877.791.9571 |

About the Author:

Jay Turla is a security consultant. He is interested in Linux, OpenVMS, penetration testing, tools development and vulnerability assessment. He is one of the goons of ROOTCON (Philippine Hackers Conference). You can follow his tweets @shipcod3.
smartphones-sized

Handy Devices Revolution: Handy Pentesting & Hacking Part 1

A few weeks ago, I wrote an article entitled ‘Transforming your Android Phone into a Network Pentesting Device’ which is obviously about turning your Android phone into a very […]

android phone

Transforming your Android Phone into a Network Pentesting Device

Lester: Hey Nash, are you scanning our school’s network with just your smartphone?

Nash: Well, yes I am! I’m using a network penetration suite just to check out if the […]

A-Computer-Eye

Free & Open Source Rootkit and Malware Detection Tools

A lot of sniffers, rootkits, botnets, backdoor shells and malwares are still on the wild today, which are used by malicious attackers after successfully pawning a certain server or […]

raffy_1286488041_0

Interview: Raffael Marty

For today’s hot seat we have Mr. Raffael Marty but before starting up with the interview questions, I would like to thank him who agreed to be interviewed. It […]

how-to-survive

Surviving a Hacker Conference and an Infosec Gathering 101

A few days ago, I attended (and maybe trolled) a hacker conference called ROOTCON in Cebu City, Philippines at Cebu Parklane Hotel. To be honest, this is my second […]

DextersLaboratoryWallpaper1024

Noobz Guide for Setting Up a Vulnerable Lab for Pentesting

Most of the people I know who are new to penetration testing want to hone and enhance their skills, but they have problems like:

They don’t have a target that […]

net_monitor

Using Log4Trail

A few weeks ago, I happened to read an article from pir8geek.com (a blog about Linux goodies and tips) about a new tool which is very useful to system […]

widescreen_tux_linux_desktop_wallpaper

New Linux Distro for Mobile Security, Malware Analysis, and Forensics

,

Yes, you read the title right and I hope I just grabbed your attention! A new GNU/Linux distribution or distro designed for helping you in every aspect of your […]

mug

Make Way for the Sizzling ROOTCON 6 – Hacker Conference

Information security and hacking conferences or gatherings are awesome events where you can hang out with cool people, a good environment where you can listen to topics related to […]

routerbot-v3

Simple Router Pawning Techniques – Getting the Administrative Privileges

 Securing the Access Point (AP) of your router’s web page and the Telnet or SSH access should be considered as part of the overall security strategy not only in […]

292633_416924018328437_1076129714_n

Interview with Joshua Arvin Lat

Interview with Joshua Arvin Lat: the Kaspersky International Cup 2012 and Kaspersky Asia Pacific & MEA Cup 2012 winner

For today’s hot seat we have Joshua Arvin Lat and his […]

bigstockphoto_Internet_Security_98254

Analysis on pBot – a PHP IRC Bot that has Malicious Functions

For IRC enthusiasts like me, it’s just common to encounter IRC bots in underground channels that have integrated functions like port scanning, nmap, SQL Injection Scanners, Remote File Inclusion […]

Windows-Command-Prompt

Command Execution

Command injection or also known as Remote Code Execution in terms of web exploitation, can be possible to a certain website accepts added strings of characters or arguments; the […]

backdoor

Checking Out Backdoor Shells

A backdoor shell can be a PHP, ASP, JSP, etc. piece of code which can be uploaded on a site to gain or retain access and some privileges on […]

chinaphil

Understanding the Origins of the China – Philippine Cyber War

For many years, there has been a territorial dispute between China and Philippines over the Scarborough Shoal (Philippine Term: Panatag Shoal) or Huangyan Island (Chinese Term) and the Spratlys […]