background preloader

Hackergames.net

Hackergames.net

HellBound Hackers 2600: The Hacker Quarterly Thisislegal.com Top 5 Ways to Hack into Your Web Application (and how to close those security loopholes!) Are you familiar with white hat hacking? If you aren’t, you should be. White hat hacking is a planned attack that checks your systems for vulnerabilities. After the hacker successfully (and harmlessly) compromises your environment, they tell you what to do to fix it. Even though most security loopholes are well-documented, I’m surprised how many open exploits are in applications that we security scan here at INetU. So stand by for a little White Hat Hacking 101, where I’ll teach you how to hack into your own site. Hack One: Injection Attacks I’ll start with injection exploits because most IT professionals, even though they have cursory basic understanding of the dangers, leave too many sites open to the vulnerability, according to the Open Web Applications Security Project (OWASP). Find a page on your application that accepts user-supplied information to access a database: A login form, signup form, or “forgot password” form is a good start. Hack Two: PHP Remote File Includes

Troy Hartman | Aerial Stuntman Vote Now! Top Ten Web Hacking Techniques of 2011 Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we’re talking about actual new and creative methods of Web-based attack. How the winners were selected… Phase 1: Open community voting (Ballot) [COMPLETE] From of the field of 51 total entries received listed below, each voter (open to everyone) ranks their fifteen favorite Web Hacking Techniques using a survey. (they’ll be deleted) Voting will close at the end of the day this Monday, February 20. [CLOSED] The more people who vote, the better the results! Phase 2: Panel of Security Experts [COMPLETE] Voting will close at the end of the day on Sunday, February 26. Soon after the winners will be announced! Good luck everyone

HellBound Hackers Draw As A Maniac

Related: