tag:blogger.com,1999:blog-67610227168322739092024-03-24T00:10:13.445-07:00List of hacking and security related websites and its reviewUnknownnoreply@blogger.comBlogger19125tag:blogger.com,1999:blog-6761022716832273909.post-23970053667563970512009-09-17T06:45:00.000-07:002009-09-17T06:53:53.274-07:00HackerTarget<div style="text-align: justify;">In my <a href="http://hacking-websites.blogspot.com/2009/09/nmap-online.html" target="_blank">previous post</a> we saw about online Nmap port scanner. There is one more interesting site called <a href="http://hackertarget.com/" target="_blank">Hacker Target</a>. They offer online Nmap port scanning and also few more vulnerability scanners. Here is the list of scanners available<br /><br /></div><ul style="text-align: justify;"><li>Nmap Port Scan</li><li>OpenVas Vulnerability Scan</li><li>SQL Injection Scan using SQLiX and sqlmap</li><li>Nikto Web Server Scan</li><li>Joomla Security Scan</li><li>Sub Domain Scanner</li></ul><div style="text-align: justify;"><br />They are free service but there are some limitations. We just have to enter target IP and our email address. Result will be delivered directly to your inbox within a short period time. To avoid abuse of the service they have Vulnerability Scan Subscription. You can perform unlimited scanning if you subscribe for 1 month (4.99$) or for a year (29.99$)<br /><br /><br />Full Vulnerability Assessment is performed by this site for a fee of 150$ per server. I would like try their service but I don’t have any server LOL. There are few white papers available which is all about hacking and security. It’s a good site and it has good potential. We can expect more sites like this in future.<br /></div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-6761022716832273909.post-11499554741852029142009-09-14T08:37:00.000-07:002009-09-14T08:45:06.993-07:00Nmap-Online<div style="text-align: justify;">Well I’m posting this after a long gap. I was busy with my work and also I have joined college for post graduation. But I don’t want to keep this blog outdated and I will try to update it whenever I find interesting sites. Today I saw a site called <a href="http://nmap-online.com/" target="_blank">Nmap Online</a>. I hope everyone know about Nmap, a multipurpose port scanner and extensively used network tool by hackers as well as security professional. Nmap online is a site where we can perform port scans online but there are some limitations.<br /><br />They offer three types of scan; they are Quick Scan, Full Nmap Scan and Custom Scan. Let me explain you about each type in detail<br /><br /><span style="font-weight: bold;">Quick Scan --> </span>-F -T5 -sS <ip><span style="font-weight: bold;"><br /><br /></span>F – Fast option, which scans all the ports registered in your /etc/services<span style="font-weight: bold;"><br /></span>T5 - the ping timeout value<span style="font-weight: bold;"><br /></span>sS - Launches a stealth SYN scan<span style="font-weight: bold;"><br /><br />Full Nmap Scan --> </span>-p (from port)-(to port) T4 -sS <ip><br /><br />p - Here you can specify the port range to scan<br />T4 - the ping timeout value<span style="font-weight: bold;"><br /></span>sS - Launches a stealth SYN scan<span style="font-weight: bold;"><br /><br />Custom Scan --> </span>Here you can specify your custom parameters and options to scan<span style="font-weight: bold;"><br /></span><br />Total scans performed so far when I checked that site is 264922! Actually we can use this online scan to check our firewall settings and also we can use it to test our network security. You have the option to send the scan results to your mail. They should implement some mechanism to restrict number of scans performed per IP to avoid abuse of this service.<br /><br />This site displays the IP of the current system accessing the site at the top right corner of the page. Another easy way to find our external IP address in a single click! They also accept donation via PayPal and Moneybookers. I feel we can donate some amount for this great valuable service!<br /></ip></ip></div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-6761022716832273909.post-65924557535150167502009-08-05T08:50:00.000-07:002009-08-05T09:00:29.647-07:00Remote–Exploit<div style="text-align: justify;">What if you get all the hacking and security related tools bundled as a single pack for free? Welcome to <a href="http://www.remote-exploit.org/" target="_blank">Remote-Exploit</a>! home of the world’s finest and famous Linux security distro. Back Track is the one of the famous and widely used Linux distros for Penetration Testing and Vulnerability Assessment. It’s an open source and contains valuable tools which you never even know they are there!<br /><br />There are many <a href="http://www.remote-exploit.org/about.html">volunteers</a> behind the development of backtrack. <a href="http://www.remote-exploit.org/backtrack.html" target="_blank">Backtrack</a> is the result of merging the two innovative penetration testing live Linux distributions Auditor and Whax. I recommend you to check the free <a href="http://www.remote-exploit.org/projects.html" target="_blank">projects</a> section as there many useful tools out there. They have developed several "Offensive Security" courses which will teach you how to get the most out of Backtrack and the included tools.<br /><br />Offensive-security.com is there online training service site. These courses were developed for System Administrators and Security Professionals who want to learn how to get the most out of Backtrack. They also provide in-house training. If you want to start learning about backtrack, first check the backtrack <a href="http://wiki.remote-exploit.org/" target="_blank">wiki documentation</a> and the other place to check is <a href="http://www.offensive-security.com/blog/" target="_blank">Offensive Security blog</a> where they discuss about backtrack and other security stuff. Well, there is one more good place to start that is <a href="http://forums.remote-exploit.org/" target="_blank">backtrack forum</a>.<br /><br /><br />Backtrack 3 is the stable release and backtrack 4 beta version is available for download. If you have planned to move to BT4 check this <a href="http://www.offensive-security.com/backtrack4-guide-tutorial.pdf" target="_blank">PDF</a> and also this <a href="http://www.offensive-security.com/videos/backtrack-security-training-video/up-and-running-backtrack.html" target="_blank">video</a>. Basically you can learn and master this tool quickly if you have good knowledge in Linux. If you are newbie then you are few steps behind but still you can learn it. All you need is hard work and interest.<br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script><br /><br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-69596104301654719402009-07-30T08:45:00.000-07:002009-07-30T08:50:07.310-07:00Windows Security<div style="text-align: justify;">This is an excellent site which is completely dedicated to “Windows” security. Here you can find all information related to windows security and it is constantly updated. I recommend this site for people who want to gain good knowledge in windows platform.It’s a well known fact that windows OS is widely used and most vulnerable. Just check this site and learn security for windows platform.<br /><br />Let me start with the Articles/Tutorial section. There are many articles available and it not only covers security but also covers some other concepts. Here is the list of topics covered:<br /><br /><ul><li>Authentication, Access Control & Encryption</li><li>Content Security (Email & FTP)</li><li>Firewalls & VPNs</li><li>Intrusion Detection</li><li>Misc Network Security</li><li>Product Reviews</li><li>Viruses, Trojans and other Malware</li><li>Web Application Security</li><li>Web Server Security</li><li>Windows 2003 Security</li><li>Windows Networking</li><li>Windows OS Security</li><li>Wireless Security </li></ul><br />There are more than 10 authors contributing to this site. Information about the authors is given in the site and these authors own sites and blogs(link is given) which is again a good place for us to learn some stuff, so check out the author section without fail. This site have a blog too which is updated on a regular basis with the latest news, information and insider gossip within the network security world and security related fields.<br /><br /><a href="http://www.security-forums.com/" target="_blank">Forum</a> is very active. There are totally 203745 articles posted by members and 56408 registered users so far. Newsletter subscription is available where you can subscribe for monthly news-letter or real-time subscription (You will receive mail as soon as a new article is posted.). <br /><br />They offer some online security tests. I haven’t tried those tests. Details below:<br /><br /><ul><li>EndPointScan(External Link)</li><li>TrojanScan</li><li>Email Security Test</li><li>EventLogScan</li><li>Cross Site Scripting scan </li></ul><br />Other important sections to check here are Software, Whitepapers and Links. Don’t miss the link section since there are many valuable sites listed over there.<br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script><br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-21445219555897113172009-07-29T09:07:00.000-07:002009-07-29T09:26:01.874-07:00Plain-Text<div style="text-align: justify;">This site is an advanced hash cracking system which uses “rainbow tables”. A rainbow table is a lookup table offering a time-memory tradeoff used in recovering the plain text password from a password hash generated by a hash function, often a cryptographic hash function. Click <a href="http://en.wikipedia.org/wiki/Rainbow_table" target="_blank">here</a> to learn more about rainbow tables.<br /><br />Here you can crack hashes like LM, NTLM and MD5. I request you to read the <a href="http://www.plain-text.info/faq/" target="_blank">FAQ</a> section before proceeding. There is a diagram over there which clearly explain you how their system works to crack the hashes. Generally cracking hashes requires lots of memory and other hardware resources. They have currently six computers to crack hashes using 0.376953125 Tb rainbow tables.<br /><br />We can submit our hashes <a href="http://www.plain-text.info/add/" target="_blank">here</a> to crack. You can also search for hashes according to the status <a href="http://www.plain-text.info/search/" target="_blank">here</a>. The below given is the statistics about the status of their hash cracking system. (Note: The actual count may vary time to time)<br /><br /><code><br /><span style="font-weight: bold;">User Account Anonymous stats</span><br /><br /> * Hashes Total: 40296<br /> * Hashes Cracked: 8587<br /> * Hashes Not Found: 1106<br /> * Hashes Cracking: 20941<br /> * Hashes In Queue: 9662<br /><br /><span style="font-weight: bold;">Network Info</span><br /><br /> * Hashes Total: 42690<br /> * Hashes Cracked: 8960<br /> * Hashes Not Found: 1176<br /> * Hashes Cracking: 22422<br /> * Hashes In Queue: 10132<br /> * Crackers Total: 26<br /> * Online Crackers: 6<br /> * Offline Crackers: 20<br /> * Users Total: 19<br /></code><br /><br /><span style="font-weight: bold;">Rainbow tables details</span>:<br /><br /><table width="554"><tbody><tr valign="top"><td bg="" style="color: rgb(214, 219, 222);"><span style="color: rgb(8, 73, 123);font-family:Verdana;font-size:85%;" >Algorithm</span></td> <td bg="" style="color: rgb(214, 219, 222);"><span style="color: rgb(8, 73, 123);font-family:Verdana;font-size:85%;" >Range</span></td> <td bg="" style="color: rgb(214, 219, 222);"><span style="color: rgb(8, 73, 123);font-family:Verdana;font-size:85%;" >Success probability</span></td> <td bg="" style="color: rgb(214, 219, 222);"><span style="color: rgb(8, 73, 123);font-family:Verdana;font-size:85%;" >Cryptanalysis time</span></td> <td bg="" style="color: rgb(214, 219, 222);"><span style="color: rgb(8, 73, 123);font-family:Verdana;font-size:85%;" >Disk usage</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >halflmchall</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 7</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >6.78304 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:0:33</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0 Gb 153 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >halflmchall</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 7</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1.96518e-06 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:0:1</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0 Gb 1 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >lm</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 7</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >99.9995 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >3:10:39</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >82 Gb 0 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >lm</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 7</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1.89631e-05 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:0:1</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0 Gb 1 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >lm</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 5</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >93.066 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:0:4</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0 Gb 3 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >lm</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 7</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >70.6742 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:2:33</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >4 Gb 24 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >lm</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 7</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >99.9755 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:5:18</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >3 Gb 0 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >md5</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >8 - 8</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >50.6979 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:21:10</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >36 Gb 971 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >md5</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >8 - 8</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >86.9712 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >2:26:16</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >257 Gb 0 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >md5</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 7</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >2.58437 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:0:9</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0 Gb 222 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >md5</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 8</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >21.7765 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:1:35</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 Gb 0 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >md5</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 7</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >15.3869 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:0:11</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0 Gb 222 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >ntlm</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 6</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >11.1108 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:0:23</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0 Gb 611 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >ntlm</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 8</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0.128583 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:1:16</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 Gb 0 Mb</span></td></tr> <tr valign="top"><td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >sha1</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >1 - 7</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >2.58437 %</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0:0:9</span></td> <td bg="" style="color: rgb(204, 102, 0); font-weight: bold;"><span style=";font-family:Verdana;font-size:85%;" >0 Gb 222 Mb</span></td></tr></tbody></table><br />There is software called “Plain Shell” available for download. It is mainly used for proxy tunneling. I haven’t tried it yet. You can get more details about this software <a href="http://www.plain-text.info/plainshell" target="_blank">here</a> . You can help them by allowing your computers to generate rainbow tables and run a client for cracking for their network. The best way to contact the admins and to submit the hash of cracking is through IRC. Here is the IRC detail<br /><br /><code><br />irc.Plain-Text.info #rainbowcrack<br /><br /><span style="font-weight: bold;">Web based IRC</span>:<br /><br />http://www.plain-text.info/index/#irc.plain-text.org/rainbowcrack<br /></code><br /><span style="font-size:130%;"><span style="font-weight: bold;">Visit <a href="http://www.plain-text.info/" target="_blank">Plain-Text</a></span></span><br /></div><br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-44546813106419258312009-07-24T08:14:00.000-07:002009-07-24T08:26:28.043-07:00SecurityTube<div style="text-align: justify;">When I was searching for a video tutorial on Nmap in Google, I found this site. Here you can find many useful videos on hacking. Instead of reading books if we watch videos on a topic, we can understand the concept easily. Most people prefer watching videos rather than reading. If you are one among them then this site is for you.<br /><br />This site not only has hacking videos but also has some useful videos which cover many topics. Site design is very simple and easy to navigate. I don’t find any annoying Ad banners which I usually see in many sites. They also have a forum and I think it’s a new forum because members, topics and posts are low in count. I saw many interesting topics in this forum.<br /><br />In home page you can see the link to Latest Videos, Most Popular Videos and Most Rated Videos. There are three sections to classify the videos. They are,<br /><br /> * Coding<br /> * Tools<br /> * Basics<br /><br />We can also upload and refer a Video. For your convenience I have mentioned the videos available in each section below.<br /><br /><span style="font-weight: bold;">Coding</span><br /><br /><ul><li>Socket Programming</li><li>Client Server Programming using Sockets</li><li>Programming Security Tools</li><li>Programming an ARP DoS Tool</li><li>Raw Socket Basics</li><li>Generic Packet Sniffer</li><li>Packet Sniffing Basics</li><li>Packet Injection Programming Basics</li><li>Ethernet IP TCP Packet Injection Programming</li><li>Advanced Packet Injection Programming</li><li>Automated Site Miners Programming</li><li>Reverse Engineering Basics</li><li>Assembly Language Primer for Hackers</li><li>Buffer Overflow Primer Series</li><li>Advanced Buffer Overflows</li><li>Format String Vulnerabilities Primer for Hackers</li><li>C Programming 101</li></ul><span style="font-weight: bold;">Tools</span><br /><br /><ul><li>Exploit Demos</li><li>Wireless Hacking using Backtrack</li><li>Wi-Fi Security Products</li><li>Wireshark Basics by Laura Chappell</li><li>Advanced Buffer Overflow Techniques</li><li>Hard Drive Encryption</li><li>SQL Injection tools</li><li>Malware Inspection and Removal Techniques</li><li>Email Security</li><li>HTTP / SSL Session Hijacking Attacks</li><li>Exploiting Web Applications with Exploit-Me</li><li>Hacking with Fast-Track</li><li>Hacking VoIP</li><li>And many more</li></ul><span style="font-weight: bold;">Basics</span><br /><br /><ul><li>Network Security Basics</li><li>Wireless LAN Basics</li><li>Videos from Sophos Labs</li><li>Confidence 2008</li><li>Wi-Fi Attacks</li><li>Infinity Exists</li><li>Networking Basics Videos</li><li>AppSec 2008</li><li>DNS Attacks</li><li>IEEE 802.11 (Wi-Fi) Security Protocols</li><li>iPhone Hacks</li><li>Interesting Talks on Computer Security and Ethical Hacking</li><li>Security and Hacking Talks from LayerOne 2009</li><li>Recon 2008</li><li>Interesting Security Talks at SnowFROC 2009</li><li>Interesting Security Talks at FOSDEM 2009</li><li>Latest Security and Hacking Tools</li><li>Notacon 6</li><li>Hacker Commerce Film Series</li><li>OWASP Conference Videos</li><li>Blackhat 2009 Attacks</li><li>Web Application Security</li><li>Networking Basics</li><li>IPv6 Tutorial</li><li>Interesting Talks at Defcon</li><li>Backtrack Basics</li><li>How Do Spammers Work?</li><li>Internet Worm Basics</li></ul><br /></div><br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-85519926861880799342009-07-19T01:05:00.000-07:002009-07-19T01:15:27.356-07:00Johnny.Ihackstuff<div style="text-align: justify;"><a href="http://johnny.ihackstuff.com/" target="_blank">I Hack Stuff</a> is very famous for its charity work and <a href="http://www.hackersforcharity.org/ghdb/" target="_blank">GHDB</a> (Google Hacking Data Base). I really appreciate Johnny for his charity work in African countries. He proved that hackers are good people too. Let me quote some beautiful lines from this site:<br /><br />"<span style="font-style: italic;">Picking on charities is just plain rude. Thankfully, that’s not what we’re about. We’re about proving that hackers have amazing skills that can transform charitable organizations. We’re about stepping into the gap to feed and educate the world’s most vulnerable citizens. We are virtual, geographically diverse and different. We are Hackers for Charity.</span>"<br /><br />Currently they are accepting <a href="http://www.hackersforcharity.org/?dc_popup=show" target="_blank">donations</a>. All donated money goes to Kenya <a href="http://www.hackersforcharity.org/hackers-for-charity/about-us/#food_program" target="_blank">food for work program</a>. Actually they will give you back links for your donation. The more you donate the bigger your link will be in the donor cloud. If you are interested in getting involved in this charity mission visit <a href="http://www.hackersforcharity.org/hackers-for-charity/get-involved/" target="_blank">this page </a><br /><br />There are many good ways available for you to help Johnny to continue his charity work. Get involved!!!<br /><br /></div><ul style="text-align: justify;"><li>Donate, get linked, feed a child!</li><li>Donate hardware</li><li>Fund a computer classroom </li><li>Join the Informer</li><li>Donate the journey</li></ul><div style="text-align: justify;">Other than this charity work, this site attracts lot of visitors for <a href="http://johnny.ihackstuff.com/ghdb/" target="_blank">GHDB</a>. A perfect place for finding “Google Dorks” . Using this database we can find some sensitive and valuable info from Google. The below given are sections covered in Database:<br /><br /></div><ul style="text-align: justify;"><li>Advisories and Vulnerabilities</li><li>Error Messages</li><li>Files containing Juicy info</li><li>Files containing passwords</li><li>Footholds</li><li>Pages containing login portals</li><li>Pages containing network or vulnerability data</li><li>Sensitive Directories</li><li>Sensitive Online Shopping Info</li><li>Various Online Devices</li><li>Vulnerable Files</li><li>Vulnerable Servers</li><li>Web Server Detection</li></ul><div style="text-align: justify;"><span style="font-weight: bold;font-size:130%;" >Visit </span><span style="font-size:130%;"><a style="font-weight: bold;" href="http://johnny.ihackstuff.com/">IHS</a></span><br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script><br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-11301363942716515232009-07-17T08:36:00.000-07:002009-07-17T08:39:47.870-07:00HackingAlert<div style="text-align: justify;">Actually this site name is "HackingAlert" but I can say "HackingArticles" is the perfect name for this site because this site is a good source for hacking related articles. This is a perfect place for newbies who have just started learning hacking. Even a non-techie person can understand what hacking is all about. If you would like suggest an article, simply fill out and submit the form available in the site.<br /><br />They also offer some free stuff like Icons, Web templates, logos and Brouchers. Newsletter subscription is available, sing up to receive some useful tips. I saw few whitepapers here related to hacking incident for commercial gain. When you click on the link, this site redirects you to techrepublic.com site to read the newspapers. There are totally four whitepapers link listed out of which two whitepapers are unavailable in techrepublic.<br /><br />There is one section called "Usefulsites" where they list some sites related to hacking and web designing. We can add our sites to that list for that we need to send mail to webmaster@hackingalert.com. There are no rules or restrictions specified there for adding our sites. I saw only five sites listed over there, so I think they are adding the link only if it satisfies their conditions.<br /><br />This site is monetized well by Adsense, Amazon and other affiliate networks. I'm not sure about their earnings but the adsense ad placement is good especially the text link ad below the header logo. It looks like normal site menu. Visit this site if you want to know some general information about hacking. I'm sure you will get some basic knowledge on hacking.<br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script><br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-73585164349993924292009-07-11T08:36:00.000-07:002009-07-11T08:46:24.810-07:00Insecure<div style="text-align: justify;">Information Gathering is the first process when you try to hack(ethically or unethically) your target network or server and it includes port scanning. One of the best port scanning tools everyone recommends is NMAP. This is an awesome tool and I personally use this tool. It was developed by Fyodor and it's a free tool. You can download it from <a href="http://insecure.org/" target="_blank">insecure.org</a>.<br /><br />If you want to learn and master this tool, insecure.org is the only place I suggest. All details like reference guide, installation guide, books and documents for NMAP are available here. That's why I recommend this site. This tool is available in command line as well as in Graphical. Always go for command line tool because you cannot completely utilize the features if you use graphical tool.<br /><br />There are only few sites which maintains the database of hacking tools, Insecure is one among them. Here you can find Top 100 network security tools(2006 survey). Fyodor asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. The tools mentioned here are mostly attacking tools rather than defensive ones.<br /><br /><a href="http://seclists.org/" target="_blank">Security mailing list</a> is available here and it covers more topics. The below given are the mailing list details:<br /><br /><span style="font-weight: bold;">Nmap Hackers</span> -- Moderated list for announcements, patches, and light discussion regarding the Nmap Security Scanner and related projects.<br /><br /><span style="font-weight: bold;">Nmap Development</span> -- Unmoderated technical development forum for debating ideas, patches, and suggestions regarding proposed changes to Nmap and related projects.<br /><br /><span style="font-weight: bold;">Bugtraq</span> -- The premier general security mailing list. Vulnerabilities are often announced here first, so check frequently!<br /><br /><span style="font-weight: bold;">Full Disclosure</span> -- An unmoderated high-traffic forum for disclosure of security information. Fresh vulnerabilities sometimes hit this list many hours before they pass through the Bugtraq moderation queue. The relaxed atmosphere of this quirky listprovides some comic relief and certain industry gossip. Unfortunately 80% of the posts are worthless drivel, so finding the gems takes patience.<br /><br /><span style="font-weight: bold;">Security Basics</span> -- A high-volume list which permits people to ask "stupid questions" without being derided as "n00bs". I recommend this list to network security newbies, but be sure to read Bugtraq and other lists as well.<br /><br /><span style="font-weight: bold;">Penetration Testing</span> -- While this list is intended for "professionals", participants frequenly disclose techniques and strategies that would be useful to anyone with a practical interest in security and network auditing.<br /><br /><span style="font-weight: bold;">Info Security News</span> -- Carries news items (generally from mainstream sources) that relate to security.<br /><br /><span style="font-weight: bold;">Firewall Wizards</span> -- Tips and tricks for firewall administrators<br /><br /><span style="font-weight: bold;">Incidents</span> -- Lightly moderated list for discussing actual security incidents (unexplained probes, breakins, etc). Topics include information about new rootkits, backdoors, trojans, virus and worms.<br /><br /><span style="font-weight: bold;">Vulnerability Development </span>-- A moderated list for discussing possible security issues and devising exploits for them.<br /><br /><span style="font-weight: bold;">IDS Focus</span> -- Technical discussion about Intrusion Detection Systems. You can also read the archives of a previous IDS list<br /><br /><span style="font-weight: bold;">Web App Security</span> -- Provides insights on the unique challenges which make web applications notoriously hard to secure.<br /><br /><span style="font-weight: bold;">Daily Dave</span> -- This technical discussion list covers vulnerability research, exploit development, and security events/gossip. It was started by ImmunitySec founder Dave Aitel and many security luminaries particpate. Many posts simply advertise Immunity products, but you can't really fault Dave for being self-promotional on a list named DailyDave.<br /><br /><span style="font-weight: bold;">Honeypots</span> -- Discussions about tracking attackers by setting up decoy honeypots or entire honeynet networks.<br /><br /><span style="font-weight: bold;">MS Sec Notification</span> -- Beware that MS often uses these security bulletins as marketing propaganda to downplay serious vulnerabilities in their products -- note how most have a prominent and often-misleading "mitigating factors" section.<br /><br /><span style="font-weight: bold;">Politech</span> -- Journalist Declan McCullagh's list of news updates relating to politics and technology<br /><br /><span style="font-weight: bold;">The RISKS Forum</span> -- Peter G. Neumann moderates this regular digest of current events which demonstrate risks to the public in computers and related systems. Security risks are often discussed.<br /><br /><br /><br />Another important section here is <a href="http://insecure.org/fyodor/" target="_blank">http://insecure.org/fyodor/</a> . It's all about Fyodor. We need to thank this guy for giving this great tool free of cost. The reason why i mentioned this as important is the books authored and co-authored by Fyodor. Have a look and purchase these books. There is a book called "NMAP Network Scanning", official guide to NMAP written byFyodor. It is simply great and very informative.</div><br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-70630169357501979342009-07-07T08:30:00.000-07:002009-07-07T08:48:55.914-07:00OWASP<div style="text-align: justify;">The Open Web Application Security Project(OWASP) is a non-profit open community focused on<br />improving the application software security. Everyone is free to participate in OWASP and all materials available free of cost. This is a best place for learning Application Security.<br /><br />If you want stay up-to-date with current application security information, always check this site. They have a moderated news feed which gathers application security related news from various source. To subscribe to the news simply copy this <a href="http://www.google.com/reader/public/atom/user/16712724397688793161/state/com.google/broadcast" target="_blank">link</a> into your news reader. there is a list of sites available <a href="https://www.owasp.org/index.php/Feed" target="_blank">here</a> from where OWASP gathers the news.<br /><br />OWASP Project is the best place if you want to show your skills and to help others. Everyone<br />is allowed to start or contribute for a project. Some of the projects which I found here is:1. OWASP AntiSamy Java Project- an API for validating rich HTML/CSS input from users without<br />exposure to cross-site scripting and phishing attacks 2. OWASP Enterprise Security API(ESAPI) Project - a free and open collection of all the security methods that a developer needs to build a secure web application and many more.<br /><br />As I said earlier all the documents and tools available here are free to download. You can<br />download your favorite project's tools and documents. <a href="http://sourceforge.net/projects/owasp/files/" target="_blank">here is the link</a> for OWASP software<br />and documentation repository. Depending upon the projects you choose you will redirected to other third pary servers for download.<br /><br />The OWASP AppSec conference series is dedicated to bringing together industry, government,<br />and security researchers and practitioners to discuss the state of the art in application security. Conference schedule details are available in the site. Check the schedule and take part in the conference.<br /><br />A collection of good videos and books are also available for free download. I really like the design and layout of the site. It look like a clone of Wikipedia.<br /><br /></div><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-3919141641757091702009-06-27T18:40:00.000-07:002009-07-02T09:29:17.646-07:00Darkc0de<div style="text-align: justify;">Darkc0de is another best place for beginners to learn hacking. This site has almost everything related to hacking. They have useful papers and tutorials. Just read those those articles and I'm sure you will like it. Site is frequently updated with many useful codes mostly perl/python codes. These codes are harmful in nature. All the papers, articles and codes are available in the homepage itself.<br /><br />One of the unique features of this site is offering multiple databases and services. The below given are the services and databases they offer.<br /><br /><span style="font-weight: bold;">md5 database</span> - It's an online hash cracker. It searches seven sites and cracked list to crack the hash provided. Cracked hashes are available for download in text format.<br /><br /><span style="font-weight: bold;">Mysql database</span> - It's an online mysql database hash cracker.Currently searches one site to crack the hash. Cracked hashes are available for download in text format.<br /><br /><span style="font-weight: bold;">Proxies</span> - They have a good proxy list. it is in the format Proxy | Port | Type | Country. Most of them are anonymous proxies.<br /><br /><span style="font-weight: bold;">Database Dump</span> - This tools extracts md5's and email addresses from a sql dump file. You need to enter url of DB file.<br /><br /><span style="font-weight: bold;">Encoder/Decoder</span> - This application encodes and decodes ASCII and ANSI text. You can encode a text to binary, hex, base64, dec/char and MD5/checksum. Similiarly decoding is also possible.<br /><br /><span style="font-weight: bold;">Password Generator</span> - It Generates random passwords. You can specify the password length and number of password required.<br /><br /><span style="font-weight: bold;">Tiny url</span> - It's a URL shortening service.<br /><br /><span style="font-weight: bold;">Link Extractor</span> - Enter a url and it will show you the links it have to other pages or sites<br /><br /><span style="font-weight: bold;">Host Lookup </span>- Enter an IP address to find details about that host<br /><br /><span style="font-weight: bold;">Sql Cheat sheets</span> - Have useful commands for the following all DB language<br /><br /><span style="font-weight: bold;">Rot13 En/Decoder</span> - ROT13 replaces each letter by its partner 13 characters further along the alphabet.<br /><br /><span style="font-weight: bold;">Port Check</span> - You can check whether a pariticular port in a server is open or not<br /><br /><span style="font-weight: bold;">Speed Test</span> - A tool from http://www.speedtest.net to check the connection speed<br /><br /><span style="font-weight: bold;">Linux Toolbox</span> - A collection of useful Linux commands with description<br /><br /><span style="font-weight: bold;">proxy Test</span> - Checks your proxy connection settings<br /><br /><span style="font-weight: bold;">Port Lookup</span> - It gives details about a particular port.. It searches for services, trojans and worms which uses that port<br /><br /><span style="font-weight: bold;">md5 Generator</span> - Generates md5 hashes based on the input<br /><br /><br />They too have forums and it is very active. It covers many topics right from basic to advance topics. Registration required to use the forum. Darkc0de.com email address (yourname@darkc0de.com) is available for a price of $10. This site welcomes advertisers and the payment is $1 for 1 day and $5 for 7 days. You can even advertise through Adbrite. They have a store where they sell Stickers, Keyboard Stickers, Hardware and Books.<br /><br /></div><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-38476618642660748592009-06-27T18:35:00.000-07:002009-07-02T09:29:40.063-07:00Milw0rm<div style="text-align: justify;">Milw0rm is a famous exploit database site. We need to thank /str0ke for maintaining a great site like this. There are so manyexploit database site are there but this is my favorite one because it is very active and frequently updated.<br /><br />You can even find many zero day exploits here and users are allowed to submit exploits. Finding exploits for a particular software or OS is easy here because of the search option and the categorized exploit database. They have the following exploit category:<br /><br />1. Highlighted Exploits<br /><br />2. Remote Exploits<br /><br />3. Local Exploits<br /><br />4. Web Application Exploits<br /><br />5. DOS/POC Exploits<br /><br /><br /><br />There is a plugin available <a href="https://addons.mozilla.org/en-US/firefox/addon/11374" target="_blank">here</a> for Mozilla Firefox which lets you search on milw0rm exploit database. They also have shellcodes for various platforms. Just like other Hacking websites they also offer articles about hacking covering various topics. It's very hard to find hacking related Video stuffs in web but this site offers many videos which are very helpful.<br /><br />Another great feature offered is MD5/LM cracker. You can submit your MD5 and LM hashes to crack. Cracked hashes are also available for free download. Addtional features are available for donated users and you can donate any amount. This site have links to many sites. I checked those links and all are hacking related sites.<br /><br /></div><br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-63824221322632412692009-06-23T19:01:00.000-07:002009-09-17T06:58:10.100-07:00List of Hacking WebsitesThe below given is the list of best hacking and security related websites. This list will be updated frequently so bookmark this site<br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script><br /><br /><div style="text-align: left;">Hell Bound Hackers <a href="http://hacking-websites.blogspot.com/2009/06/test.html" target="_blank">Site review</a> | <a href="http://hellboundhackers.org/" target="_blank">Visit site</a><br />Security Focus <a href="http://hacking-websites.blogspot.com/2009/06/security-focus.html" target="_blank">Site review</a> | <a href="http://www.securityfocus.com/" target="_blank">Visit site</a><br />Progenic <a href="http://hacking-websites.blogspot.com/2009/06/progenic.html" target="_blank">Site review</a> | <a href="http://www.progenic.com/" target="_blank">Visit site</a><br />Hack This Site <a href="http://hacking-websites.blogspot.com/2009/06/hack-this-site.html" target="_blank">Site review</a> | <a href="http://www.hackthissite.org/" target="_blank">Visit site</a><br />Dark Reading <a href="http://hacking-websites.blogspot.com/2009/06/dark-reading.html" target="_blank">Site review</a> | <a href="http://www.darkreading.com/" target="_blank">Visit site</a><br />Darkc0de <a href="http://hacking-websites.blogspot.com/2009/06/darkc0de.html" target="_blank">Site review</a> | <a href="http://www.darkc0de.com/" target="_blank">Visit site</a><br />Milw0rm <a href="http://hacking-websites.blogspot.com/2009/06/milw0rm.html" target="_blank">Site review</a> | <a href="http://milw0rm.org/" target="_blank">Visit site</a><br /></div>OWASP <a href="http://hacking-websites.blogspot.com/2009/07/owasp.html" target="_blank">Site review</a> | <a href="http://www.owasp.org/" target="_blank">Visit site</a><br />Insecure <a href="http://hacking-websites.blogspot.com/2009/07/insecure.html" target="_blank">Site review</a> | <a href="http://insecure.org/" target="_blank">Visit site</a><br />HackingAlert <a href="http://hacking-websites.blogspot.com/2009/07/hackingalert.html" target="_blank">Site review</a> | <a href="http://www.hackingalert.com/" target="_blank">Visit site</a><br />IHS <a href="http://hacking-websites.blogspot.com/2009/07/johnnyihackstuff.html" target="_blank">Site review</a> | <a href="http://johnny.ihackstuff.com/" target="_blank">Visit site</a><br />SecurityTube <a href="http://hacking-websites.blogspot.com/2009/07/securitytube.html" target="_blank">Site review</a> | <a href="http://www.securitytube.net/" target="_blank">Visit site</a><br />Plain-Text <a href="http://hacking-websites.blogspot.com/2009/07/plain-text.html" target="_blank">Site review</a> | <a href="http://www.plain-text.info/" target="_blank">Visit site</a><br />Windows Security <a href="http://hacking-websites.blogspot.com/2009/07/windows-security.html" target="_blank">Site review</a> | <a href="http://www.blogger.com/www.windowsecurity.com/" target="_blank">Visit site</a><br />Remote-Exploit <a href="http://hacking-websites.blogspot.com/2009/08/remoteexploit.html" target="_blank">Site review</a> | <a href="http://www.remote-exploit.org/" target="_blank">Visit site</a><br />Nmap-Online <a href="http://hacking-websites.blogspot.com/2009/09/nmap-online.html" target="_blank">Site review</a> | <a href="http://nmap-online.com/" target="_blank">Visit site</a><br />Hacker Target <a href="http://hacking-websites.blogspot.com/2009/09/hackertarget.html" target="_blank">Site review</a> | <a href="http://hackertarget.com/" target="_blank">Visit site</a><br /><br /><br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-6761022716832273909.post-19781604656578974992009-06-22T08:22:00.000-07:002009-07-02T09:30:16.321-07:00Dark Reading<div style="text-align: justify;">Dark Reading is one of the best sites which provide news portal that focus on IT security. it was launched in May 2006. Since they mainly focus on Security news, they categorized the news as follows: Attacks/breaches, Vulnerabilities, Application Security, Client Security, Perimeter Security, Security Management, Encryption, Network Access Control and Anti virus.Here you can find most up-to-date information about Security.<br /><br />This site offers free White papers and Reports about Security. You are allowed to download these directly from the site. I have downloaded and read some white papers. They are very informative and useful. They also offer Newsletter Subscription where you can subscribe for daily or weekly newsletter. We can also receive newsletters on a mobile device.<br /><br />The main page have another section called "Bugs" where they list some enterprise vulnerabilities. They don't accept any articles but we are allowed to post comments on articles. You need to register there for a free account to post comments and to participate in discussion.<br /><br />They have links to the best security content from all across the web. I found many Ad banners as well as text link Ads in this site. There is no traffic details mentioned in their site. I hope this site is receiving a huge traffic and you can check the same in Alexa.com. I recommend you to advertise in this site if you want to promote your Security related websites, products and services.<br /></div><br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-90091344759674018642009-06-15T04:21:00.000-07:002009-07-02T09:30:31.805-07:00Hack This Site<div style="text-align: justify;">Hack This Site is the best alternative for HBH. I don't find any major difference between these two sites. They look almost similar to each other in services and content they offer. Just like HBH this site is also a best place to learn hacking. They serve over 5,000+ unique visitors per day and over 2.5 million page views per month. Yet another best place to advertise your hacking and security realted site, product and services.<br /><br />This site have hacking challenges section where you can test your hacking skills. The following challenges are available:<br /><br /></div><ul style="text-align: justify;"><li> Basic missions</li><li> Realistic missions</li><li> Application missions</li><li> Programming missions</li><li> Logic missions</li><li> Extbasic missions</li><li> Javascript missions</li><li> Stego missions</li><li> Irc missions</li></ul><div style="text-align: justify;">They have news section where they talk about their site updates and articles section where you can find useful articles on various topics. you can even search and submit articles. All the articles have popularity rank. They do give lectures but they use their IRC server for that and members are allowed to give lectures on their favorite topics. I recommend you to read their guidelines for lecture.<br /><br />If you have any tool/program or if you own any useful site you can submit them to this site. They will list it in the Useful Stuff section after review. There are many useful stuff available so have a look. One interesting thing I noticed here is their store where they sell some products like T-shirts, Wall clock, Coffee mug. All items have HTS logo and I'm really impressed with the design.<br /><br />HTS Forum is very active and it is pretty big also. Just like HBH, they cover various topics and most of the threads are very active. I always recommend newbies to join hacking forums because there you can learn a lot by interacting with many skilled hackers.<br /><br /><span style="font-size:130%;">Visit <a href="http://www.hackthissite.org/" target="_blank">Hack This Site</a></span><br /><br /><br /><br /></div><br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-10640324269856968852009-06-14T04:17:00.000-07:002009-07-02T09:30:52.455-07:00Progenic<div style="text-align: justify;"><br /><br /><br />I hope everybody is aware of this site. Progenic is very simple yet informative site. They mainly focus on hacking tools. They have a Forum, News section, Releases ( a thread in the forum) and Top 100(Voting system).<br /><br />Progenic Forum is very small but the main thing in this forum is release section where members sumbit their tools. Once the tool is approved they list the tool along with tool developer's webpage url in the home page. If you are good in developing hacking tools submit your tool here and I'm sure you will get more visitors to your site. Also there are some good codings available in coding section.<br /><br />Their news section is not much special. Members use it mostly to advertise their site and I don't find any informative news overthere. Progenic is very popular among hacking communities, this could be one of the reason. If your website is a hacking, security, programming, technology or any computer related website you can submit it to Progenic. To submit you need to register and your site will be listed once it is reviewed by them.<br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script><br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-83620998460845431962009-06-13T06:56:00.000-07:002009-06-14T07:08:23.722-07:00Advertise Here<div style="text-align: justify;">This blog is pretty new and it is receiving 30 unique visitors per day. I'm currently working on building traffic. I'm sure this blog will attract more visitors after few months once I have enough content.<br /><br />There are totally four 125x125 banner ads available. I'm not gonna sell this ad spot instead I would like to exchange banners. I prefer only banners so if you are interested please contact me at vinoth2vinoth@gmail.com<br /><br />I even accept blogger and wordpress blogs but your site should be related to hacking, security and computer related stuff.<br /><br /></div>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-6761022716832273909.post-30053578571879817612009-06-13T06:27:00.000-07:002009-07-02T09:31:24.352-07:00Security FocusSecurity Focus is the perfect website to find any kinds of information and articles related to computer security issues. They provide comprehensive security information to all members of the security community. I visit this site most often to read current security and hacking related news.<br /><br />As per the update from Security Focus. There are 18 million page views a month and 2.5 million unique users annually visiting this site. This clearly shows that this site is the preferred information source for security professionals around the world. Just type "security" in Google, This site comes in the top ten list.<br /><br />I must say that this site is a heaven for people like me because of the valuable content it offers. There are many articles available which covers various topics like Penetration-Testing, Firewalls, Microsoft, Unix, Intrusion Detection (IDS), Virus and Incident Handling. They have a separate section called "columnist" where they offer knowledgeable issues that affect all members of the security community.<br /><br />They have a huge Vulnerability Database which provides up-to-date information on vulnerabilities for all platforms and services. You can even search for vulnerabilities by using the CVE (Common Vulnerabilities and Exposures) number. Subscribe to the Vulnerability Database RSS feed to get the instant updates.<br /><br />I'm currently subscribed to their mailing list. There are currently 31 mailing lists which allow members of the security community from around the world to discuss all manner of security issues. Please don't use your personal mail instead use a separate mail id for this mailing list. Also don't choose all the categories. Choose the one which best suites your interests.<br /><br />My favourite section in this site is "Jobs". It's not like normal Job Websites. What makes this site unique is they only list Job openings which is related to Security. If you are looking for any Security related job post your Resume here. Also Employers can browse resumes to hire someone for their Job. You have to register before posting resume.<br /><br />Do you have any Security related tool developed by you? you can submit your tool to Security Focus. They even accept your tools even if they are in Beta stage. I found many useful tools here. You can download the tools but this site will redirect you to the developers site to download the tool.<br /><br /><span style="font-weight: bold;font-size:130%;" >Visit</span><span style="font-size:130%;"> <a href="http://www.securityfocus.com/" target="_blank">Security Focus</a></span><br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6761022716832273909.post-15735338751190498062009-06-10T03:20:00.000-07:002009-07-02T09:31:40.851-07:00Hell Bound Hackers<div style="text-align: justify;">Well this is my first post and I'm gonna review one of my favorite site HBH(Hell Bound Hackers). This is a good site with tons of useful stuffs preloaded. This is the best place for learning real hacking. I said real hacking, yes you have heard the right thing. If you are a newbie this is a right place for you to start. They have a news section in the home page where you can get current hacking and security related information.<br /><br />This site currently have 42010+ members and the count is increasing day-by-day. You need to register here to get access to all features. They also offer Exclusive Membership for just £1.00 GBP per month. I really recommend you to get a Exclusive Membership there which unlocks some juicy features.<br /><br />They offer two service, Penetration Testing and Website Development. Its really worth trying their service since they are experts. If you are writing any article or conducting a Radio show about hacking and security, don't hesitate to contact them. They may help you free of cost but you need to mention their website in your article or radio show.<br /><br />If you are conducting any IT training or security class HBH offers trainers to conduct training sessions. Contact mr_cheese@hellboundhackers.org for more information. They offer a good advertising opportunity. This site is receiving 4,000-5,000 unique visitora/day and 30,000 page views every day. You can advertise your site or product here. They do offer cpanel to monitor your advertising campaign.<br /><br />As I said earlier, This site have lots of useful stuffs to learn. They provide articles, lessons and codes. They have forum as well as IRC which covers wide variety of topics. From my experience, HBH members are very helpful.All what you have to do is post your queries in right place and you will get a response soon. There are some good useful videos under HBH Podcasts. Don't miss it !<br /><br />The best part of this site is "Hacking Challenges". I really like this part just because they are very hard to complete and you have to think a lot. The below given are the challenges:<br /><br />HellBoundHackers Exploit:<br /><br />* Basic Web Hacking<br />* Application Cracking<br />* Javascript Hacking<br />* Realistic Challenges<br />* Rooting Challenges<br />* Flash Challenges<br />* Pen-Testing Challenges<br /><br />HellBoundHackers Programming:<br /><br />* Timed Challenges<br /><br />HellBoundHackers Think:<br /><br />* Encryption<br />* Logical<br />* Stegano<br /><br />HellBoundHackers Track:<br /><br />* Tracking<br /><br />HellBoundHackers Patch:<br /><br />* Web Patching<br />* App Patching<br /><br />HellBoundHackers Other:<br /><br />* Other Challenges<br />* S. Engineering<br /><br /><span style="font-weight: bold;font-size:130%;" >Visit</span><span style="font-size:130%;"> <a href="http://hellboundhackers.org/" target="_blank">Hell Bound Hackers</a></span><br /><br /><br /><br /><br /><input value="PawZPWuZ67lGwN5vbCFP1g==" name="OBKey" type="hidden"><script language="JavaScript">var OB_platformType =1;var OB_demoMode = false;var OB_langJS = "http://widgets.outbrain.com/lang_en.js";var OBITm = "1244728295109";</script><script src="http://widgets.outbrain.com/OutbrainRater.js" type="text/javascript"> </script><script type="text/javascript">var OBCTm=1244728295109; </script><script src="http://widgets.outbrain.com/claim.js"> </script><br /><br /><br /><strong></strong></div><br /><br /><script src="http://w.sharethis.com/button/sharethis.js#publisher=f882293a-6bf5-4412-8c3a-aee08e373617&type=website" type="text/javascript"></script>Unknownnoreply@blogger.com47