Archive for January 2012

Arachni Web Vulnerability Scanning Video Tutorial

How to hack a website ? A very common question and the answer is very long because it takes so many steps to hack into a website but the main and important step is to find the appropriate vulnerability, if you have the right vulnerability then it is easy to exploit the vulnerability to hack into a website or network. There are so many vulnerability tools like w3af, OWASP-ZAP, Nikto and other for web application. Arachni is one them.

Why Use Internet Monitoring Software?

When asked for their view on Internet monitoring software, organizations typically give one of two answers. Some will say that Internet monitoring software is needed because otherwise employees will abuse their Internet privileges and waste a lot of time online instead of working. Others will tell you that privacy is sacred and Internet monitoring software may be seen as abusive and as an infringement on employee privacy.

Arachni Web Application Security Scanner Framework Tutorial

Web application hacking is very common and there are so many tools that can exploit the web application vulnerabilities like SQL injection, XSS, RFI, LFI and others. The vary first step is to find the vulnerabilities on web application. Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. So in this article I will show you how to get and install arachni and how to launch your first attack against a web application.

SOPA And PIPA - Wikipedia Reddit Blackout Why ?

Wikipedia is black out, reddit is black out, wordpress is black out. SOPA will affect Facebook, Twitter, Google, Youtube and others but what is SOPA and how it will affect. Wikipedia is blackout now from where I will get the information about SOFA ? This is what imagine world without free knowledge. There are so many bloggers has written so much stuff on SOPA and PIPA but we just want to share a infographic about SOFA and I hope you will like it.

Reaver-wps WPA/WPA2 Cracking Tutorial

Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured. While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known.

How CSS Compatibility Mode Hack works for IE8

Microsoft is finally up with the latest version of internet explorer – IE8. So if you are still to check your website compatibility over the same, be prepared for some kind of wicked surprises. Every version of IE when hit the market didn’t conform to the web standards, which often poses cross browser compatibility issues to the web designers. The present IE is pretty complaint in terms of compatibility benchmarks, but since many of the websites were developed using the CSS ‘hacks’ for the earlier versions.

Penetration Testing in the Real World Offensive Security Video Tutorial

Hacking, cracking and penetration testing are the hot topics of this blog and we have discussed different tutorials based on backtrack Linux specially backtrack 5 R1 because it is the newest one, however there are many video tutorials of backtrack Linux available that has been made on previous version of backtrack like backtrack 4 and others. The main aim and idea is same means to educate people how to do a penetration testing. Offensive security.

Solution of Cracking Challenge

Crack it if you can a challenge, so I hope you have enjoyed a little challenge and I hope you have tried it by yourself whether you are fail or not. Well most of the people try to use and want how to use back-doors to hack into a friend computer or enemy computer and they usually don;t care about cryptography or secret communication strategy. If you are a computer science student or professional and if you have read some cryptography techniques then it is good because I will not discuss it.

UberHarvest - Email & Domain Harvesting Multi Purpose Tool

This FREE tool was designed to get a user to enter an individual website or load a text file containing many URLs at once. Once the URL(s) have been entered, the uberharvest application crawl through the website (and all the links within that website) searching for valid email addresses. The application can search for email addresses randomly (i.e. something@domain.something or the user can chose to search for email addresses for a specific domain (i.e. for the application can search for all email addresses within the website). 

Join Ethical Hacking Forum For Discussion

Forums are the best way to discuss any topic from marketing to hacking that is why I have decided to maintain a third party forum for the discussion of IT security and ethical hacking. So many peoples used to ask questions via contact us form and this is not a good way to ask these question and there is a need to maintain a forum so that people can ask the questions. Although we are running different discussion on our Facebook fan page and group but fan page is not for this purpose.

How Important is to Secure Your Router Password

Internet is not a secure place and you never know who is trying to get into your computer for their malicious purpose, as we have already discussed different security layers on various blog posts which includes but not limited to:

  • IDS
  • Firewall
  • Antivirus