{"id":100,"date":"2013-01-08T15:48:29","date_gmt":"2013-01-08T15:48:29","guid":{"rendered":"http:\/\/chasingtech.net\/wp\/?p=100"},"modified":"2013-01-09T19:04:33","modified_gmt":"2013-01-09T19:04:33","slug":"security-hacking-practice","status":"publish","type":"post","link":"https:\/\/chasingtech.net\/wp\/2013\/01\/08\/security-hacking-practice\/","title":{"rendered":"Security &#8211; Hacking Practice"},"content":{"rendered":"<p>I&#8217;m just adding a few links today for some websites (that are sand-boxed) you can use to learn or practice different hacking techniques.<\/p>\n<p>***Remember I nor any of these websites are responsible for you using these techniques maliciously. You should not use any of the information to hack any other computers or websites.***<\/p>\n<p>&#8212;-&gt;&gt;&gt; \u00a0 \u00a0<a title=\"Hack.me\" href=\"https:\/\/hack.me\" target=\"_blank\">Hack.me<\/a><\/p>\n<p>&#8212;-&gt;&gt;&gt; \u00a0 \u00a0<a title=\"Gruyere\" href=\"http:\/\/google-gruyere.appspot.com\" target=\"_blank\">Gruyere<\/a> &#8211; Google &#8211; Very cool but you really need to understand some Java and HTML.<\/p>\n<p>&#8212;-&gt;&gt;&gt; \u00a0 \u00a0P<a title=\"p0wnlabs\" href=\"http:\/\/p0wnlabs.com\" target=\"_blank\">0wnlabs<\/a> &#8211; Mostly Linux based tutorials including forensics, password cracking, etc&#8230; (There are only about 3 free challenges. The rest are paid challenges)<\/p>\n<p>&#8212;-&gt;&gt;&gt; \u00a0 \u00a0<a title=\"HackingDojo\" href=\"http:\/\/hackingdojo.com\" target=\"_blank\">HackingDojo<\/a> &#8211; This has many paid-for tutorials and some blogs with tips &amp; tricks.<\/p>\n<p>These are just a few that I&#8217;ve tried recently. I will be adding more soon&#8230;.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m just adding a few links today for some websites (that are sand-boxed) you can use to learn or practice different hacking techniques. ***Remember I nor any of these websites are responsible for you using these techniques maliciously. You should not use any of the information to hack any other computers or websites.*** &#8212;-&gt;&gt;&gt; \u00a0 <a class=\"read-more\" href=\"https:\/\/chasingtech.net\/wp\/2013\/01\/08\/security-hacking-practice\/\">[&hellip;]<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-100","post","type-post","status-publish","format-standard","hentry","category-resources"],"_links":{"self":[{"href":"https:\/\/chasingtech.net\/wp\/wp-json\/wp\/v2\/posts\/100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chasingtech.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chasingtech.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chasingtech.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chasingtech.net\/wp\/wp-json\/wp\/v2\/comments?post=100"}],"version-history":[{"count":7,"href":"https:\/\/chasingtech.net\/wp\/wp-json\/wp\/v2\/posts\/100\/revisions"}],"predecessor-version":[{"id":103,"href":"https:\/\/chasingtech.net\/wp\/wp-json\/wp\/v2\/posts\/100\/revisions\/103"}],"wp:attachment":[{"href":"https:\/\/chasingtech.net\/wp\/wp-json\/wp\/v2\/media?parent=100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chasingtech.net\/wp\/wp-json\/wp\/v2\/categories?post=100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chasingtech.net\/wp\/wp-json\/wp\/v2\/tags?post=100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}