Saturday, December 01, 2012

Sulit.com.ph hacking incident

Around 15:00 while upgrading the ROOTCON systems one of the ROOTCON Goons reported that there was a hacking incident on Sulit (an online buy and sell portal http://www.sulit.com.ph) the incident was claimed by ROOTCON.ORG and ANONYMOUS. The Sulit website was replaced by the homepage...
Read More

Tuesday, July 17, 2012

RC6 Ticket Sale

Early Registration for ROOTCON 6 ended yesterday July 16, 2012 at exactly 12 midnight. Regular rate registration is now open until August 17, 2012, since we want you to come!!! we are still giving away discounts get our group of 5 package and get 10% off. What are you waiting for...
Read More

Saturday, July 14, 2012

The Secrecy (New Game)

This year we introduce to you "The Secrecy" is composed of 10 levels, each levels has a secret / hidden phrase or word that you need to find for the players to proceed to the next levels. Let the cracking begin!!! Game Mechanics  The objective of this game is to reach the top-most...
Read More

Monday, June 11, 2012

ROOTCON 6 SpeedTalks

At ROOTCON we value everyone....CON-Goers, Sponsors and Partners. This year we are giving away our sponsors the opportunity to talk about what they do, this year we introduced "SpeedTalks". SpeedTalks is available to all major participating sponsors for ROOTCON 6. The mechanics is...
Read More

Sunday, June 10, 2012

Checking out BackTrack Linux 5r2-PenTesting Edition Lab!

What's a BackTrack Linux 5r2-PenTesting Edition Lab? What's with the edition thingy? Isn't BackTrack 5 a pentesting distro already? Why make a pentesting edition? Maybe these are some of the questions you have in your mind after reading the title and because of that, I would like...
Read More

Monday, June 04, 2012

8 Hacking and Information Security Magazines You Might Wanna Read

As a programming student, security researcher and a blogger; I always keep up to date about what is happening in cyber space by reading infosec articles and magazines. Magazines I usually read have niches or themes like Information Security, Cyber Warfare, Cyber Espionage, Penetration...
Read More

Thursday, May 31, 2012

ROOTCON 6 Call For Papers Now Close

ROOTCON 6 Call For Papers is now close, we would like to thanks everyone who submitted. For those who were not accepted you can still enjoy the fun at ROOTCON by registering, socialize, network, learn and have fun. Pre-final tracks can be found here Get to know our ub3r4w3s()me...
Read More

Sunday, May 20, 2012

New CFP Submission

New CFP submission has landed our Inbox. Topic Details Presentation Title: Randomized/Obfuscated Text Detection Synopsis: Recent malwares have been using obfuscation techniques to hide its code from Antivirus software. Making use of emulation is very effective but would...
Read More

Early Registration Closing Soon!!!!

Our 2 months run for the early registration will be closing this coming June 30, 2012. If you haven't registered yet, register now to get big discounts!!!  Visit the registration page now!...
Read More

Wednesday, May 16, 2012

May 2012 issue of ClubHack Magazine is out now!

ClubHack Magazine's May 2012 issue has just been released yesterday guys and thanks to the Chmag Team for giving us free monthly issues! Topics: 0x01 - Steganography over converted channels (Tech Gyan)0x02 - Kauntilya (Tool Gyan)0x03 - Section 66C - Punishment for identity theft...
Read More

Tuesday, May 15, 2012

Hackxor - Web App Hacking Game

Are you a gamer and at the same time a penetration testing enthusiast in web applications? Well then, you might wanna try whacking out 'hackxor'! Hackxor is a web application hacking game where players must locate and exploit vulnerabilities to progress through the story...
Read More

Thursday, April 26, 2012

Simple Kung Fu Grep for Finding Common Web Vulnerabilities & Backdoor Shells

Grep is a powerful command-line tool in Unix and Linux used for searching and probing data sets for lines that matches a regular expression. As a short history, this utility was coded by Ken Thompson on March 3, 1973 for Unix. Here is a sample or common usage of the...
Read More

Saturday, April 14, 2012

ClubHack Magazine April 2012 Issue Released!

India's 1st Hacking Magazine which is ClubHack or CHmag has just released their April 2012 Issue. CHmag happens to be our media partner and that CHMag is one of the hacking/infosec magazines I'm currently following because of the good contents from various authors  and for this...
Read More

Thursday, April 12, 2012

Tunneling the Applications you launched on your Terminal with Tsocks

With some of the applications that don't have proxy configurations or settings, how can we add anonymity to our information gathering, scanning, exploiting phases, etc. like nmapping, using theharvester to gather emails, and many more? It's bad leaving your footprints and logs right? Well...
Read More

Sunday, April 08, 2012

ROOTCON Easter Egg Solution

The ROOTCON Easter Egg Hunt is over, the hunt was pretty simple and straight forward, you just need to know some of the basic arsenal in your day to day hacking escapade. The Solution: Easter Egg #1 = The image show Master Yoda speaking the very familiar line "May the source be with...
Read More

Saturday, April 07, 2012

ROOTCON Easter Egg Hunt

Here we go, ROOTCON Easter Egg Hunt. Instructions (Read Carefully) 1. Search for each word contained on each egg 2. Gather all words found on each egg 3. Combine all words into one 4. Send your code to registration [at] rootcon d0t org 5. You are entitled for a 50% discount...
Read More

Dumping Like a Boss - sqlmap 101

SQLmap is one of the most common used tools for web application penetration testing because it is open source and automates an sql injection attacks which also allows you to spawn a shell. It has full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access,...
Read More