A person who heard the term 'patch management' a few years ago would probably have been forgiven if he/she thought that it was some kind of obscure unit in a needlework course! Today, however, patch management is used to refer to an activity that should be a central element of any network security strategy.
Archive for March 2011
People using Zip to compress their files beside compression they are trying to lock their important data with password(s).
Now let suppose if you do this same thing with your important files and now you have forgotten password, now what to do now its time to crack it.
This article will teach you how to crack the password of Zip files.
Posted in: BackTrack, BlueTooth, EH Tools, Linux, Open Source, Pen-Testing, Tutorial, VoIP, Vulnerability, Wireless
If you want to secure your web application than first you must know about the common types of web attack and you should first attack on your web application to check that if it is vulnerable or not, for this purpose in this article we will talk about the most common type attacking technique that will cause a web server to compromise.
Posted in: Backbox, BackTrack, EH Tools, Framework, Hacking, Inguma, Linux, Open Source, Pen-Testing, Tutorial, Vulnerability
As we have discussed about different automatic penetration testing and vulnerability scanning tools before for both windows and linux plate form. In this article we will talk about inguma, inguma is a free penetration testing and vulnerability research toolkit.
It is written in python it is available for both command line and GUI (Graphical User Interface) interface.
As i have shared different vulnerabilities and security scanners before, but in this article we will talk about netsparker, I am very happy to write about netsparker because it is one of my favourite web application security scanner on windows plate form.
There are different challenges and security flaw may occur on a web application and a penetration tester must check each and every link.
This article is link with our series article on footprinting (Information gathering) for previous story click here.
Now beside whois,Nslookup and tracert command there are some tools that available on market to perform footprinting professionally, these tools provide a wide range of option and techniques to perform a valuable footprinting.
There is no doubt that the security and the performance of any application and operating system is the key point to measure is overall performance. No matter about your operating system because viruses develop and make daily basis for every applications and operating systems.
I think you well aware about anti-viruses that are available for windows based and linux based operating system.
Posted in: Backbox, BackTrack, EH Tools, Hacking, Linux, Open Source, Pen-Testing, SQL, Tutorial, Ubuntu, Vulnerability, Wapiti, Web Security
As we have shared some web application vulnerability scanner to use and find the vulnerable on your web application,Websecurify can be work on multiple plate form like windows, Linux and Mac. While there are some tools that works only on Linux plate form and that tools are reliable and easy to work.
So you need to scan a web application for various means and for various attack(s).
As we have discussed about footprinting yes the first step of ethical hacking/penetration testing, if you have not read the previous article than you should read it than you will clearly understand the terminologies and the objective of this article click here.
We are living in the age of information, information is very important and on the first step a researcher try to get the maximum information about the target.
Apache HTTP Server commonly known as Apache web server is running since 1999 but in 2009 it became the first web server software to surpass the 100 million web site milestone.
It is a power and flexible HTTP server and it provides many features like DBMS (Database Management System), Content negotiation and Virtual host etc. It is an open source and developed by an open source community, apache is available for various operating system including Windows, Linux,MAC, Solaris and FreeBSD etc.
Security of a website is a very important for any organisation or for personal websites. You have to check the security of your website and you should find the vulnerability into your website before that an attacker will find it and exploit it.
If an attacker find the way that will cause the great harm for your website. They are different vulnerabilities that might be occur on your website, the famous attacks like SQL-I and XSS etc.