Interference Security

Interference Security is a freelance information security researcher. Experience gained by learning, practicing and reporting bugs to application vendors. CEH certified but believes in practical knowledge and out of the box thinking rather than collecting certificates. Always open to learning more to enhance his knowledge. Information security is a hobby rather a job for him. Builds tools to automate testing and make things easier.
Interference Security

ICMP reverse shell

What are shells? Shell can simply be described as a piece of code or program which can be used to gain code or command execution on a device (like servers

Post-Exploitation Using Veil-Pillage

Veil-Pillage is a part of the Veil-Framework which comes handy when performing post-exploitation. It consists of a number of modules which can be used to per

PowerShell toolkit: PowerSploit

PowerSploit is a collection of PowerShell scripts which can prove to be very useful during some exploitation and mostly post-exploitation phases of a penetra

OWASP Practice: Learn and Play from Scratch

OWASP Practice is a virtual environment to help people who want to begin their journey into web application security. Lots of material including videos are a

Deadly Consequences of XSS

Cross-site scripting (XSS) is a very popular term, not just among web application security guys, but also among developers, where popping an alert box with a

Learning how to pentest VPNs with VulnVPN

VulnVPN has been created by the author of http://www.rebootuser.com/ and I must say that it is a very good effort. The goal is to gain root access to a VPN s

Brainpan

Brainpan is a vulnerable virtual machine created by superkojiman. It's a vulnerable virtual machine with vulnerable services and it's not intended for produc

Port scanning using Scapy

TCP connect scan TCP connect is a three-way handshake between the client and the server. If the three-way handshake takes place, then communication has be

What Is Scapy?

Scapy is a Python interpreter that enables you to create, forge, or decode packets on the network, to capture packets and analyze them, to dissect the packet

The BodgeIt store part two

Before we go any further, I would like to focus on how a developer thinks and likes to manage a web application development process. During the developmen

The BodgeIt store part one

The Bodgelt store The BodgeIt Store created by Psiinon is a vulnerable web application. It consists of a wide variety of vulnerabilities and is NOT intend