Archive for May 2011

Kismet- A Wireless Sniffer

Wardriving a act for searching and locating the access points (APs), as discussed on the wardriving article about the importance of wireless sniffer. These tools use to find out the wireless network, just like netstumbler for windows and Kismac for MAC, there is a Kismet for Linux. Purpose is same to sniff the wireless LAN and try to get maximum information about that network.

Armitage - Cyber Attack Management

Technology has no end, on the previous article we have discussed about metasploit framework, that has been changed the way of penetration testing, Armitage is a graphical cyber attack management tool for Metasploit that visualises your targets, recommends exploits, and exposes the advanced capabilities of the framework.



Top 5 Free Antivirus

Antivirus software's are the necessary tool to protect a computer from miscellaneous viruses, worms, from backdoor like keyloggers and Remote administration tool, there are various antivirus software's are available on the Internet, some are available for free of cost and the others to be purchased.
Antivirus companies provides a facility to scan a file(s) online, if you want know about online virus scanner tool than click on the below link.


Metasploit- An Introduction

If you are active in the community of Penetration tester/ethical hacker than you have heard about metasploit, because it is the most famous tool and used by the most penetration tester as well as used by the hackers. Metasploit is an open source security (Computer) project that contain the information about vulnerabilities.
If you just put all the available exploit in a single place than the phenomena of metasploit occur.

From IPv4 To IPv6- The Big Switch

IP or Internet protocol address is a unique identifier that are used to identify devices that are connected to the network (Internet). IP addressing needs some sort of sub-netting and subnet mask. Currently we are using IPv4 (IP version 4) so in this version we have some classes like class A (IP), class B (IP) and class C (IP) and so on.

Gamja-Web Vulnerability Scanner

As there are so many different articles and tools has been posted on web application security, this article will also cover some about penetration testing on web application, the web administrator must check their websites for most type of web site attack, because it is a rising problem for websites.

Tamper Data: A Firefox Extension

Firefox provides a lot of Add ons for different purposes, it may be categorise on the basis of their use. There are different add ons available in firefox that can be used as a penetration testing tool or it may be use for hacking a website. So the usage is depend on the person its not depends on the tool and the author of the tool.

5 Top Firefox Addons For Anonymous Surfing

Firefox is fast,reliable and secure browser that provides a lot of different features except browsing. So this article will talk about anonymous surfing via Firefox.
Mostly people use different software's and online services to achieve anonymous surfing, however you can add some plug ins on your Firefox browser to achieve this task.

Samurai Web Testing Framework

Security of a web application is very important, now a days there are so many vulnerabilities that can easily find and exploit by a hacker, so if you want to secure your web application you need to do a pen-test on your own web application find vulnerabilities and fix it before an attacker find and exploit it.
There are so many tools available for doing pen testing, you can use some commercial as well as open source tools to do this.


Paros Proxy-Web Application Security Assessment

Paros proxy is a web application security assessment tool used to measure the security of a web application. It allows you to see what data exactly do you submit with your HTML form with Post method?

Just like other web application security tools paros can be used to find out the SQL-injection and XSS (Cross site scripting) vulnerability on a web application.

Free Giveaway-Hacking From Scratch

How to hack? How to defend?  These are two very important question in hacking world but where is the answer, i think answer is in your brain, use your brain but how to use, in which direction you should move or focus to get your dreams come true.

SQL Power Injector- Tutorial

SQL injection is the biggest threat for database, website administrator must consider this threat and they must check their website for this vulnerability, penetration testing on a web application requires some automation so the automatic tools are the great choice.

KisMAC- Wireless Security Tool For MAC OS

As discussed so many topics for both Linux and Windows operating system, now this article will talk about the Wireless LAN (WLAN) security tool that are available for MAC operating system. This article is linked with the series article of Wardriving. Wardriving a act of searching/locating and exploit a access point.

Web Application Attack and Audit Framework (W3AF)- Tutorial

Security is key point for every effective business, either you are running your own website or you are at job to manage the web application for your company you have to do little penetration testing to check the security of web application.
Now a days exploit are available and update on daily basis for different web application services.

While doing a penetration testing a pen tester must consider these exploit for different vulnerabilities.

8 Top Facebook Security Tips

World wide web is now expending, Internet has successfully turn the whole world into a village and for doing this social networks played and playing an important role, in the era of social networks there is a facebook,  Facebook has a large number of user's and it is on hit list of attacker's and scam-er. 
While you are using facebook or any social networking website there is a need to protect your information by using effective privacy techniques.

Secure Sockets Layer (SSL) - An Introduction

In the OSI model a reference model for effective communication we find a layer named transport layer. Just like a physical layer (where viruses attack normally) transport layer also need some sort of security because transport layer is responsible for transmission of data.
So what actually makes transport layer to make the transmission secure and to protect the data from any intruder.

Online DOM XSS Scanner- Tutorial

Security of your web application is very important in the jungle of web where every one trying to get into your web application and trying to get maximum information about your server.
your web application faces various type of attacks, before a miscellaneous user find the way to enter your web you should find the way and fix it.  


3 Best BSD Distribution

By reading a comprehensive article on Linux Vs BSD, you may know that Linux is not only a Unix based operating system, in the battle of operating system you can find BSD over there.

As previously discussed about best linux distro for penetration testing, this article will talk about some best BSD based distro (operating system).

BackTrack 5

Backtrack a weapon of a penetration tester/ethical hacker, backtrack is nothing but a combination of different tools that are widely used in the process of penetration testing. It is a dream project based on GNU/Linux distribution and was designed to use for computer forensic and penetration testing.


Wardriving- Wireless LAN Hacking

Wireless networking is the most popular and fast growing technology, from home networking to the enterprise networking, wireless network now become a way of life and way of networking. As more wireless network are deployed, the need to secure them increase. 

RedWolf Security Threat Generator

If you are a network administrator or working to the related job than you must be aware to the importance of network security, for effective business it is necessary to secure the confidential information of the company in on any means. 
For securing a network the administrator install a smart IDS/IPS, firewalls and the other network devices for routing and switching.

Ubuntu Muslim Edition

The importance of operating system is not a hidden truth, without a operating system a computer is unusable. The time has gone when there was only windows operating system available, now the Linux and MAC plays an important role in the battle of operating system.
In Linux there are different distribution available for different purposes like so many distro for pen testing and for other.