Skip to main content

Great tutorials on praticing security

[ Hack This Site] 

Is a free, safe and legal training ground for hackers to test and expand their hacking skills. More than just another hacker wargames site, it's a living, breathing community with many active projects in development, with a vast selection of hacking articles and a huge forum where users can discuss hacking, network security, and just about everything. Tune in to the hacker underground and get involved with the project.

This site has the following missions
  • Basic missions
  • Realistic missions
  • Application missions
  • Programming missions
  • Extbasic missions
  • Javascript missions
  • Stego missions
  • IRC missions
http://www.hackthissite.org/

Pros
  • a safe way to practice your knowledge

Cons
  • Must be online in order to use this
  • Must create an user account. 

--------------------------------------------------------------------------------------

[  OWASP ]

The Open Web Application Security Project (OWASP) is a not-for-profit worldwide charitable organization focused on improving the security of application software. Our mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.

OWASP WebGoat Project

An online training environment for hands-on learning about application security. WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use SQL injection to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code

http://code.google.com/p/webgoat/downloads/list - Here's the link to download the application.

When downloading the webgoat click on the "WebGoat-OWASP_Standard-5.3_RC1.7z" like seen in the screenshot below.


Pros
  • It's free
  • Can be download for for offline use
Cons
  • None

Comments

Popular posts from this blog

Learning Linux

Learning linux from the ground up is really a challenge. As you progress even more you start customizing your OS from how it starts and how it shutdown. As soon as you start on a Live CD your x server is pretty much either gnome or KDE. I mean it looks easy to do, but as soon as you start research how the x server it can get trick. My recommendation is to also learn the bash line or command prompt. if your good with the line commands then reconfiguring your computer shouldn't be a problem, but you just learn the GUI layer of it and not the line commands believe me your going to have hard time restoring your computer. As I ask people around they say linux is hard to install. The easiest way to partition your drive manually is like this. sda1 /home -- This is where you want to store all your data in case your linux gets corrupted. This space can be as big as you want sda2 /swap -- Linux is just like windows it needs it virtual space. The swap size depends on your physical ram.

DTS OS Enterprise

Well here are screen-shots of the OS images that I am making. The Desktop Environment is KDE The web browser is Firefox with a simple theme in place. Overall DTS OS Enterprise has two versions and it was made for especially for the acer aspire one netbooks. The OS should work with other computers since it is Linux. Some of the network icons are going to replace with custom icons.    Different Edition s Network Security Restoration Edition  File name: DTS-NS.iso File size: 200 - 300 MB The release date is going to be sometime in the late spring 2010.

Netwars Competition

The NetWars game is a collection of computer and network security challenges. It is designed to represent real-world security issues: their flaws and their resolutions. Each player can follow an independent path based on individual problem solving skills, technical skills, aptitude, and creativity. The game is played in a fun but safe environment using the technology that drives our lives every day. The game starts when a player downloads and starts a CD-ROM image on a PC or in a virtual environment such as VMware Player. The image contains a brief tutorial and the game's full instructions. The player must find a hidden key within the image that is downloaded and then uses that key to enter an online environment where knowledge of security vulnerabilities and their exploits can be turned into points. Upcoming Competitions   June 18-20, 2010 PST September 17-19, 2010 November 5-7, 2010 December 17-19, 2010 April 29 - May 1, 2011 Click Here to read more