.

.

Top 16 Free Websites to Learn Hacking

By on 20:58
  • Hack Forums: Emphasis on white hat, with categories for hacking, coding and computer security.
  • SecurityFocus: Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
  • Exploit DB: An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
  • SecTools.Org: List of 75 security tools based on a 2003 vote by hackers.
  • The Hacker News: The Hacker News — most trusted and widely-acknowledged online cyber security news magazine with in-depth technical coverage for cybersecurity.
  • Hacked Gadgets: A resource for DIY project documentation as well as general gadget and technology news.
  • Offensive Security Training: Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
  • KitPloit: Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security.
  • DEFCON: Information about the largest annual hacker convention in the US, including past speeches, video, archives, and updates on the next upcoming show as well as links and other details.
  • Packet Storm: Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers.
  • HackRead: HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance, and Hacking News with full-scale reviews on Social Media Platforms.
  • Black Hat: The Black Hat Briefings have become the biggest and the most important security conference series in the world by sticking to our core value: serving the information security community by delivering timely, actionable security information in a friendly, vendor-neutral environment.
  • NFOHump: Offers up-to-date .NFO files and reviews on the latest pirate software releases.
  • Phrack Magazine: Digital hacking magazine.
  • Metasploit: Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the worlds best penetration testing software now.
  • Hakin9: E-magazine offering in-depth looks at both attack and defense techniques and concentrates on difficult technical issues.

DEFINATION OF HACKING

By on 22:41
DEFINATION OF HACKING

Hacking is an attempt to exploit a  computer system vulnerabilities or a private network inside a computer to gain unauthorized acess.
Hacking is identifying and exploiting weakness in computer system and/ or computer networks for finding the vulnerability and loopholes.

More info


PC No Reconoce Memoria USB "Software Gratis" (Solución)

By on 13:38
En esta ocasión queremos hablar de un tema que sucede con frecuencia en nuestro entorno si trabajamos bastante con memorias USB. Y es de notar que cada vez que insertamos y expulsamos con frecuencia un pendrive la posibilidad de perder por completo el funcionamiento es cien por ciento seguro. Para este problema nos hemos puesto a la tarea de probar un método que quizás para muchos sea inseguro pero también es creíble que en muchas ocasiones funciona a la perfección.
Se trata Rufus un software potente que le ayuda a formatear y crear soportes USB de arranque en tarjetas de memoria, ya que existen diversas maneras de perder utilidad y para darle un nuevo estado es necesario eliminar por completo toda la información que tenga en el interior, ese sería el único inconveniente si realizamos este procedimiento.
https://www.dominatupc.com.co/
Este programa lo podemos utilizar en casos donde necesitemos crear medios de instalación USB a partir de formato iSO arrancables. Si trabajamos en equipos que no tengas sistema operativo instalado, cuando necesite actualizar el firmware o BIOS de un ordenador, esto y muchas más  son las herramientas que nos ofrece esta pequeña aplicación.

Como instalar y utilizar Rufus para reparar memoria USB

Opcion #1
Ingresamos a la plataforma dando clic aquí, en el apartado buscamos otras versiones (GitHub), elegimos "Rufus-3.3. exe" y descargamos. Una vez ejecutada procedemos a insertar la memoria USB para que Rufus la detecte. Seleccionamos la opción "Elección de arranque" y marcamos "No auto-ejecutable", dejando todo como esta damos clic en "empezar", aceptamos la advertencia y dejamos por unos segundos que realice el escáner o el formato. Ya cuando haya terminado damos formatear desde la USB para borrar archivos creados por el software y listo, ya todo estar funcionando de maravilla.
https://www.dominatupc.com.co/
Opción #2
Ingresamos a Rufus dando clic aquí, dentro de la página damos clic en "Rufus 3.10" para descargar. Damos clic en ejecutar como administrador e insertamos el Pendrive para que Rufus lo detecte. Buscamos el apartado "elección de arranque" y seleccionamos "No auto-ejecutable" en sistema de archivos damos clic en Fat (por defecto) y cliqueamos en "empezar" después de terminar el proceso solo nos queda por darle un formato normal desde nuestro sistema y listo.
https://www.dominatupc.com.co/
Es importante aclarar que el procedimiento sirve siempre y cuando la memoria USB sea detectada por Rufus, sino es así, para el programa será imposible que repare los errores. Cuéntanos como te fue y no olvide seguirnos en las redes sociales. También te recomendamos leer:(Cómo reparar memorias USB desde CMD sin formatear)


More info

  1. Hacking Process
  2. Pentest Tools Free
  3. Pentest Vpn
  4. Hacking With Raspberry Pi
  5. Hacking Language
  6. Pentest With Kali
  7. Pentest Online Course
  8. Pentest Book

Support For XXE Attacks In SAML In Our Burp Suite Extension

By on 5:12

In this post we present the new version of the Burp Suite extension EsPReSSO - Extension for Processing and Recognition of Single Sign-On Protocols. A DTD attacker was implemented on SAML services that was based on the DTD Cheat Sheet by the Chair for Network and Data Security (https://web-in-security.blogspot.de/2016/03/xxe-cheat-sheet.html). In addition, many fixes were added and a new SAML editor was merged. You can find the newest version release here: https://github.com/RUB-NDS/BurpSSOExtension/releases/tag/v3.1

New SAML editor

Before the new release, EsPReSSO had a simple SAML editor where the decoded SAML messages could be modified by the user. We extended the SAML editor so that the user has the possibility to define the encoding of the SAML message and to select their HTTP binding (HTTP-GET or HTTP-POST).

Redesigned SAML Encoder/Decoder

Enhancement of the SAML attacker

XML Signature Wrapping and XML Signature Faking attacks have already been part of the previous EsPReSSO version. Now the user can also perform DTD attacks! The user can select from 18 different attack vectors and manually refine them all before applying the change to the original message. Additional attack vectors can also be added by extending the XML config file of the DTD attacker.
The DTD attacker can also be started in a fully automated mode. This functionality is integrated in the BurpSuite Intruder.

DTD Attacker for SAML messages

Supporting further attacks

We implemented a CertificateViewer which extracts and decodes the certificates contained within the SAML tokens. In addition, a user interface for executing SignatureExclusion attack on SAML has been implemented.

Additional functions will follow in later versions.

Currently we are working on XML Encryption attacks.

This is a combined work from Nurullah Erinola, Nils Engelbertz, David Herring, Juraj Somorovsky, and Vladislav Mladenov.

The research was supported by the European Commission through the FutureTrust project (grant 700542-Future-Trust-H2020-DS-2015-1).
Related news
  1. Pentest Tools Framework
  2. Pentest Uk
  3. Hacking Attack
  4. Pentest With Kali
  5. Pentest Software
  6. Hacking Images
  7. Pentest Training
  8. How To Pentest A Network
  9. Pentest Report
  10. Pentest Linux
  11. Pentestmonkey
  12. Pentest Enumeration
  13. Pentest Basics
  14. Pentest Azure
  15. Hacker Kevin Mitnick
  16. Pentest Training
  17. Hacking Games Online
  18. Pentest Azure
  19. Hacking Apps

SubOver - A Powerful Subdomain Takeover Tool

By on 19:01

Subover is a Hostile Subdomain Takeover tool designed in Python. From start, it has been aimed with speed and efficiency in mind. Till date, SubOver detects 36 services which is much more than any other tool out there. The tool is multithreaded and hence delivers good speed. It can easily detect and report potential subdomain takeovers that exist. The list of potentially hijackable services is very comprehensive and it is what makes this tool so powerful.

Installing
You need to have Python 2.7 installed on your machine. The following additional requirements are required -
  • dnspython
  • colorama
git clone https://github.com/Ice3man543/SubOver.git .
cd SubOver
# consider installing virtualenv
pip install -r requirements.txt
python subover.py -h

Usage
python subover.py -l subdomains.txt -o output_takeovers.txt
  • -l subdomains.txt is the list of target subdomains. These can be discovered using various tool such as sublist3r or others.
  • -o output_takeovers.txtis the name of the output file. (Optional & Currently not very well formatted)
  • -t 20 is the default number of threads that SubOver will use. (Optional)
  • -V is the switch for showing verbose output. (Optional, Default=False)

Currently Checked Services
  • Github
  • Heroku
  • Unbounce
  • Tumblr
  • Shopify
  • Instapage
  • Desk
  • Tictail
  • Campaignmonitor
  • Cargocollective
  • Statuspage
  • Amazonaws
  • Cloudfront
  • Bitbucket
  • Squarespace
  • Smartling
  • Acquia
  • Fastly
  • Pantheon
  • Zendesk
  • Uservoice
  • WPEngine
  • Ghost
  • Freshdesk
  • Pingdom
  • Tilda
  • Wordpress
  • Teamwork
  • Helpjuice
  • Helpscout
  • Cargo
  • Feedpress
  • Freshdesk
  • Surge
  • Surveygizmo
  • Mashery
Count : 36

FAQ
Q: What should my wordlist look like?
A: Your wordlist should include a list of subdomains you're checking and should look something like:
backend.example.com
something.someone.com
apo-setup.fxc.something.com

Your tool sucks!
Yes, you're probably correct. Feel free to:
  • Not use it.
  • Show me how to do it better.

Contact
Twitter: @Ice3man543

Credits


Read more


  1. Pentest Tools Framework
  2. Pentesting Tools
  3. Pentest Red Team
  4. Pentest Wifi
  5. Pentest Meaning
  6. Pentest Wiki
  7. Pentest Tools Free
  8. Hacking Network
  9. Is Hacking Illegal
  10. Pentest Owasp Top 10
  11. Hacking Online Games
  12. Pentest +
  13. Pentest Example Report
  14. Hacking Google
  15. Hacking Language
  16. Hacking Hardware
  17. Pentestlab
  18. Pentest Devices

How To Insert Data Into Database | Tutorial 3

By on 10:47

Welcome to my another tutorial of PHP and MYSQL. In the previous tutorial I've briefly discussed How to make a PHP file and How to save the PHP file in the root directory of the server. How to run PHP script over the Web Browser etc.

Now in this tutorial I've discussed about inserting data into database by getting the values from user with the help of HTML form. One thing should be remembered that getting a values from users by HTML form is the only way to get values from users in PHP.

How To Insert Data into Database

Step 1:

Open your text editor and create HTML form. 

Step 2:

Make a database connection in PHP.

Step 3:

Write an INSERT query for the sake of insertion data into database like INSERT INTO table_Name(table_Attribute1, table_Attribute2....) VALUES('1', 'Alex'...); etc. Now watch the video to make a better understanding the concept of insertion.