877.791.9571 |

About the Author:

Interference Security is a freelance information security researcher. Experience gained by learning, practicing and reporting bugs to application vendors. CEH certified but believes in practical knowledge and out of the box thinking rather than collecting certificates. Always open to learning more to enhance his knowledge. Information security is a hobby rather a job for him. Builds tools to automate testing and make things easier.
ICMP-ReverseShell11042014

ICMP Reverse Shell

What are shells?

Shell can simply be described as a piece of code or program which can be used to gain code or command execution on a device (like servers, […]

owasp_feature

OWASP Practice: Learn and Play from Scratch

OWASP Practice is a virtual environment to help people who want to begin their journey into web application security. Lots of material including videos are available on the Internet, […]

XSS12122013

Deadly Consequences of XSS

Cross-site scripting (XSS) is a very popular term, not just among web application security guys, but also among developers, where popping an alert box with a message in it […]

VulnVPN12042013

Learning How To Pen Test VPNs with VulnVPN

VulnVPN has been created by the author of http://www.rebootuser.com/ and I must say that it is a very good effort. The goal is to gain root access to a […]

brainpan

Brainpan

Brainpan is a vulnerable virtual machine created by superkojiman. It’s a vulnerable virtual machine with vulnerable services and it’s not intended for production use. It’s designed to gain root […]

Port Scanning using Scapy

TCP connect scan

TCP connect is a three-way handshake between the client and the server. If the three-way handshake takes place, then communication has been established.

A client trying to connect […]

What Is Scapy?

Scapy is a Python interpreter that enables you to create, forge, or decode packets on the network, to capture packets and analyze them, to dissect the packets, etc. It […]

BodgeIt10032013

The BodgeIt Store Part 2

Before we go any further, I would like to focus on how a developer thinks and likes to manage a web application development process.

During the development phase of any […]

BodgeIt10032013

The BodgeIt Store Part 1

The BodgeIt Store

The BodgeIt Store created by Psiinon is a vulnerable web application. It consists of a wide variety of vulnerabilities and is NOT intended to be hosted on […]