MediaWiki API result
This is the HTML representation of the JSON format. HTML is good for debugging, but is unsuitable for application use.
Specify the format parameter to change the output format. To see the non-HTML representation of the JSON format, set format=json.
See the complete documentation, or the API help for more information.
{
"batchcomplete": "",
"continue": {
"lecontinue": "20250516210144|12",
"continue": "-||"
},
"query": {
"logevents": [
{
"logid": 22,
"ns": 0,
"title": "Scripting Basics",
"pageid": 22,
"logpage": 22,
"revid": 89,
"params": {},
"type": "create",
"action": "create",
"user": "Vegard",
"timestamp": "2025-05-17T20:44:10Z",
"comment": "Created page with \"== Scripting Basics == Scripting automates repetitive tasks, accelerates testing, and glues tools together. A single script can gather data, transform output, launch exploits, and log results in seconds. The three core environments are Bash, Python, and PowerShell; each dominates a different operating system family yet follows the same logic: read input \u2192 process \u2192 act. === Common Techniques === Parsing tool output and extracting key fields with regular expression...\""
},
{
"logid": 21,
"ns": 0,
"title": "Ip link set / `ifconfig",
"pageid": 21,
"logpage": 21,
"revid": 82,
"params": {},
"type": "create",
"action": "create",
"user": "Vegard",
"timestamp": "2025-05-17T17:54:34Z",
"comment": "Created page with \"= ip link set / ifconfig = == Introduction == The ip link set and ifconfig commands are used in Linux environments to manage network interfaces. These tools allow users to configure interface parameters, including the MAC (Media Access Control) address. On Windows systems, similar functionality can be accessed through network adapter settings or PowerShell. Changing a MAC address is commonly performed for testing, research, or evasion purposes. == What is a MAC Addres...\""
},
{
"logid": 20,
"ns": 0,
"title": "Sniffing & Spoofing",
"pageid": 20,
"logpage": 20,
"revid": 78,
"params": {},
"type": "create",
"action": "create",
"user": "Vegard",
"timestamp": "2025-05-17T17:45:49Z",
"comment": "Created page with \"== Sniffing & Spoofing == Sniffing inspects network traffic in real-time, extracting headers, payloads, and session metadata. It uncovers credentials, tokens, and protocol weaknesses, and establishes situational awareness before or during exploitation. === Common Techniques === Capturing raw packets with promiscuous or monitor mode interfaces Filtering traffic by IP, port, or protocol to isolate valuable data Reassembling TCP streams to read clear-text credentials Fol...\""
},
{
"logid": 19,
"ns": 0,
"title": "Can hacking be learned?",
"pageid": 19,
"logpage": 19,
"revid": 73,
"params": {},
"type": "create",
"action": "create",
"user": "Vegard",
"timestamp": "2025-05-16T21:18:00Z",
"comment": "Created page with \"= Can Hacking Be Learned? = Hacking is a discipline that builds on structured knowledge, practical skills, and analytical thinking. It involves understanding how systems operate, how information flows, and how logic governs digital environments. Like any technical field, hacking follows principles that can be studied, practiced, and refined over time. Learning to hack involves both theoretical foundations and hands-on experience. Core concepts include system architectu...\""
},
{
"logid": 18,
"ns": 0,
"title": "What tools do hackers use?",
"pageid": 18,
"logpage": 18,
"revid": 72,
"params": {},
"type": "create",
"action": "create",
"user": "Vegard",
"timestamp": "2025-05-16T21:16:51Z",
"comment": "Created page with \"= What Tools Do Hackers Use? = Hackers use a wide range of tools designed to analyze, manipulate, and interact with digital systems. These tools support various phases of hacking, including information gathering, vulnerability discovery, exploitation, privilege escalation, and persistence. Reconnaissance tools assist in collecting data about systems, networks, or users. This information helps form a clearer understanding of the target environment, revealing potential e...\""
},
{
"logid": 17,
"ns": 0,
"title": "What are the types of hackers?",
"pageid": 17,
"logpage": 17,
"revid": 71,
"params": {},
"type": "create",
"action": "create",
"user": "Vegard",
"timestamp": "2025-05-16T21:12:34Z",
"comment": "Created page with \"= What Are the Types of Hackers? = Hackers are often categorized based on their intent, methods, and objectives. These categories help describe how individuals interact with digital systems and what outcomes they pursue. While the term \"hacker\" broadly refers to someone skilled in navigating and manipulating technology, distinctions arise from context and purpose. == White Hat == White hat hackers work with permission to identify and resolve security issues. Their acti...\""
},
{
"logid": 16,
"ns": 0,
"title": "What makes hacking ethical?",
"pageid": 16,
"logpage": 16,
"revid": 70,
"params": {},
"type": "create",
"action": "create",
"user": "Vegard",
"timestamp": "2025-05-16T21:09:57Z",
"comment": "Created page with \"= What Makes Hacking Ethical? = Ethical hacking is defined by intention, consent, transparency, and respect for boundaries. It occurs when individuals use their technical skills to identify vulnerabilities, improve security, or support system resilience with the knowledge and approval of the system owner. Clear authorization is central to ethical hacking. When a system owner grants permission to examine digital infrastructure, the hacker operates within a structured ag...\""
},
{
"logid": 15,
"ns": 0,
"title": "When does hacking become illegal?",
"pageid": 15,
"logpage": 15,
"revid": 69,
"params": {},
"type": "create",
"action": "create",
"user": "Vegard",
"timestamp": "2025-05-16T21:07:47Z",
"comment": "Created page with \"= When Does Hacking Become Illegal? = Hacking becomes subject to legal frameworks when actions involve unauthorized access, data manipulation, or disruption of services within systems protected by law. Legal definitions vary by jurisdiction, but common factors include intent, consent, and the impact of the activity on system integrity, confidentiality, or availability. In many legal systems, accessing a system without explicit permission is addressed through statutes r...\""
},
{
"logid": 14,
"ns": 0,
"title": "Who becomes a hacker?",
"pageid": 14,
"logpage": 14,
"revid": 68,
"params": {},
"type": "create",
"action": "create",
"user": "Vegard",
"timestamp": "2025-05-16T21:05:20Z",
"comment": "Created page with \"= Who Becomes a Hacker? = A hacker is someone who develops the ability to understand, modify, or interact with systems in creative and unconventional ways. Individuals who become hackers often possess a strong curiosity for how things work, a desire to solve complex problems, and an interest in exploring the boundaries of technology. Hackers emerge from diverse backgrounds. Some gain early exposure to computers, networks, or code through self-initiated experimentation....\""
},
{
"logid": 13,
"ns": 0,
"title": "Where does hacking happen?",
"pageid": 13,
"logpage": 13,
"revid": 67,
"params": {},
"type": "create",
"action": "create",
"user": "Vegard",
"timestamp": "2025-05-16T21:03:13Z",
"comment": "Created page with \"= Where Does Hacking Happen? = Hacking takes place across digital environments where information systems, networks, or software interact. These environments include public and private infrastructures, internet-connected devices, corporate systems, personal computers, and embedded platforms. Each environment presents different surfaces for exploration, depending on its structure, purpose, and exposure. In many cases, hacking occurs remotely through the internet. This in...\""
}
]
}
}