Sunday, April 20, 2014 Login · Register
 

    Challenge Activity
09:05:01 - daerosjax
     - Completed forensics [5]
09:03:31 - rahmadkur1
     - Completed recon [3]
08:51:12 - skyambros
     - Completed basic [1]
08:40:54 - daerosjax
     - Completed js [1]
08:37:10 - chogia
     - Completed recon [3]
08:28:24 - chogia
     - Completed recon [2]
08:23:13 - chogia
     - Completed recon [1]
05:59:37 - Br41nD34d
     - Completed js [7]
05:50:40 - Br41nD34d
     - Completed js [5]
05:44:58 - Br41nD34d
     - Completed js [4]
05:41:41 - Br41nD34d
     - Completed js [3]
05:40:45 - Br41nD34d
     - Completed js [2]
04:31:11 - venkat
     - Completed real [1]
02:01:24 - staticx
     - Completed recon [1]
12:42:32 - venkat
     - Completed basic [11]
11:58:52 - t4r4t3ux
     - Completed basic [14]
11:33:05 - t4r4t3ux
     - Completed basic [13]
10:30:02 - t4r4t3ux
     - Completed basic [12]
08:23:57 - Null_Net
     - Completed basic [8]
08:15:45 - Null_Net
     - Completed basic [7]
 

    Scoreboard Top 20
UserPoints
★ -4brixe-6565   
★ algol6565   
★ alucardo6565   
★ b82a6565   
★ barragan6565   
★ dloser6565   
★ FannY6565   
★ Fawful6565   
★ iamthehacker6565   
★ letm6565   
★ Mawekl6565   
★ MERRON6565   
★ MnX13376565   
★ Profetul6565   
★ silence986565   
★ spacemo06565   
★ tehron6565   
★ thefinder6565   
★ tibbi6565   
★ wiser6565   
 

    Login
Username

Password


Remember Me

Not a member yet?
Click here to register.

Forgotten your password?
Request a new one here.

 

    Users Online
  • · Members on IRC: 53   
  • · Total Members: 14,510
  • · Newest Member: skyambros
  •  

     

     

     

        Top 10 Forum Posters
    UserPosts
    bluechill1411   
    madf0x1277   
    cruizrisner1057   
    Qwexotic1034   
    Null Set869   
    auditorsec603   
    Override602   
    godofcereal599   
    TurboBorland585   
    Teddy469   
     

        Affiliates




  • iExploit


  • iExploit


  • WeChall





  • Thisislegal.com

  •  

        Related Ads
     

    Professional Download System
         

    John the Ripper's Usage Examples
    from Override 06/06/2013 14:53:20
    Downloads: 1651
    Comments: 0

    These examples are to give you some tips on what John's features can be
    used for. Some of them may not be obvious, I'm sorry if others are, but
    anyway, I just got tired of answering questions.

    DOS attack tool / Network stress tesing
    from shadowbroker 01/15/2013 20:42:40
    Downloads: 2035
    Comments: 2
    DOS attacking tool / network stress tester

    HTTP Response Splitting, Web Cache Poisoning Attacks, and Related Topics
    from kaidranzer 09/12/2011 11:33:51
    Downloads: 1054
    Comments: 1
    Covers HTTP Response Spliiting which enables web cache poisoning, cross user defacement, hijacking pages, XSS, etc.

    SQL INJECTION
    from polemarchos 09/01/2011 15:43:26
    Downloads: 2715
    Comments: 0
    SQL INJECTION

    A Serious Newbies Guide to the Underground V2
    from mls577 08/09/2011 20:14:40
    Downloads: 4670
    Comments: 6
    A Guide for Newbies that are just starting out. This is a continuance of ratdance's old paper. This paper gives a lot of information on a broad range of subjects such as: history and theory behind hacking, wireless attacks, cryptography, OS's, OSI model, tcp/ip, protocols, et al. For more information go ahead and take a look for youself.

    Unix Tutorials
    from shadow 03/28/2011 02:07:32
    Downloads: 2314
    Comments: 0
    C00L collection of related tutorials of unix for people who want to start learning from scratch

    Google Captcha Wordlist
    from l0gan_l135 11/23/2010 23:46:27
    Downloads: 14221
    Comments: 1
    Complete Wordlist for Google's Captcha

    Madf0x's Common Password List
    from madf0x 09/07/2010 03:44:07
    Downloads: 4202
    Comments: 8
    A simple common password list, derived from passwords that appear 100+ times out of the rockyou 32 million passwords list, generated via a series of sed scripts, awk, sort, and uniq. Twas unexpectedly fun in creating Smile enjoy!

    XSS ATTACKS
    from cruizrisner 08/29/2010 10:06:38
    Downloads: 5960
    Comments: 2
    become xss expert

    Hide Program
    from CrashOverron 06/20/2010 20:49:27
    Downloads: 2142
    Comments: 8
    hide/unhide windows exe+source

    Directory Traversal Fundamentals
    from x2600 05/11/2010 23:02:42
    Downloads: 3770
    Comments: 7
    A Directory Traversal attack is a type of computer security exploit that involves the use of characters designed to induce a “traverse to parent directory” within a web server, to gain access to files or directories that would otherwise be restricted. The access granted by a Directory Traversal vulnerability may include any combination of the following basic permissions: Read, Write, Execute, and Delete.

    Cross Site Scripting Fundamentals
    from x2600 05/11/2010 23:00:00
    Downloads: 2873
    Comments: 2
    Cross site scripting, commonly known by its acronym, XSS, is a type of computer security vulnerability that involves the injection of code into web pages by means of web applications. During the execution of an XSS attack, information from one entity, whe

    hexadecimal converter
    from jakecrepinsek 05/04/2010 17:57:50
    Downloads: 637
    Comments: 0
    this is as the name says a hexadecimal converter programed in c++

    NetCat Cheat Sheet
    04/25/2010 18:47:52
    Downloads: 1506
    Comments: 3
    NetCat Cheat Sheet By Ed Skoudis
    This Cheat sheet provides various tips for using Netcat on both Linux and Unix.

    Host Discovery with Nmap
    04/24/2010 20:14:53
    Downloads: 1152
    Comments: 3
    Host Discovery with nmap By: Mark Wolfgang

    Secrets of top pen testers
    04/24/2010 20:04:39
    Downloads: 4364
    Comments: 0
    Secrets of American top pen testers By Ed Skoudis

    Cross Site Request Forgery (CSRF)
    from Override 04/24/2010 19:40:02
    Downloads: 1429
    Comments: 0
    Cross Site Request Forgery (CSRF)
    An introduction to a common web application weakness.

    Exploring Steganography: Seeing the Unseen
    from Override 04/24/2010 12:46:32
    Downloads: 1798
    Comments: 1
    Steganography is an ancient art of hiding information. Digital technology gives us new ways to apply steganographic techniques, including one of the most intriguing—that of hiding information in digital images.

    [video] user submitted video intro
    from Override 04/22/2010 09:45:19
    Downloads: 1307
    Comments: 0
    This is the video intro for user submitted videos.

    Hping2
    04/13/2010 12:42:40
    Downloads: 1026
    Comments: 1
    This handy little utility assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies. It was inspired by the ping command, but offers far more control over the probes sent. It also has a handy traceroute mode and supports IP fragme

    SDelete
    04/13/2010 12:28:10
    Downloads: 426
    Comments: 0
    Securely overwrite your sensitive files and cleanse your free space of previously deleted files using this DoD-compliant secure delete program.

    Process Explorer v12.01
    04/13/2010 12:16:46
    Downloads: 1212
    Comments: 1
    Ever wondered which program has a particular file or directory open? Now you can find out. Process Explorer shows you information about which handles and DLLs processes have opened or loaded.

    PsTools
    04/13/2010 12:12:21
    Downloads: 1243
    Comments: 2
    The Windows NT and Windows 2000 Resource Kits come with a number of command-line tools that help you administer your Windows NT/2K systems. Over time, I've grown a collection of similar tools, including some not included in the Resource Kits. What set

    TCPView for Windows
    04/13/2010 12:05:38
    Downloads: 814
    Comments: 0
    TCPView is a Windows program that will show you detailed listings of all TCP and UDP endpoints on your system, including the local and remote addresses and state of TCP connections. On Windows Server 2008, Vista, and XP, TCPView also reports the name of t

    Guide to XSS and Cookie Catchers
    04/06/2010 16:07:48
    Downloads: 1720
    Comments: 4
    This is a simple guide to finding XSS flaws and making cookie catchers.

    Google Secrets
    from ne011 03/22/2010 19:18:37
    Downloads: 10071
    Comments: 6
    Information which should be protected is very often publicly available, revealed by careless or ignorant users. The result is that lots of confidential data is freely available on the Internet , if we know how to find it .

    Art of Assembly language (High Level Assembler)
    from someoneigna 03/05/2010 13:35:59
    Downloads: 743
    Comments: 0
    A good and large manual about assembler programming. Has 1444 pagesShock.

    Vulnerable Web Environment
    from CrashOverron 03/04/2010 11:27:04
    Downloads: 13667
    Comments: 13
    Vulnerable website environment used in all of Crash Overron's videos

    keymail.c
    from Override 02/25/2010 00:01:02
    Downloads: 871
    Comments: 2
    A stealth (somewhat) key logger, writes to a log file then sends an email to whoever is set in the #define options at compile time.

    2D Game Engine
    from bluechill 02/23/2010 21:51:21
    Downloads: 214
    Comments: 0
    Game engine I made in Java for a course after the instructor got bored of me lecturing the class and him.

    Copyright © bluechill 2010-X (Where X is the Current Year)

    Tactical_Exploitation.pdf
    from Override 02/20/2010 10:23:53
    Downloads: 1429
    Comments: 1
    Penetration testing often focuses on individual vulnerabilities and services. This paper introduces a tactical approach that does not rely on exploiting known flaws. The first section of this paper covers information gathering and discovery techniques, wi

    Xss Tunnelling.pdf
    from ne011 02/19/2010 15:07:06
    Downloads: 696
    Comments: 0
    Tunnelling HTTP traffic through XSS Channels.

    Advanced_SQL_Injection
    from ne011 02/19/2010 15:00:34
    Downloads: 1397
    Comments: 1
    This document discusses in detail the common 'SQL injection' technique, as it applies to the popular Microsoft Internet Information Server/Active Server Pages/SQL Server platform. It discusses the various ways in which SQL can be 'injected'

    tcpip.pdf
    from Override 02/17/2010 10:04:51
    Downloads: 812
    Comments: 0
    TCP/IP and tcpdump
    Pocket Reference Guide

    ports.txt
    from Override 02/15/2010 18:30:58
    Downloads: 1607
    Comments: 0
    I list of almost all port numbers and the services related to them.

    user2sid and sid2user
    from Override 02/15/2010 18:15:42
    Downloads: 12443
    Comments: 0
    Two small utilities for Windows NT that allow you to query SAM and to find out a SID value for a given account name and vice versa.

    ARP Spoofing Information
    from LiquidFusi0n 02/15/2010 16:40:10
    Downloads: 496
    Comments: 0
    A nice little PDF to give you some information on ARP Spoofing,

    The Argon List
    from Override 02/15/2010 15:41:44
    Downloads: 2804
    Comments: 0
    This is version two of theargon.com's series of wordlists.

    xss.pdf
    from Override 02/15/2010 15:32:23
    Downloads: 6978
    Comments: 0
    XSS: Cross site scripting, detection and prevention
    A Scanit whitepaper on finding cross site scripting vulnerabilities, how to exploit them and how to protect your own web application.

    metasploit.pdf
    from Override 02/15/2010 15:25:46
    Downloads: 3350
    Comments: 2
    This chapter will show you how to use Metasploit, an exploit launching and development
    platform.

    Netcat-tutorial
    from ne011 02/15/2010 03:54:23
    Downloads: 921
    Comments: 3
    A simple Netcat tutorial.

    r57.php
    from ne011 02/15/2010 03:29:04
    Downloads: 803
    Comments: 1
    This r57 PHP shell provides the user to list files, run shell commands,download files from ftp server,upload files to remote ftp server,send email,send file to email,dump db table,run sql query.

    sql-inject.pdf
    from Override 02/14/2010 23:02:57
    Downloads: 1885
    Comments: 1
    The Uncommon SQL Injection white paper is, as promised by the title, virtually unlike any other SQL injection walk through on the web. This written lesson aims to not only provide a comprehensive reference, and to serve as a learning aid, but also to help

    Practical SQL Injection bit by bit.pdf
    from Override 02/14/2010 22:26:23
    Downloads: 1193
    Comments: 1
    Practical SQL Injection bit by bit.
    I hear you already thinking: yet another paper on SQL injection. In fact it is, but this time, the injection was a bit more tricky to exploit than usual. I though it deserved a short paper.

    Stack Overflow Exploitation Real Life Example.pdf
    from Override 02/14/2010 22:16:38
    Downloads: 1435
    Comments: 0
    Stack Overflow Exploitation Real Life Example.

    proxychains.txt
    from Override 02/14/2010 20:36:19
    Downloads: 821
    Comments: 1
    This is a tutorial on chaining proxies for the use of becoming more anonymous while online. There aren't enough tutorials online about this subject so I decided to make an attempt at writing one. Since it's on the subject, I included a section on

    John The Ripper
    from Qwexotic 02/14/2010 19:40:04
    Downloads: 1024
    Comments: 0
    a very good unix hash cracker

    NetCat.exe
    from Override 02/14/2010 13:52:38
    Downloads: 3163
    Comments: 2
    Netcat is a computer networking service for reading from and writing network connections using TCP or UDP. Netcat is designed to be a dependable “back-end” device that can be used candidly or easily driven by other programs and scripts.

    webadmin.php
    from Override 02/14/2010 13:24:12
    Downloads: 803
    Comments: 3
    webadmin.php is a simple Web-based file manager.

    Whois.exe
    from Override 02/14/2010 11:07:06
    Downloads: 917
    Comments: 2
    Whois command line application for windows.

    c99.php
    02/14/2010 09:58:33
    Downloads: 2669
    Comments: 1
    c99shell.php v.1.0 pre-release build #12