Both ethical cyber security professionals and malicious hackers, commonly use Linux open source tools when performing vulnerability scans and penetration testing to find security flaws and potential access points within a computer’s ...―
Follow @FantaGhost Finally my Raspberry PI Model B Rev.2 is arrived !! I choose to buy an used one just to start some testing I choose PWNPI 3.0 as operating system because it contains lots of useful tools to help me in my pentesting activities. ...―
Hello Friends Check out Bugtraq 2 Final Code name Blackwidow ∙ Bugtraq-II Black Widow @ubuntu,Debain,Opensuse @XFCE / @gnome,Kde 32 n 64 Bits ∙ System requirements1GHz x86 processor512 MB of system memory (RAM)15 GB of disk space for...―
If you are a developer, owner of a software firm or a testing engineer, you must know the importance of security testing. Hackers are everywhere and they always try to intrude in the system, network and applications. If we talk about Web ...―
Metasploit 4.6: 138 138 new modules and help for beginners Took place yesterday, an official release of the framework Metasploit 4.6, which enters into an mandatory arsenal of each pentester. Compared with the previous version (Metasploit 4.5 was...―
AppSec Labs recently developed the AppUse Virtual Machine. This system is a unique, free, platform for mobile application security testing in the android environment, and it includes unique custom-made tools created by AppSec Labs. ∙ ...―
Penetration Testing, Seminggu belakangan ini, rasanya malas sekali untuk menulis artikel, mood seakan-akan lagi tidur dan susah untuk dibangunkan, ngopi udah, makan sudah, hmmm, apalagi ya? Adalagikah yang bisa membangkitkan mood, agar mood segera...―
Kali Linux: the operating system for research security of systems ∙ Kali Linux has replaced the earlier developing project BackTrack Linux and released instead of the expected release of BackTrack 6. Solved problems by Kali Linux is ...―
Kali Linux, Successor of the BackTrack Penetration Testing Distro. The authors BackTrack presented Kali Linux 1.0, a new distribution for security checks of operating system. Offensive Security company introduced a new distribution for security...―
The following post shows some possible ways to hack and gain root on VulnVPN. In these examples VulnVPN is based at 192.168.0.10 and the attacking box/client is 192.168.0.11. ∙ Attacking the VPN ServerThe first few steps involve finding ...―
Penetration testing is the process of finding of security vulnerabilities in web application. It can also be seen as security testing. To make the testing process simple, there are many manual tools and automatic tools available. By using these...―
The OWASP (Open Web Application Security Project) Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws. The OWASP TOP 10 has been designed to raise awareness...―
You got a blog? Or you are just interested in being a brand on the Internet? Where exactly ...
I have no doubt that creating and using an eBook for marketing is one of the most powerful ...
Chances are you’re eating more sugar than you think, especially if you’re ...