Java Vulnerable Lab – Learn to Hack and secure Java based Web Applications

We (Cyber Security and Privacy Foundation) have developed a vulnerable Java based Web Applicatoin . This app is intended for the Java Programmers and other people who wish to learn about Web application vulnerabilities and write secure code. The full course on Hacking and Securing Web Java Programs is available in Warning: Don’t run […]

Complete Cross site Scripting(XSS) cheat sheets : Part 1

We are producing this XSS Cheat sheet after collecting the codes from hackers’ techniques and different sites especially .  This is complete list of XSS cheat codes which will help you to test xss vulnerabilities ,useful for bypassing the filters.  If you have any different cheat codes , please send your code. Basic XSS […]

E Hacking News & PenTest Partnership announced!

We’re proud to announce that we’ve just partnered with PenTest Magazine! About PenTest Magazine: PenTest Magazine is a weekly downloadable IT security mag, devoted exclusively to penetration testing. It features articles by penetration testing specialists and enthusiasts, experts in vulnerability assessment and management. We cover all aspects of pen testing, from theory to practice, from […]

How to do Cookie Stealing with Cross site Scripting Vulnerability ? : XSS Tutorials

Hope, you are now familiar with XSS vulnerability (if you don’t know what it is, read the beginners xss tutorial). It is my Fourth article about the XSS Vulnerability Testing(PenTesting)..! Today i am going to explain how an attacker exploit XSS vulnerability and steal cookie from users. Warning!!! BTS does not take responsibility, if anyone, […]

Bypassing the XSS Filters : Advanced XSS Tutorials for Web application Pen Testing

copyrights reserved © BreakTheSecurity Hi friends, last time, i explained what is XSS and how an attacker can inject malicious script in your site. As i promised earlier, i am writing this advanced XSS tutorial for you(still more articles will come). Sometimes, website owner use XSS filters(WAF) to protect against XSS vulnerability.For eg: if you […]

What is Penetration Testing and Pen Testing Distribution?

Penetration Testing(Pen Testing) is the act of evaluating the Security of system or network by exploiting vulnerabilities. This will determine whether unauthorized or malicious activity is possible in a system. Vulnerability uncovered through the Pen Testing will be presented to the system’s owner. Why Penetration Testing? Pentetration testing can identify the vulnerabilities that is not […]