Archive for December 2011
By Ethical HackingPosted in: Backtrack5, EH Tips, Hacking, Linux, Metasploit, Tutorial, Vulnerability, Windows
There are so many ways to hack into a computer but after comprising the computer an attacker (hacker) needs to cover their track because each and every activity that a hacker do (or a normal user do) is recorded by the system. So whenever a hacker hack into a web server or a computer than after doing the work an attacker usually cover the track so that no one is able to catch them. How to cover your track after hacking or how a hacker cover their track is an important topic of discussion and need more tutorial because every operating system has its own way to maintain the logs.
Cryptography has been developed and are developing a lot, there are so many new techniques and algorithm available to encrypt a secret message. So I have decided to share something about the secret communication, let suppose you have received an image and the image might be contain some message that is hidden. It seems to be intelligence agency movies now suppose the same scenario I will give you the image and you need to find out the secret message. It is a little challenge that will surely improve your knowledge and skills.
Spywares are becoming more predominant on Windows based systems. The reason behind this is the vulnerabilities of Windows operating system. Even if, your computer is not infected with spyware until now, there is no guarantee that it will never be infected with spyware. That is why, security experts recommend installing anti-spyware programs on your computers. Anti-spyware programs help you to take precautionary measures to avoid spyware attacks.
By Ethical HackingPosted in: Asterisk, Trixbox, Tutorial, Virtual Machine, Virtualbox, VoIP, Wireless
VoIP or voice over IP (Internet protocol) is now become a next generation communication medium, VoIP is a method of transmission and the infrastructure of VoIP based on IP network. There are so many advantages of VoIP but this is not the topic of our article. Asterisk is a wonderful software that has been designed to make your computer a communication server, it is an open source software means available free of cost. Trixbox is based on asterisk project and it is an alternate of PBX. This is going to be a series of tutorial in which I will show you how to install trixbox and how to configure and how to make your first call.
SQL vulnerability on a web application seems to be most dangerous vulnerability that can cause to get the confidential information from the database including administrative account username and password, credit card information and other credential. There are so many tools are available for SQL injection attack and we have discussed so many tools before and below you will find a list of tools.
DNS is one of the fundamental building blocks of the Internet. It's used any time you visit a website, send an email, have an IM conversation or do anything else online. While OpenDNS has provided world-class security using DNS for years, and OpenDNS is the most secure DNS service available, the underlying DNS protocol has not been secure enough for our comfort.
By Ethical HackingPosted in: Cracking, Linux, Ncrack, Nmap, Open Source, Pen-Testing, Tutorial, Vulnerability
The Remote Desktop Protocol is often underestimated as a possible way to break into a system during a penetration test. Other services, such SSH and VNC are more likely to be targeted and exploited using a remote brute-force password guessing attack. For example, let’s suppose that we are in the middle of a penetration testing session at the “MEGACORP” offices and we already tried all the available remote attacks with no luck. We tried also to ARP poisoning the LAN looking to get user names and passwords, without succeeding.
SSL or secure socket layer was the best way to encrypt the on going and out going request but now there are so many tools are available to exploit SSL, beside these tools there are so many tutorials and techniques that will help to exploit a SSL. SSL is a transport layer (OSI model) security that is known as TLS. Tools like THC-SSL-DOS and sslyze are the best among the hackers and crackers, the main point here is that TLS security is on OWASP top 10 list so we cannot neglect the importance of SSL.
By Ethical HackingPosted in: Backtrack5, Hacking, Linux, Metagoofil, Tutorial, Ubuntu, Vulnerability, Web Security
Information gathering or foot printing is the vary first step of hacking process and we have discussed so many tutorials for information gathering on backtrack 5 and on other OS like ubuntu and windows. In this article you will learn how to gather information from Metadata of public document from victim websites and the tool is Metagoofil. Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,odp,ods) available in the target/victim websites.
Speaking of virus it has always been somewhat mysterious. I remember when I compiled my first dos virus in assembling it was such a painful task. From the initial assumption to the final accomplishment it took me more than 3 months, but what I had compiled was still at mess. Recently I come up with the idea that virus ultimately is something that affects other files and spreads itself, so it would not be too complicated to compile a virus by shell. Then I conveniently compiled the following script. Its functionality is to affect other shell programs.
By Ethical HackingPosted in: BackTrack, EH Tools, GnackTrack, Ubuntu, WATOBO, Web Security, Windows
As we have discussed before about VoIP hopper the IP based phone VLAN (virtual LAN) hopper, in the previous tutorial we have seen the theoretical background and the feature of VoIP hopper but in this article we will share three videos of VoIP hopper in which you will see the functionality of voip hopper.
By Ethical HackingPosted in: Armitage, Backtrack5, EH Tips, Hacking, Linux, Metasploit, Open Source, Tutorial, Ubuntu, Vulnerability
Armitage has changed the way of hacking, Armitage is act like a graphical user interface of Metesploit, there are so many tutorials of metasploit and armitage are available on the Internet and we have also discussed armitage and metasploit on different articles by using Backtrack 5 R1, below is the video tutorials of metasploit and armitage that will discuss armitage hacking from beginning. This wonderful video and hacking lectures has been created by Raphael Mudge.
Hacking is something that computer security systems try to prevent every single day. It is something that can cause a lot of problems for people. People get infected with computer viruses, and so on and so forth. Everybody is well aware of the dangers of hacking and getting your computer infected. It can cost you hundreds to thousands of dollars to get your computer fixed once someone has hacked into it.
Why I need a firewall? This is a most common question beside Anti-virus you must have a firewall but why? Firewall protect your computer from different types of hacking attack because Firewall is a wall just like your home door, if your door unlock than everyone can easily get into your home so use a wall to protect your computer. Below is the wonderful inforgraphic that explain you about the firewalls, What is firewall? How firewall works? Firewall configuration and tips for online security.