Archive for February 2011

Dnsmap- DNS Network Mapper

Information is very important for performing penetration testing, on a vary first step ethical hackers/penetration tester try to get the maximum information about the target.
The steps required for information gathering or footprinting has been discussed on earlier article click here to read.

Double Anti-Spy Professional

Security of any computer is very important in the age of technology, where new threat develop daily so you must have a smart and intelligence defender to secure your data from miscellaneous user's.

There are different tools and software's present on the market and they claim to provide the maximum security, we have not checked all the software's. But the one that we have used is the topic of this article.

XSSer- Cross Site Scripting Penetration Tool

Security of your web application is very important in the jungle of web where every one trying to get into your web application and trying to get maximum information about your server.
your web application faces various type of attacks, before a miscellaneous user find the way to enter your web you should find the way and fix it. 

6 Tips To Secure A Wireless Network

Security is the key point of a networks either it is wired network or wireless network, you have to secure your network so that the miscellaneous user's does not get into your network.
The importance of the data is not the hidden truth, now a days wireless networks are in market and a normal user(s) also uses a WiFi on their home.

BackBox Linux- A Flexible Penetration Testing Distribution

Life changes everyday and the researcher and developer makes new development everyday, if you have not read our previous post on best linux distro for penetration than it is recommended to read it click here.
 

Sqlmap- Automatic SQL Injection Tool

Automatic tools play an important role in the field of penetration testing, either the test will going to conduct for network or for web application.

Web application penetration testing is very important for the high profile companies and for those services like E-commerce to secure the data of the user.

NetStumbler A Wrieless LAN Detection Tool

The importance of wireless is not a hidden truth, the technology world is going to be the wireless at the consumer side especially. So in this article we will talk about the wireless local area network (WLAN) detector tool.

NetStumbler formally known as Network Stumbler its probably the first wireless detection tool that people came across.  

FootPrinting-First Step Of Ethical Hacking

Footprinting is a first step that a penetration tester used to evaluate the security of any IT infrastructure, footprinting means to gather the maximum information about the computer system or a network and about the devices that are attached to this network. 

Footprinting is a first and the important step because after this a penetration tester know how the hacker sees this network.

PentBox- A Penetration Testing Tool

To analyse the efficiency of an IT infrastructure you need to test the security of that infrastructure. There are various penetration testing tools present to evaluate the security of a network or a box(machine). 

New challenges develop daily and beside it new tools and tricks also develop rapidly, in this article we will talk about PentBox.

Patriot NG: Host Based Intrusion Detection System

Intrusion detection system (IDS) is very popular in the field of network security, for a complete disclosure of IDS read our previous article about it click here to understand IDS from basic, and click here learn about different types of IDS.

Patriot NG is host based IDS, and it is design to work on Microsoft plate form, Patriot NG allows real time monitoring of operating system and the network.

Intrusion Detection System (IDS)

On a earlier discussion we have precisely described Intrusion Detection System (IDS), if you have not read the previous story than it is recommended you to first read the previous story than continue to this story, because the basis of this article has been presented on previous article to read previous one click here.


BlueMaho Bluetooth Security Testing Tool



Well blue-tooth is a open wireless protocol to transmit data over short distance, it is basically designed for short distance communication.It operates on the frequency of 2.4GHZ. 

If there are technology means there are some attacks on this technology in this article we will discuss about the BlueMaho an attacking tool that attacks on blue-tooth devices.

Top 5 Free VPN Services


 Before going to the main topic i would like to tell you something about VPN (Virtual Private Network), A VPN is private computer network that uses public network to connect remote machine. For a detail and a long discussion on virtual private network click on here.
 Well in this article we will share some great and commonly used  free VPN services, beside it you can create your own VPN network for the tutorial click here.


Increase Internet Speed

Everyone wants high speed internet for browsing and for downloading, to be frank if you want to get high speed than you should purchase high bandwidth connection from your ISP. You need to care about your router and the security of router, clear your cache to get the maximum speed.

The question remains same and that is about to get maximum internet speed with available connectivity, so there are some ways to get the maximum available bandwidth and this tutorial will teach you how to.

Intrusion Detection System

If you are interested in network security, or if you are interested in data mining, or if you are interested in computer security than you must know about Intrusion Detection System (IDS).

Intrusion Detection System (IDS) have become very popular in many years because the variation in intruder, we are living on the age of technology the researcher and security expert facing many challenges daily, so there is a need to create such a thing that can monitor the entire network.

WiPhire- Wireless Penetration Testing Tool

There are mainly two type of networks one is wired and the other is wireless, now a days everything is going to be wireless no one like the wired network, this article is not about the comparison between wired and wireless network. 

As you have an idea about penetration testing and the tools that are widely used in pen testing, now what about wireless networks. There are some tools present to check the security of the wireless network, in this article we will discuss about a tool.


WordPress Security Tips

Security is very important for every website either it is wordpress or not, webmaster always care about the security of their website and none these want to compromise of the security of the website.
Beside everything we say that security is a hot topic and need more and more discussion.

In this article we will talk about the security issues on wordpress plate form, WordPress is the open source blog publishing application that works on the based of PHP and SQL.  

XSS Vulnerability Scanner

Attacking on a website is a very common now days, many attacker uses SQL-I attack to get the database, there are some different attack that can exploit a website application.

Cross Site Scripting or XSS(CSS) is generally a most common type of web based attack, Cross Site Scripting is an attack done by using the web browser that take the advantage of poorly written web applications. This can be performed by manually or by using the automatic scanner that can scan the web application to find the bug.


Career In Information Security

This article only show you how to start a career in the field of IT security/Network security, this article for those people who are interested in the field of IT security and who want to do some courses to enhance their skills. 

We are going to start with beginning of the IT security, but before reading this you must have an idea about Penetration testing and Vulnerability assessment, click here.


Password Based Attack (THC Hydra)

Password is a secret word that is used for authentication or proves your identity, password is a foundation of security for most computer or computer networks. Usually a normal user do not know the importance of password, many users choose the simplest
password such as a pet’s name to help them remember it.



GSM Security 2

On the previous article on GSM security here. We have briefly discussed about the network element and the network architecture of GSM, including the encryption that are widely used in GSM network.

At the end of that article as we have discussed about how the network identify the SIM (Subscriber identity module), this is an important part of the GSM security. 

FaceBook Scam Alert

There is no need to introduce facebook, yes we are talking about the facebook the famous social networking plate form for the user's. Facebook has a large number of user's and it is on hit list of attacker's and scam-er. There are so many scamming that has been start and discussed before but now in this article we will discuss on a new scamming rising on facebook. 

Blackbuntu CE v0.2 Released

As we have discussed about different penetration testing distribution before here. Now a new distribution is among us and this is BlackBuntu new edition.

The Blackbuntu Community Edition is a Linux Live-CD based on Ubuntu 10.10 which was specially designed for security training students and practitioners of information security.

Penetration Testing vs Vulnerability Assessment

Penetration testing and Vulnerability assessment what actually a difference, it is a complicated topic to be discussed. People are often classified as the same thing when in fact they are not. Penetration Testing does sound a lot more exciting, but in our experience we have found that most clients actually require a comprehensive Vulnerability Assessment or V.A. and not a more intrusive Penetration Test.  


FireFox Of Penetration Tester

Ethical hacking or penetration testing is a wide and most important field in the world IT, there are lot of students learning computer security and forensic for their good future.


The security expert and penetration tester are using a large panel of security tools to audit the IT infrastructure, these tools are the weapons of pen-tester and now a normal user are weaponless. Different penetration tester using different tools and it depend on the requirement of the test. In this article i will show you different tools that will really help you out.