background preloader

Icebreak

Facebook Twitter

amin

CEH -LPT -CISSP -CHFI

The Temporary Autonomous Zone. PHILOWEB 2010 » Programme de PhiloWeb 2010 (version française) The Philosophy of Anonymous. I. Basic Principles of Anonymous Anonymous has received fairly bad publicity in the past. Although it is not that we care, in fact all the negativity that surrounds us actually made us stronger, in other words, we can turn just about anything into comedy. Take the first Faux News investigation on us for example. For such a short segment that clearly described us as domestic terrorists, about 30 things mentioned in that report ended up becoming memes. Anonymous is not a gang of hackers on steroids. But why do we go picking on other websites for our own enjoyment? II. Historically, Anonymous' targets have had one or more of the following properties: 1.

Consider the Church of Scientology. 1. They pursue frivolous "copyright infringement" claims to ridiculous lengths, trying to remove and all data that does not present the Church of Scientology in a positive light. Lisa McPherson was just one of dozens of known and countless unknown victims who were killed by the Church of Scientology. III. The Python Challenge. Tim Wilson's Python Programming Tips. FakeNameGenerator. Infinity Exists. The Tangled Web: A Guide to Securing Modern Web Applications (9781593273880): Michal Zalewski. The Web Application Hacker's Handbook. This book is a practical guide to finding and exploiting security flaws in web applications.

Highlights include: Comprehensive and deep coverage of all kinds of attacks.Practical focus that spells out the detailed steps involved in detecting and exploiting each kind of vulnerability.Numerous real-world examples, screen shots and code extracts.Online labs where you can play with most of the book examples, on a subscription basis.Advanced techniques including how to disassemble client-side components, automate custom attacks, and find vulnerabilities in source code.A detailed, proven methodology for performing an end-to-end attack. Book details Title: The Web Application Hacker's Handbook: Finding and Exploiting Security FlawsAuthors: Dafydd Stuttard & Marcus PintoPages: 912Published: September 2011, Wiley.ISBN: 1118026470 / 978-1118026472 From the back cover to the second edition:

Hacking Conference - Capture the Flag Archive. This page is devoted to collecting accounts, walk throughs and other resources of Capture the Flag at DEF CON over the years, not only for history's sake but so the uninformed can better grasp the epic journey that teams must face on the road to CTF victory! If you know of a resource that should be included on this page, feel free to pass it along to neil ]at[ defcon [dot] org. DEF CON 21 Capture the Flag Pcaps, Binaries and Tools Binaries and Tools: Torrent Friday Packet Captures: Torrent Saturday Packet Captures: Coming Soon! Sunday Packet Captures: Coming Soon! DEF CON 21 Capture the Flag Write-ups CNBC Article - Cyberteams duke it out in the World Series of LegitBS Blog - Final Writeup: LegitBS Blog - Public Handout: Routards Team Blog - Defcon 21 CTF: DEF CON 21 Quals Write-ups pwnables.

Hacking Conference - Capture the Flag Archive. NULL Life. Index of / The Hacker Games « Thoughts on Security. Welcome, welcome! The time has come to select one courageous young hacker for the honor of representing District 12 in the 74th annual Hacker Games! And congratulations, for you have been selected as tribute! Hacking games and CTF’s are a lot of fun; who doesn’t like pitting your skills against the gamemakers and having a free pass to break into things? But watch out, as you will find out, some games are more dangerous than others.

I have talked about counterattacks here before, and this system has implemented a number of aggressive anti-hacker measures. In fact, this VM is downright evil. To save precious bandwidth, this has been implemented in a minimal tinycore-based VM, and will require VirtualBox to run. Unfortunately, I didn’t have the time to add nearly all the things I wanted to, so there are really just a few challenges, a couple of counterhacks, and about 10 memes to conquer. No sponsors are necessary, so don’t light yourself on fire. May the odds be ever in your favor! Infosec stuff: CAPTURE THE FLAG CHALLENGE. HackIM 2012 - Delhi. Positive Hack Days. CTF. Gameplay Analysis. CTF Quals, registration has started! Hackers from All Over the World Competed to Join PHDays IV CTF PHDays CTF Quals, an information security competition, took place from 12 p.m. on January 25 to 12 p.m. on January 27, with teams competing for the entire 48 hours.

Dragon Sector, a Polish team, won the contest, though quite unexpectedly, PPP, from the USA, took second place and More Smoked Leet Chicken, from Russia, came in third. The Challenge The hands-on experience of Positive Technologies’ experts in detecting security issues is used as a basis for the tasks. However, solving tasks typical of such competitions is not enough to win PHDays CTF. The Atmosphere In contrast to other information security conferences, at PHDays the CTF participants are central figures of the event and their battle becomes a key happening along with presentations by leading security experts.

What others say "If you’ve seen CTF anywhere else, normally it is just a bunch of names on a scoreboard. Drunk Admin Web Hacking Challenge | Anestis Bechtsoudis. Recently I conducted a few keynote talks on the WeBaCoo tool and some web backdoor shell implementation techniques. As a great supporter of practical learning, I designed a relative web hacking challenge that was given to the events attendees after the end of the talk part. The challenge focuses on techniques and methodologies discussed during the talks and implements a slightly restricted web server setup serving a vulnerable image hosting service. Download The challenge was served on a Debian vmware image which is available for download on the following link: Download Challenge (539MB) – md5sum:edf9bcd28049ed85312510d5872ea463Download mirror from boot2root Configuration The network is configured to obtain an IP address via DHCP by default.

Mission The challenge includes an image hosting web service that has various design vulnerabilities. FINAL GOAL: Reveal the hidden message for a date arrange that Bob sent to Alice. Work Flow Appendix A. Stripe: Capture the Flag. CSAW CTF 2012. Positive Hack Days. CTF.