877.791.9571 |

About the Author:

Jay Turla is a security consultant. He is interested in Linux, OpenVMS, penetration testing, tools development and vulnerability assessment. He is one of the goons of ROOTCON (Philippine Hackers Conference). You can follow his tweets @shipcod3.

How to Enjoy a Hacker Conference and an InfoSec Gathering

Two years ago I wrote a basic and a straightforward guide here in Infosec Institute Resources on how to survive a hacker conference or convention and an information security […]


Top Links of Tools Compilation for Pentesting, Forensics, Security, and Hacking

Are you still looking for a suite of tools that may complete your day-to-day activities, or are you just looking for new tools that you can try or play […]


Some Cool DIY Raspberry Pi Projects

Hey, it’s me again! I’m back for another article about my favorite mini-computer; the Raspberry Pi. This time I’ll be demonstrating some cool DIY projects that I found on […]


Handy Devices Revolution: Another Set of Embedded Devices and Dev Boards

My OUYA has finally arrived and I have had some fun tinkering with it, but we will not be talking about OUYA today. In this article, we will continue […]


Glastopf Pi: A Simple Yet Cool Web Honeypot for your Raspberry Pi

Now let’s have another cool setup for your Raspberry Pi! If you are a follower of my recent articles, you will notice that I am really into consoles, handy […]


Getting to Know Kosova Hacker’s Security Crew plus an Exclusive Interview with Th3 Dir3ctorY

As a security researcher and an information security enthusiast, I am always intrigued by underground hacker groups and that’s why I do some research about them. In this article, […]


pWeb Suite – A Set of Web Pentesting Tools

pWeb Suite (formerly known as pCrack Suite) is a set of Perl-based penetration testing tools primarily focused on web application security and vulnerability testing. This tool is brought to […]


Pentesting Distributions and Installer Kits for your Raspberry Pi

Raspberry Pi for pwning and penetration testing? Of course! Why not? As an introduction, Raspberry Pi is an ARM GNU / Linux box or a credit card size mini […]


Panoptic – Common Log and Config Files Retriever through LFI Vulnerability

Local File Inclusion or LFI is a kind of web exploit or vulnerability that allows an attacker to inject directory-traversal characters on a certain website. An example is when […]

Dax Labrador a.k.a semprix

InfoSec Institute Interview: Dax Labrador a.k.a semprix, founder of ROOTCON

For today’s interview, we have a FreeBSD contributor and the founding director of the largest and most awesome hacker conference in the Philippines, ROOTCON! Guys meet Dax Labrador a.k.a […]


InfoSec Institute Interview: Douglas Berdeaux, founder of WeakNet Laboratories

For today’s hot seat in the Infosec Institute interview series, we have a known wireless security geek: none other than Douglas Berdeaux, a.k.a Trevelyn. He is the founder of […]


SQLNuke – Simple but Fast MySQL Injection load_file() Fuzzer

In SQL (Structured Query Language) Injection, there are many kinds of techniques that are partnered with UNION SELECT statements like LOAD_FILE(), INTO OUTFILE(), INFORMATION_SCHEMA, Char(), CAST(), and LIMIT. Most […]


Interview with RaT, the High Council President of SOLDIERX

Last January, I wrote an article about the SOLDIERX Hacker Database entitled Welcome to the World’s Largest Public Hacker Database which was about some of HDB’s hacker or security […]


Basic Updated Guide to Recon-ng plus New Modules Rundown

The Recon-ng Framework has undergone some major updates that has improved its functionality and its usage,as well as new modules that were added to the framework. Thanks to Tim […]


Awesome Modules of Recon-ng Used for Web Recon Testing

In my previous article, I wrote an introduction to the Recon-ng Framework and its basic usage, which is primarily used for automatic information gathering and web reconnaissance. In this […]


The Recon-ng Framework : Automated Information Gathering

The Metasploit Framework Project and the Social Engineer Toolkit (SET) are two great and known frameworks used by penetration testers and security researchers for automation wherein the former is […]


Handy Devices Revolution: Watch Out for Hackable Gaming Consoles

I have always been a video game console fan and enjoy playing RPG (role-playing games) and “Hack and Slash” games (cheers to God of War and Darksiders) with my […]


Welcome to the World’s Largest Public Hacker Database

As a security researcher and information security enthusiast, I have always been interested with OSINT (Open Source Intelligence), and the profiles and biographies of white hats, black hats and […]


Handy Devices Revolution: Handy Pentesting and Hacking Part III

And now is the time for the third article of the Handy Devices Revolution series! In the second article we talked about Arduino and Power Pwn; this time we […]


Handy Devices Revolution : Handy Pentesting and Hacking Part II

Hello guys, this is my second article about Handy Devices Revolution: Handy Pentesting and Hacking. The first article can be found here: http://resources.infosecinstitute.com/handy-devices-hacking-part-1/
In this article, we will be focusing […]