petermorin.com
Other Cool News | petermorin.com
http://www.petermorin.com/category/other-cool-news
Skip to primary content. Skip to secondary content. Information & Sites. Category Archives: Other Cool News. October 25, 2015. Hell All. I know this isn’t really security-related, but maybe useful to some. I have been working with Atlassian Confluence. A simple couple line shell script will easily rotate these. Simply add this to your daily or weekly cron job. Great Keynote by Brandon Webb. September 23, 2015. I was thrilled to have former Navy SEAL and Sniper Course Manager Brandon Webb speak to the att...
man1aachacker.blogspot.com
Maniac_Hacker..!!: How To Start Penetration Testing by Web Application Hacking.
http://man1aachacker.blogspot.com/2011/12/how-to-start-penetration-testing-by-web.html
Http:/ www.facebook.com/Nirmal.kantharia. Monday, December 19, 2011. How To Start Penetration Testing by Web Application Hacking. Being a hacker is exciting but it is more of Responsible task. To start learning new things, you must be aware of what's going on in background while hacking foreground. So,To enrich your Tech-hunger and learn hacking,This is a step toward being Hacker. Anyways Let's go to Core Part,. Today , we 're going to learn about Web Application Hacking. As per Wikipedia.org ,. WebGoat ...
collegecontest.roqisoft.com
2015全国大学生软件实践与创新能力大赛--软件测试大赛
http://www.collegecontest.roqisoft.com/2015/2015_softwaretesting_contest.html
1)言若金叶软件研究中心官网 http:/ www.leaf520.com. 与备份网 http:/ leaf520.roqisoft.com. 2)诺颀软件论坛 http:/ leaf520.com/bbs. 与备份网 http:/ leaf520.roqisoft.com/bbs. 3)诺颀软件测试团队 http:/ qa.roqisoft.com. 4)言若金叶精品软件著作展示官网 http:/ books.roqisoft.com. 5)言若金叶全国软件工程师培训官网 http:/ training.roqisoft.com. 6)言若金叶全国软件工程师认证官网 http:/ certificate.roqisoft.com. 7)言若金叶自主软件研发 全球知识合作在线跟踪系统 http:/ www.worksnaps.net/. 8)城市空间 Oricity http:/ www.oricity.com. 9)诺颀软件 Roqisoft http:/ www.roqisoft.com. 10)诺颀电子杂志 http:/ jsebook.roqisoft.com. 4)言若金叶精品软件著作展示官...
securepla.net
wiki
https://www.securepla.net/wiki
Welcome to Secure Planet WIKI. John The Ripper : Password Format Hashes. Vulnerable Web Pentesting Frameworks. Security Awareness is the key for any organization or user to understand the threats and attacks that exist to your IT infrastructure or just to your home computer. Please visit my Blog and let me know how I'm doing. http:/ www.securepla.net. Configuring a Hacker Box. Linux Basic Linux Privilege Escalation. Web Application Cheat Sheet. Tools to Dump Windows Password Hashes. Exploit DB Exploit- DB.
31ric.com
article | 31ric
http://31ric.com/blog/tag/article
Tricks & Tips. February 17, 2016. Places to go on the Internet to practice your hacking skills. A Series of sites by Acunetix. Web Scanner Test Site. 8211; By the makers of NTO Spider. 8211; by Cenzic. Here is a site that lists some of the above and a bunch more:. 8220; 22 Hacking Sites, CTFs and Wargames. Change your MAC Address. February 17, 2016. On Linux this is quite easy. Some drivers will require your interface to be inactive if you want to do this. Ifconfig eth0 hw ether 11:22:33:44:55:66. Februa...
31ric.com
blogpost | 31ric
http://31ric.com/blog/category/blogpost
Tricks & Tips. February 18, 2016. So here are some cryptography notes for myself for various tests and things I have to study for. 8211; This is a class of cipher that encrypts one bit of data at a time. The length of the encrypted text is the same length as the plain text content. Types of Stream cciphers: RC4. Encrypts data one block at a time. When the data given is an uneven length, then it is padded at the end to create an even block length. PKCS5. Cipher Block Chaining Mode. Sudo apt-get install ent.
31ric.com
learn | 31ric
http://31ric.com/blog/category/learn
Tricks & Tips. July 28, 2016. A bit of an older read, but still good: There’s Something About WMI. And finally the whitepaper that got me on this little reading excursion today: Beyond Malware. July 26, 2016. 9 Communication with destination network prohibited. 10 Communication with destination host prohibited. 13 Communication administratively prohibited. February 18, 2016. So here are some cryptography notes for myself for various tests and things I have to study for. Cipher Block Chaining Mode. Places...
31ric.com
31ric | 31ric
http://31ric.com/blog/author/31ricposter
Tricks & Tips. All posts by 31ric. July 28, 2016. A bit of an older read, but still good: There’s Something About WMI. And finally the whitepaper that got me on this little reading excursion today: Beyond Malware. Fun stuff with Volatility. July 27, 2016. Some initial plugins to use:. I generally start any look in memory with the process plugins;. Volpy f memory.file profile=profile choice pslist pslist.txt. To do this, so mad props to him! Volpy f memory.file profile=profile choice procdump D pdump ...