online (hacking challenge / practice / fun )

Found this on Google search...tested few sites ..... working and good. Test you skills online, hack the site , vulnerable sites, Live hacking.. etc :) Offline : OWASP Webgoat Foundstone Hackme Series Hackme Bank Hackme Travel Hackme Casino Hackme Books WebMaven SecuriBench You can download VmWare Images of old vulnerable known CMSs, or just download them from repositories...

Web Application Security Check List

Web Application Security Check List Web Application Security Check List is a documentation project of OWASP Turkey. It provides 61 security controls that need to be integrated within web applications. It targets mainly auditors but is helpful for application developers, IT-architects, project managers, system administrators and database administrators as well. The security controls...

Security Cheat Sheets

Security Cheat Sheets Hi friends, I found below post "complete set of cheat sheets" @ one place(http://blog.securitymonks.com/2009/08/15/whats-in-your-folder-security-cheat-sheets/) I appreciate idea of have all cheat sheets @ once place.. full credit to author/blog owner( above link). TitleSourceDescription SQL Injection Cheat SheetMichael DawReference Linux Security Quick Reference...

Nmap - Windows - CMD- Scan- Options - Example

Nmap Nmap is network exploration tool and port scanner. It was created by Fyodor and can be downloaded from www.insecure.org free of charge. I have always had issues with the Win32 port of Nmap so I have only used it from Linux. Nmap is available for most Linux distributions. A few things to be aware of when using Nmap is it will ping the target before it scans to see if it is up. If...

Port Scanning - what is-

What is Port Scanning? Port scanning is where a port or a range of ports are scanned to find out I they are open or closed and what service or program is listening on that port. I should also point out that port scanning can cause the devices to crash or may have other unintentional effects. a service may hang or become unresponsive or a printer may print out garbage. So always get permission,...

How does Google index?

How does Google index? To feed the Google index base, robots, called "bots" on pages regularly patrol the Internet looking for new links, enabling them to discover new pages will be added to the Google index. In addition, Google also provides a database archive, called "cache". When a website is inaccessible, for example, or a page has been deleted from a website, you...

Utility to remove OS/process locks on files while copying, renaming or deleting

Utility to remove OS/process locks on files while copying, renaming or deleting LockHunter is a foolproof file unlocker It is a free tool to delete files blocked by something you do not know. LockHunter is useful for fighting against malware, and other programs that are blocking files without a reason. Unlike other similar tools it deletes files into the recycle bin so you may restore...

Bulk Rename Utility - Windows-Freewaree

Bulk Rename Utility Introduction Bulk Rename Utility is a free file renaming software for Windows. Bulk Rename Utilityallows you to easily rename files and entire folders based upon extremely flexible criteria. Add date/time stamps, replace numbers, insert text, convert case, add auto-numbers, process folders and...