dragonresearchgroup.com
Dragon Research Group (DRG) :: Challenges
http://www.dragonresearchgroup.com/challenges
A public, moderated challenges mailing list. Has been setup to help support DRG challenges and information security challenge-related discussion. Join the discussion today. June 13-16, 2016. June 15-19, 2015. June 23-27, 2014. DRG Online Challenge February 2014. DRG Online Challenge December 2013. DRG Online Challenge November 2013. DRG Online Challenge October 2013. DRG Online Challenge September 2013. DRG Online Challenge August 2013. DRG Online Challenge July 2013. June 16-21, 2013. June 17-22, 2012.
stefanocarli.me
Blog - Stefano Carli
http://www.stefanocarli.me/blog
Follow us on Twitter. Disaster recovery in Windows server 2012. Introduzione a Windows Server 2012. Decodifica del malware PHP Filesman. Recentemente mi è capitato di leggere questa. Domanda fatta su stackoverflow.com. Nella quale un utente, trovando in un file php del proprio sito WordPress del codice particolare, ne chiede il significato. Today I checked my wordpress website and I observed that one php file had the following code in it: According to THIS. Is this the same as the base encode eval64 hack?
hackutk.com
HackUTK | Resources
https://hackutk.com/resources.html
Suggested Tools and Learning Resources for Computer Security. It’s important to establish a solid toolkit for any kind of security work. The list below is what we consider a good foundation for our members to start from, which you can build on as you get more experienced. Though we don't include links here, you can find most of these tools on Kali Linux. A VM every security practitioner should have) and on the Kali Linux tool site. Dig, whois, traceroute. Strings, xxd, file. Ubuntu 12.04 x32 and x64.
darkscience.net
Links
http://www.darkscience.net/wiki/links
Communities Hosted on DarkScience. ArchAssault - Pentest Distro. Open Web Application Security Project. Minemu Dynamic Taint Analysis. Communications of the ACM. OpenBSD Papers and Presentations.
dxp2532.blogspot.com
-=[!]=-: 2008-10
http://dxp2532.blogspot.com/2008_10_01_archive.html
Importance of verifying vendor's protection claims. One of my favorite fundamental security principles is perfectly summarized by this blog post: "Are you Secure? This is true for any situation more so for high severity issues like the MS08-067. Vulnerability. So, one of the big names in enterprise security products came out with couple of signatures in their end user protection product. I won't name which one since it doesn't really matter in this context. Thus, if organizations rely on their security v...
2014.hackitoergosum.org
Team | Hackito Ergo Sum 2014
http://2014.hackitoergosum.org/team
Darr; Skip to Main Content. Hackito 2014 is finished! Thanks to all attendees! See you next year for Hackito Ergo Sum 2015! For futur informations about the conference follow our twitter account : Follow @hesconference. Who are in organization team? 2016 Hackito Ergo Sum 2014.
pwoodward.com
PWoodward.com
http://www.pwoodward.com/links.php
Download YouTube Videos (Video or Audio).
pentestn00b.wordpress.com
Safe To Hack Sites | pentest-n00b
https://pentestn00b.wordpress.com/safe-to-hack-sites
Safe To Hack Sites. Safe To Hack Sites. These sites are classed as ‘Safe To Hack’, some of the sites are setup so they present challenges and others are just OK to scan. Http:/ www.hackthissite.org/. 8211; A series of challenges that get harder and harder. Http:/ www.mibs-challenges.de/. 8211; in German, but google translate makes it acceptable. Http:/ hax.tor.hu/welcome/. Http:/ demo.testfire.net/. 8211; A Demo Banking Site to test ‘Watchfire’ products. Http:/ scanme.nmap.org/. 8211; NMAP scanning site.
blog.ant0i.net
blog.ant0i.net - my little techie blog: September 2012
http://blog.ant0i.net/2012_09_01_archive.html
Wednesday, September 26, 2012. About a year ago I stumbled upon the Over The Wire. Hacker challenges and started solving the first set of levels (called vortex). Since then, I have been publishing my solutions in my blog. Here is vortex level 7:. Int main(int argc, char * argv) { char buf[58]; u int32 t hi; if( hi = crc32(0, argv[1], strlen(argv[1]) ) = 0xe1ca95ee) { strcpy(buf, argv[1]); } else { printf("0x%08x n", hi); } }. The CRC of the buffer must equate to a given value (0xe1ca95ee). Which by the w...