 6
- Hacking The Skynet Mainframe and Preventing Judgement Day
- Exploiting Buffer Overflows on TryHackMe
- Domain Name System Simplified
- PortSwigger: SQL injection attack, listing the database contents on Oracle
- PortSwigger: SQL injection attack, listing the database contents on non-Oracle databases
- Metasploit Pivoting To Hack Segregated VirtualBox Virtual Machines
- Hack This Site: Extended Basic – Mission 5
- Tools: Metasploit
- Hack The Box: Machine – Fawn
- VulnHub: Vulnix
- Hack To Learn: OSINT and Passive Reconnaissance