Found this on Google search...tested few sites ..... working and good.
Test you skills online, hack the site , vulnerable sites, Live hacking.. etc :)
Offline :
OWASP Webgoat
Foundstone Hackme Series
Hackme Bank
Hackme Travel
Hackme Casino
Hackme Books
WebMaven
SecuriBench
You can download VmWare Images of old vulnerable known CMSs, or just download them from repositories...
Web Application Security Check List
Web Application Security Check List
Web Application Security Check List is a documentation project of OWASP Turkey. It provides 61 security controls that need to be integrated within web applications. It targets mainly auditors but is helpful for application developers, IT-architects, project managers, system administrators and database administrators as well. The security controls...
Posted on Tuesday, July 24, 2012
Security Cheat Sheets
Security Cheat Sheets
Hi friends, I found below post "complete set of cheat sheets" @ one place(http://blog.securitymonks.com/2009/08/15/whats-in-your-folder-security-cheat-sheets/)
I appreciate idea of have all cheat sheets @ once place.. full credit to author/blog owner( above link).
TitleSourceDescription
SQL Injection Cheat SheetMichael DawReference
Linux Security Quick Reference...
Posted on Tuesday, July 24, 2012
Nmap - Windows - CMD- Scan- Options - Example
Nmap
Nmap is network exploration tool and port scanner. It was created by Fyodor and can be downloaded from www.insecure.org free of charge. I have always had issues with the Win32 port of Nmap so I have only used it from Linux. Nmap is available for most Linux distributions.
A few things to be aware of when using Nmap is it will ping the target before it scans to see if it is up. If...
Posted on Friday, July 20, 2012
Port Scanning - what is-
What is Port Scanning?
Port scanning is where a port or a range of ports are scanned
to find out I they are open or closed and what service or program is listening
on that port.
I should also point out that port scanning can cause the
devices to crash or may have other unintentional effects. a service may hang or
become unresponsive or a printer may print out garbage. So always get
permission,...
Posted on Friday, July 20, 2012
How does Google index?
How does Google
index?
To feed the Google index base, robots, called "bots" on pages regularly patrol the Internet looking for new links, enabling them to discover new pages will be added to the Google index.
In addition, Google also provides a database archive, called "cache". When a website is inaccessible, for example, or a page has been deleted from a website, you...
Posted on Friday, July 20, 2012
Utility to remove OS/process locks on files while copying, renaming or deleting
Utility to remove OS/process locks on files while copying,
renaming or deleting
LockHunter is a foolproof file unlocker
It is a free tool to delete files blocked by something you do not know.
LockHunter is useful for fighting against malware, and other programs that are
blocking files without a reason. Unlike other similar tools it deletes files
into the recycle bin so you may restore...
Posted on Thursday, July 19, 2012
Bulk Rename Utility - Windows-Freewaree

Bulk Rename Utility
Introduction
Bulk Rename Utility is a free file renaming software for Windows. Bulk Rename Utilityallows you to easily rename files and entire folders based upon extremely flexible criteria.
Add date/time stamps, replace numbers, insert text, convert case, add auto-numbers, process folders and...
Posted on Thursday, July 19, 2012
Subscribe to:
Posts (Atom)