Introducing 35 Pentesting Tools Used for Web Vulnerability Assessment
1. w3afw3af or Web Application Attack and Audit Framework is an open source penetration testing tool for finding web vulnerabilities and an exploit tool that comes with cool plugins like sqlmap,...
View ArticleSQL Injection Using MySQL LOAD_FILE() and INTO OUTFILE()
SQL injection is one of the most chronic threats in websites today. There are many kinds of SQL injection techniques like the use of union statements, order by statements, LOAD_FILE(), INTO OUTFILE(),...
View ArticleSQL Injection Cheat Sheet for Damn Web Vulnerable Application
Damn Web Vulnerable Application or DVWA is one of my favorite web applications for website penetration testing and web attacking. It is easier for the learner to attack the web application because...
View ArticleROOTCON 6 Registration Now Live!!!
This year's ROOTCON is much awesome with our selected tracks and carefully planned activities. April 1, 2012 we are pleased to announce that the early registration for ROOTCON 6 is now live.Our updated...
View ArticleCall For InfoSec Celebs
Who Wants To Speak?ROOTCON is looking for InfoSec Celebrities both local and internationl. If you think you have the skills and talents to be one of the InfoSec celebrities we will be delighted if you...
View ArticleWe want you to come!!!
We want you to able to join the fun and learning we share at ROOTCON, with that we made it easy for everyone to get approval from you boss and HR personnel. You may download our pre-formatted and...
View Article3 Common Automated Tools with GUI Used for Wireless Cracking / Pentesting
1. wifitewifite is a mass WEP/WPA WiFi Cracker that is coded in python which makes cracking WIFI passwords and security easier, it uses the aircrack-ng suite. It can be executed by using the command...
View ArticleDumping Like a Boss - sqlmap 101
SQLmap is one of the most common used tools for web application penetration testing because it is open source and automates an sql injection attacks which also allows you to spawn a shell. It has full...
View ArticleROOTCON Easter Egg Hunt
Here we go, ROOTCON Easter Egg Hunt.Instructions (Read Carefully)1. Search for each word contained on each egg2. Gather all words found on each egg3. Combine all words into one4. Send your code to...
View ArticleROOTCON Easter Egg Solution
The ROOTCON Easter Egg Hunt is over, the hunt was pretty simple and straight forward, you just need to know some of the basic arsenal in your day to day hacking escapade.The Solution:Easter Egg #1 =...
View ArticleTunneling the Applications you launched on your Terminal with Tsocks
With some of the applications that don't have proxy configurations or settings, how can we add anonymity to our information gathering, scanning, exploiting phases, etc. like nmapping, using...
View ArticleClubHack Magazine April 2012 Issue Released!
India's 1st Hacking Magazine which is ClubHack or CHmag has just released their April 2012 Issue. CHmag happens to be our media partner and that CHMag is one of the hacking/infosec magazines I'm...
View ArticleSimple Kung Fu Grep for Finding Common Web Vulnerabilities & Backdoor Shells
Grep is a powerful command-line tool in Unix and Linux used for searching and probing data sets for lines that matches a regular expression. As a short history, this utility was coded by Ken Thompson...
View ArticleHackxor - Web App Hacking Game
Are you a gamer and at the same time a penetration testing enthusiast in web applications?Well then, you might wanna try whacking out 'hackxor'! Hackxor is a web application hacking game where players...
View ArticleMay 2012 issue of ClubHack Magazine is out now!
ClubHack Magazine's May 2012 issue has just been released yesterday guys and thanks to the Chmag Team for giving us free monthly issues!Topics:0x01 - Steganography over converted channels (Tech...
View ArticleEarly Registration Closing Soon!!!!
Our 2 months run for the early registration will be closing this coming June 30, 2012. If you haven't registered yet, register now to get big discounts!!! Visit the registration page now!!!
View ArticleNew CFP Submission
New CFP submission has landed our Inbox.Topic DetailsPresentation Title: Randomized/Obfuscated Text DetectionSynopsis: Recent malwares have been using obfuscation techniques to hide its code from...
View ArticleROOTCON 6 Call For Papers Now Close
ROOTCON 6 Call For Papers is now close, we would like to thanks everyone who submitted. For those who were not accepted you can still enjoy the fun at ROOTCON by registering, socialize, network, learn...
View Article8 Hacking and Information Security Magazines You Might Wanna Read
As a programming student, security researcher and a blogger; I always keep up to date about what is happening in cyber space by reading infosec articles and magazines. Magazines I usually read have...
View ArticleChecking out BackTrack Linux 5r2-PenTesting Edition Lab!
What's a BackTrack Linux 5r2-PenTesting Edition Lab? What's with the edition thingy? Isn't BackTrack 5 a pentesting distro already? Why make a pentesting edition?Maybe these are some of the questions...
View Article