Jan 26, 2014

Bypass Facebook Photo Verification

Facebook has different verification mechanisms in store. In certain cases Facebook requires you to verify yourself as a human being or to verify your identity. One of these identity checks is the photo verification. Facebook basically shows you photos of your friends and requires you to recognize them in the photos. This is done by presenting you with a list of prepopulated names of some of your friends who could possibly be shown in the pictures.

I have created a proof-of-concept software that can bypass the photo verification 100% of the time. I'll show you how to build the software step by step, all you need is:

  • A Facebook developer account (it's for free!)
  • A little bit of storage on your hard drive
  • A Linux machine (a virtual one will do)
  • A local web server to host a small php application (e.g. Apache web server)
  • The ability to copy and paste code

Jan 9, 2014

Most Important Ethical Hacking Domains And Tools

The world of Ethical Hacking and Penetration Testing is huge. It covers many areas and a lot of different topics. In this article I give a brief overview on the major topics of Ethical Hacking and the most relevant tools and techniques for each topic. A topic is one specific domain like wireless hacking or infrastructure hacking. It goes without saying that all of these topics are entangled with each other. I point out relevant resources and tools which should be looked into and known in order to master one of the domains. This article targets beginners who just started their journey into Ethical Hacking and want to get an overview on the main topics of Ethical Hacking and Penetration Testing.