SQL injection is the most dangerous vulnerability that can cause a great harm to the website and their database, web application penetration testing is the right way to audit the security of a web application, since penetration testing means to confirm the vulnerability by exploit the vulnerability and there are several exploitation tool for SQLi is available and SQLmap is among of them.
Archive for June 2012
We have discussed about the VoIP penetration testing and security risk and this is the second part of this series article/tutorial, VoIP and wireless security is an important field to discuss because the security risks are very high so below is the demonstration on VoIP hacking with different tools and operating system that has been used for the demonstration was Linux backtrack 5 r2.
By Ethical HackingPosted in: EH Security, Guest Post, Hacking, Infosec, Pen-Testing, Tutorial, VoIP
VoIP or voice over IP (Internet protocol) is a transmission mode designed for use in voice and multimedia communications. As IP (Internet protocol)-based networks like the Internet seem to be most successful communications infrastructure, the traditional telephone network is currently being replaced VoIP. Nowadays, its clear improvements and advantages over the old systems make it a popular substitute, with a number of advantages. Among them:
Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information.The honeypot was first developed for a bachelor thesis at Bonn University in Germany. Now development is continued by the same developer within the Honeynet Project.
Flame virus is linked with Stuxnet but flame is more dangerous then stuxnet and according to some researcher that the real bomb is flame while the stuxnet was just for testing purpose, who has created the flame and stuxnet this is the question needs an answer but in this analysis we will see that the propagation method of flame, how flame spread ? How it hack into the computer and what are the some major target countries ?
Anonymous the famous hacktivist group who has been involved on the several activities, anonymous has previously released anonbin an alternate of pastebin but at this time anonymous has released their video channel or a video website called AnonTube. According to the anonymous official the Anontube is the place where everyone can put videos of hacking and music.
Information security is a very broad filed of IT and it involve the activities of hacking, cracking, penetration testing, computer forensic and many more. We have discussed various aspect of information security via different articles and tutorials and this time we are presenting a cracking challenge which is some kind of a reverse engineering and computer forensic. The theory behind the cracking is to evaluate your intelligence level, I mean how quick you can understand the problem and how fast you can get the solution.