full screen background image
Search
Monday 22 January 2018
  • :
  • :

Archives post

Environmental Controls and the CISSP

It is quite easy to understand why ensuring a proper level of Environmental Controls plays a major role in the protection of any...

WebXploiter – An OWASP Top 10 Security scanner

WebXploiter The main purpose of this tool is to help to automate the manual Recon techniques + basic exploitation techniques which we used...

Sagan: analyze logs (syslog/event log/snmptrap/netflow/etc)

What is Sagan? Sagan is an open source (GNU/GPLv2) high performance, real-time log analysis & correlation engine. It is written in C...

CrackMapExec v3.1.5 – A Swiss Army Knife For Pentesting Networks

  CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks....

PowerShdll – Run PowerShell with rundll32 (Bypass software restrictions)

Run PowerShell with dlls only. Does not require access to powershell.exe as it uses powershell automation dlls. dll mode: Usage: rundll32...

radare2 – Unix-Like Reverse Engineering Framework And Commandline Tools

r2 is a rewrite from scratch of radare in order to provide a set of libraries and tools to work with binary files. The radare project...

novahot: A webshell framework for penetration testers

novahot novahot is a webshell framework for penetration testers. It implements a JSON-based API that can communicate with trojans written...

bluebox-ng: VoIP/UC vulnerability scanner

Bluebox-ng DISCLAIMER: Pointing this tool at other people’s servers is NOT legal in most countries. Auto VoIP/UC penetration test...

The Big List of Computer Forensics Certifications

Computer forensics certifications have gained tremendous popularity over the past few years. Many public and private organizations have...

Free & Open Source Computer Forensics Tools

Introduction According to Juniper Research, cybercrime losses to businesses will surpass $2 trillion by the year 2019. With data breaches...

MyEtherWallet Notification – Email scam

  A new scam. This time, the hacker tries to steal logging data for the Ethereum wallet. A site identical to the original was created...

Install DVWA on Kali Linux 2017.2

Install DVWA on Kali Linux 2017.2 Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are...

Metasploitable 3: Exploiting HTTP PUT

In this hacking tutorial we will be exploiting the HTTP PUT method on one of the Metasploitable 3 webservers to upload files to the...

PenBox: A Penetration Testing Framework

PenBox – A Penetration Testing Framework A Penetration Testing Framework, The Hacker’s Repo our hope is in the last version we will...

SniffAir: A framework for wireless pentesting

SniffAir SniffAir is an open-source wireless security framework. Sniffair allows for the collection, management, and analysis of wireless...

How to install Kali Linux on Google Cloud

On this post, I am going to guide you how to install & upload your Kali Linux into Google cloud platform. Requirement Google Cloud...

WordPress Penetration Testing using WPScan & Metasploit

Attacker: Kali Linux Target: WordPress WPScan is a black box vulnerability scanner for WordPress written in PHP mainly focus on different...

Hack the Primer VM (CTF Challenge)

Hello friends! Today we are going to take another CTF challenge known as Primer. The credit for making this vm machine goes to...

Using Verified Identity to Prevent Personal Data Breaches

Yet again, I open my laptop, check out the news, and see that there has been another mega-hack. This time the target was Equifax, and the...

The Security+ Exam Information

The Security+ exam is an essential stepping stone along any IT security career path. According to CompTIA, the company behind Security+...

Become an Entry-Level Cybersecurity Analyst

Cybersecurity is a growing issue. The greater frequency of attacks and their higher sophistication require companies to utilize the...

Security+ Exam Information: Performance-Based Questions

IT security is vital to organizations as cloud computing, and mobile devices have revolutionized the way we do business. With the immense...

Security+: Hiring Qualified Professionals

In a time when professionals with IT security skills are in high demand, are certifications still important to obtain? In a field where...

Hunting Paypal Scammer – Busted 100%

Here’s a new software that promises to increase your revenue. The point is you do not have to believe in miracles. Everything looks...

4 ways to SMTP Enumeration

We can also find out version and valid user of SMTP server using telnet. Execute following command and find out its version and valid user....

Penetration Testing on Telnet (Port 23)

Welcome to Internal penetration testing on telnet server where you will learn telnet installation and configuration, enumeration and...

Kali Linux 2017.2 Release – The Best Penetration Testing Distribution

  In addition to all of the standard security and package updates that come to us via Debian Testing, we have also added more than a...

The CCNA / CCNA Security / CCENT / CCDA Exams: Overview & Information

Introduction For those looking for an accelerated way to jump into the world of information security and networking, the...

CEH Exam Overview: What to Expect

Introduction For most of us, “hacking” is a word that conjures up images of frustration and even fear. Hackers have become much bolder,...

psad: Intrusion Detection and Log Analysis with iptables

psad – Intrusion Detection with iptables Logs Introduction The Port Scan Attack Detector psad is a lightweight system daemon written in...