Saturday, December 01, 2012
Sulit.com.ph hacking incident
Posted by
ROOTCON
at
1.12.12
Labels:
filipino hackers,
hacker conference,
rootcon,
rootcon philippines

Around 15:00 while upgrading the ROOTCON systems one of the ROOTCON Goons reported that there was a hacking incident on Sulit (an online buy and sell portal http://www.sulit.com.ph) the incident was claimed by ROOTCON.ORG and ANONYMOUS.
The Sulit website was replaced by the homepage...
Tuesday, July 17, 2012
RC6 Ticket Sale
Posted by
Semprix (The Dark Meister)
at
17.7.12
Labels:
hacker conference,
hackers,
rootcon,
rootcon philippines

Early Registration for ROOTCON 6 ended yesterday July 16, 2012 at exactly 12 midnight.
Regular rate registration is now open until August 17, 2012, since we want you to come!!! we are still giving away discounts get our group of 5 package and get 10% off.
What are you waiting for...
Saturday, July 14, 2012
The Secrecy (New Game)
Posted by
Semprix (The Dark Meister)
at
14.7.12
Labels:
filipino hackers,
hacker challlenge,
hacker conference,
hackers,
rootcon,
rootcon philippines

This year we introduce to you "The Secrecy" is composed of 10 levels, each levels has a secret / hidden phrase or word that you need to find for the players to proceed to the next levels.
Let the cracking begin!!!
Game Mechanics
The objective of this game is to reach the top-most...
Monday, June 11, 2012
ROOTCON 6 SpeedTalks
Posted by
Semprix (The Dark Meister)
at
11.6.12
Labels:
conference,
hacker conference,
hackers,
rootcon,
rootcon philippines

At ROOTCON we value everyone....CON-Goers, Sponsors and Partners. This year we are giving away our sponsors the opportunity to talk about what they do, this year we introduced "SpeedTalks". SpeedTalks is available to all major participating sponsors for ROOTCON 6.
The mechanics is...
Sunday, June 10, 2012
Checking out BackTrack Linux 5r2-PenTesting Edition Lab!
Posted by
Shipcode
at
10.6.12
Labels:
BackTrack 5,
DMZ network,
hosts,
network infrastructure,
PenTest Laboratory,
pentesting edition,
pre-configured firewall,
tools,
virtual penetration testing lab

What's a BackTrack Linux 5r2-PenTesting Edition Lab? What's with the edition thingy? Isn't BackTrack 5 a pentesting distro already? Why make a pentesting edition?
Maybe these are some of the questions you have in your mind after reading the title and because of that, I would like...
Monday, June 04, 2012
8 Hacking and Information Security Magazines You Might Wanna Read
Posted by
Shipcode
at
4.6.12
Labels:
(IN)SECURE,
2600,
Clubhack,
cplt,
ezines,
Hacker Monthly,
hakin9,
infosec magazines,
PenTest Laboratory,
pentestmag,
phrack

As a programming student, security researcher and a blogger; I always keep up to date about what is happening in cyber space by reading infosec articles and magazines. Magazines I usually read have niches or themes like Information Security, Cyber Warfare, Cyber Espionage, Penetration...
Thursday, May 31, 2012
ROOTCON 6 Call For Papers Now Close
Posted by
ROOTCON
at
31.5.12
Labels:
filipino hackers,
hacker conference,
hackers,
rootcon,
rootcon philippines

ROOTCON 6 Call For Papers is now close, we would like to thanks everyone who submitted. For those who were not accepted you can still enjoy the fun at ROOTCON by registering, socialize, network, learn and have fun.
Pre-final tracks can be found here
Get to know our ub3r4w3s()me...
Sunday, May 20, 2012
New CFP Submission

New CFP submission has landed our Inbox.
Topic Details
Presentation Title: Randomized/Obfuscated Text Detection
Synopsis: Recent malwares have been using obfuscation
techniques to hide its code from Antivirus software. Making use of emulation is
very effective but would...
Early Registration Closing Soon!!!!

Our 2 months run for the early registration will be closing this coming June 30, 2012. If you haven't registered yet, register now to get big discounts!!!
Visit the registration page now!...
Wednesday, May 16, 2012
May 2012 issue of ClubHack Magazine is out now!
Posted by
Shipcode
at
16.5.12
Labels:
articles,
CHmag,
clubhack magazine,
code gyan,
feedback,
HTTPS,
Hyper Text,
identity theft,
injection,
Kauntilya,
Steganography,
suggestions,
toolkit

ClubHack Magazine's May 2012 issue has just been released yesterday guys and thanks to the Chmag Team for giving us free monthly issues!
Topics:
0x01 - Steganography over converted channels (Tech Gyan)0x02 - Kauntilya (Tool Gyan)0x03 - Section 66C - Punishment for identity theft...
Tuesday, May 15, 2012
Hackxor - Web App Hacking Game
Posted by
Shipcode
at
15.5.12
Labels:
blackhat hacker,
Cross Site Request Forgery,
Hackxor,
learning,
RCE,
references,
web app hacking,
webapp

Are you a gamer and at the same time a penetration testing enthusiast in web applications?
Well then, you might wanna try whacking out 'hackxor'! Hackxor is a web application hacking game where players must locate and exploit vulnerabilities to progress through the story...
Thursday, April 26, 2012
Simple Kung Fu Grep for Finding Common Web Vulnerabilities & Backdoor Shells
Posted by
Shipcode
at
26.4.12
Labels:
backdoor shells,
base64_decode,
botnets,
command injection,
command-line,
eval,
grep,
kung fu,
lfi,
pBot,
shell_exec,
terminal emulator,
udpflood,
vulnerabilities

Grep is a powerful command-line tool in Unix and Linux used for searching and probing data sets for lines that matches a regular expression. As a short history, this utility was coded by Ken Thompson on March 3, 1973 for Unix.
Here is a sample or common usage of the...
Saturday, April 14, 2012
ClubHack Magazine April 2012 Issue Released!
Posted by
Shipcode
at
14.4.12
Labels:
april 2012,
CHmag,
Clubhack,
hacking,
India,
magazine,
tech gyan,
XSS

India's 1st Hacking Magazine which is ClubHack or CHmag has just released their April 2012 Issue. CHmag happens to be our media partner and that CHMag is one of the hacking/infosec magazines I'm currently following because of the good contents from various authors and for this...
Thursday, April 12, 2012
Tunneling the Applications you launched on your Terminal with Tsocks

With some of the applications that don't have proxy configurations or settings, how can we add anonymity to our information gathering, scanning, exploiting phases, etc. like nmapping, using theharvester to gather emails, and many more? It's bad leaving your footprints and logs right?
Well...
Sunday, April 08, 2012
ROOTCON Easter Egg Solution
The ROOTCON Easter Egg Hunt is over, the hunt was pretty simple and straight forward, you just need to know some of the basic arsenal in your day to day hacking escapade.
The Solution:
Easter Egg #1 = The image show Master Yoda speaking the very familiar line "May the source be with...
Saturday, April 07, 2012
ROOTCON Easter Egg Hunt
Posted by
Semprix (The Dark Meister)
at
7.4.12
Labels:
easter,
easter egg,
rootcon,
rootcon philippines

Here we go, ROOTCON Easter Egg Hunt.
Instructions (Read Carefully)
1. Search for each word contained on each egg
2. Gather all words found on each egg
3. Combine all words into one
4. Send your code to registration [at] rootcon d0t org
5. You are entitled for a 50% discount...
Dumping Like a Boss - sqlmap 101
Posted by
Shipcode
at
7.4.12
Labels:
accounts,
credit_cards,
database takeover,
dumping in sqlmap,
SQL Injection,
sqlmap tutorial,
tools 101

SQLmap is one of the most common used tools for web application penetration testing because it is open source and automates an sql injection attacks which also allows you to spawn a shell. It has full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access,...
Subscribe to:
Posts (Atom)
Subscribe to:
Posts (Atom)