shadowbroker

shadowbroker They published several leaks of some of the National Security Agency (NSA) hacking tools including zero-day exploits Specifically, exploits and vulnerabilities targeting enterprise firewalls, anti-virus products and Microsoft products, tied to the Equation Group threat actor, NSA’s Tailored Access

Read more

Vulnerability information

The following is a list of online repositories: Repository name Website URL Offensive Security’s Exploit Database https://www.exploit-db.com/ Common Vulnerabilities & Exposures (CVE) https://cve.mitre.org/ BugtraqSecurityFocus http://www.securityfocus.com OSVDB Vulnerabilities http://osvdb.org Packet Storm http://www.packetstormsecurity.org National Vulnerability Database http://nvd.nist.gov IBM ISS X-Force https://exchange.xforce.ibmcloud.com/ US-CERT

Read more

APT SANS

The six step incident handling process is appropriate for all forms of incidents, including Advanced Persistent Threat (APT) style attackers.  The APT is characteristically well funded teams of workers who are tasked with ex-filtrating intellectual property from targeted organizations.  The

Read more

Vulnerable Apps from Security Vendors to Practice

Acunetix                   http://testasp.vulnweb.com/ Acunetix                   http://testaspnet.vulnweb.com/ Acunetix                   http://testphp.vulnweb.com/ Cenzic crackmebank        http://crackme.cenzic.com HP freebank             http://zero.webappsecurity.com IBM altoromutual   http://demo.testfire.net/ Mavituna                  http://aspnet.testsparker.com Mavituna                  http://php.testsparker.com NTOSpider                http://www.webscantest.com/

Read more

More Website to Practice your Hacking Skills

Embedded Security CTF https://microcorruption.com EnigmaGroup http://www.enigmagroup.org/ Escape http://escape.alf.nu/ Google Gruyere http://google-gruyere.appspot.com/ Gh0st Lab http://www.gh0st.net/ Hack This Site http://www.hackthissite.org/ HackThis http://www.hackthis.co.uk/ HackQuest http://www.hackquest.com/ Hack.me https://hack.me Hacking-Lab https://www.hacking-lab.com Hacker Challenge http://www.dareyourmind.net/ Hacker Test http://www.hackertest.net/ hACME Game http://www.hacmegame.org/ Halls Of Valhalla http://halls-of-valhalla.org/beta/challenges Hax.Tor

Read more

SAST vs DAST

Static Application Security Testing (SAST) – SAST solutions such as Source Code Analysis (SCA) have the flexibility needed to perform in all types of SDLC methodologies.   SAST solutions can be integrated directly into the development environment. This enables the

Read more

Pin It on Pinterest