All Machine CTF

DARPA Cyber Grand Challenge http://cybergrandchallenge.com/

Read More

Meet ‘Tox’: Ransomware for the Rest of Us – McAfee

Similar to other threats, ransomware has now appeared in an easy-to-deploy cybercrime kit. The malware is called Tox, and it’s free. Link

Read More

Moose – the router worm with an appetite for social networks

A new worm dubbed Moose is infecting routers to commit social networking fraud, hijacking victims’ internet connections to “like” posts, “view” videos and “follow” others....

Read More

Web Security Dojo 2.0 – Self-Contained Web Hacking Training – Darknet – The Darkside

http://www.darknet.org.uk/2015/05/web-security-dojo-2-0-self-contained-web-hacking-training/

Read More

What one may find in robots.txt

During the reconnaissance stage of a web application testing, the tester (or attacker) usually uses a list of known subdirectories to brute force the server and find hidden resources. For that purpose, a list of known subdirectories is used such as the one provided with Skipfish or wfuzz. If any extra context information is available, it may be added to the list. Most importantly, once a test is concluded (or command execution has...

Read More
Read More