Archive for April 2011

Hexjector- Web Application Testing Tool

The importance of web application security is not a hidden truth, the web administrators must secure their web application to be secure in the jungle of web.Defacing of website(s) is now the hobbies of different people.

Linux Vs BSD

It is very difficult, it is surely a difficult task to compare Linux and BSD to each other, there are a lots of similarities between Linux and BSD so what actually a difference  why we compare and how we compare them? This is a difficult question. The aim of writing this article is not that we want to start a war between BSD and Linux lovers. It just a comparison.

Pangolin-Automated SQL Injection Test Tool

SQL injection is the biggest and rising threat for web applications, by using this injection an attacker may easily find the information about database management and an attacker may exploit it, so while penetration testing a pen-tester must consider this threat for web applications. 

OpenVAS- Vulnerability Assessment System

Automatic vulnerability scanning tools has a great importance in the field of penetration testing/ethical hacking, professional uses different tools for different environment.
There are different vulnerability assessment tools available as open source and as commercial tool.

5 Top Web Servers

Web server is a combination of hardware and some software that delivers us a web page on the Internet. Hardware means a computer on which the web site hosted while software is a program that runs on this computer to provide us a web page. Simply web server is a computer that provides a website.
This article will talk about different software/program that are available to run on a computer to host a website. 

Infondlinux A Script For Security Tools-Tutorial

Ethical hacking/penetration testing process requires a list of different automatic tools that helps to perform the job easier, effective, reliable and less time consumer. Normally a penetration tester creates their own toolkit for their job, but what if there is a script that will provides the effective tools on a single place that will be really help full.


Nikto-Vulnerability Scanner Tutorial

In the field of web application security there are so many tools available to measure the security of a web application, these tools available for different operating system and can use to find out the bug on a web application. In the era of these tools we have nikto also.

Darkjumper- Automatic Tool Tutorial

Web application security is a big issue for the administrator of different website and for the hosting provider. How it is a issue for web hosting provider? Well if one the website compromise than there is a chance to compromise all the website that hosted on the same server that has been compromised before.
So, for finding a bug on web application is necessary part of a pen testing. 

Sandcat - Web Application Security Scanner

Security of a website is a very important for any organisation or for personal websites. You have to check the security of your website and you should find the vulnerability into your website before that an attacker will find it and exploit it.
There are different vulnerabilities that might be occur on your website, the famous attacks like SQL-I and XSS etc.
 

ApacheConf- Easy Configuring Your Apache Servers

Apache is a power and flexible HTTP server and it provides many features like DBMS (Database Management System), Content negotiation and Virtual host etc. It is an open source and developed by an open source community, apache is available for various operating system including Windows, Linux,MAC, Solaris and FreeBSD etc.


Orbot: Tor- Anonymous On Android

Everyone wants to secure their privacy nobody want to share their privacy and information of their existing, so people want maximum privacy while they are browsing Internet they want to hide their identity by any means.
There are so many techniques available for both windows and Linux based operating system, but for this article these operating systems are not the point of consideration.

How To Install Nessus On Linux

Automatic vulnerability scanning tools has a great importance in the field of penetration testing/ethical hacking, professional use different tools for different environment. Now in this post we will discuss about network vulnerability scanning tool and that is nessus, you can find a lot of different article about nessus on the Internet but we will discuss from scratch about nessus.

Cool Windows Tricks

There are different computer tips and tricks available to impress anyone, If you are looking for some tips and tricks than read this article.

Lock A Folder In XP Without Any Software
  • For doing create a folder in C drive, suppose folder name is xyz.
  • Now open command prompt from start menu.

Port Scanning-Nmap Tutorial

This is the second episode of a series article about second step of ethical hacking/penetration testing, as we have deeply talked about the importance of port scanning and on the previous article we have discussed some about Nmap.
Click here to read to read the first related article.

Retina Vulnerability Scanner-Community Released

Automatic tools has great importance in the world of penetration testing/ethical hacking, these tools save time and money and you can audit your whole IT infrastructure easily. As we have discussed different automatic tools before for both web and networks.


5 Best Online Virus Scanner

A virus is malicious software or a malicious program which hides in other program and execute when you open this program. A virus is inactive until you execute an infected program. If you want to know more about viruses or if you want to create your own virus than click here.

Technology has been changed and changing rapidly, different viruses has an ability to destroy your anti-virus software so in this case a online virus scanner probably a good choice to use.

Scanning and Enumeration- Second Step Of Ethical Hacking

The second step of ethical hacking and penetration testing involve two terms that is scanning or port scanning and enumeration, we will discuss the these two steps separately. Before reading this article you must have an idea about first step, if you have not read our previous article on it than read footprinting step by step.