Home »
Archive by category Security (Page 2)
When you are surfing the internet, a lot of information is being exchanged between the web host and the device being used to surf the internet. This type of information can always be easily breached by hackers, especially if it involves online transactions and this has always been...
Continue reading
March 5, 2017 nkcode
Network, Security
wifite is created to to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision. Features sorts targets by power (in dB); cracks closest access points first...
Continue reading
March 2, 2017 nkcode
Linux, Security
Snort is an open-source, lightweight, free network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats. It’s capable of of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching, and can be used to detect a...
Continue reading
February 22, 2017 nkcode
Network, Security
Gophish is a phishing framework that makes the simulation of real-world phishing attacks very straight forwards. The idea behind gophish is simple – make industry-grade phishing training available to everyone. Features One-click Installation Standalone, portable binary with static assets Point-and-click Phishing Beautiful Web UI Automated Phishing campaigns RESTful...
Continue reading
February 22, 2017 nkcode
Security
Simple definition of how the SSL handshake works: The SSL uses asymmetric encryption to privately share the common password to be used later in the communication for symmetric encryption. SSL Handshake: The client initiates the connection and says he wants to connect with the server. The server sends...
Continue reading
February 3, 2017 nkcode
Linux, Network, Security
Cyborg Hawk Linux is a Ubuntu (Linux) based Penetration Testing Linux Distro developed and designed for ethical hackers and penetration testers. Cyborg Hawk Distro can be used for network security and assessment and also for digital forensics. It also has various tools suited to the testing of Mobile...
Continue reading
January 26, 2017 nkcode
Linux, Security
To Chat Using Command Prompt Perform the following Steps Step1-You would require the IP Address of the person you wish to chat. Step2-Open Your Notepad and type the following code. @echo off: A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto...
Continue reading
January 26, 2017 nkcode
Security
Acunetix Free Manual Pen Testing Tools allow penetration testers to further automated testing. Use the HTTP Editor to modify or craft HTTP requests and analyze responses, intercept and modify HTTP traffic on the fly using the integrated HTTP Sniffer, fuzz HTTP requests using the HTTP Fuzzer and test...
Continue reading
January 26, 2017 nkcode
Security
Symantec haven’t included this utility in version 12.1. Instead you can use the Forgotten Password link on the logon screen. The main problem is that if you haven’t set up email server settings in the Manager console previously this won’t be any help to you. Quite a few...
Continue reading
May 24, 2015 nkcode
Hardware, Security
Microsoft Baseline Security Analyzer Tutorial http://www.microsoft.com/en-us/download/details.aspx?id=7558 MBSA is a free security scanner for Microsoft products which analyzes a computer or a group of computers for missing patches/updates and common security mis‐configurations. When run MBSA provides a checklist of configuration problems and missing updates/patches. The most important part of the security report provided by the Microsoft Baseline Security Analyzer (MBSA) is the way information given on the lines of “What was scanned”, Result details” and “How to correct this”. Some of the checks that MBSA performs: • Check for missing Windows security updates • Check for missing IE security updates • Check for missing Windows Media Player security updates • Check for missing Office security updates • Check for file system type on hard drives • Check if Auto Logon feature is enabled • Check if Guest account is enabled • Check the number of local Administrator accounts • Check for blank or simple local user account passwords • Check if unnecessary services are running • Check if Internet Connection Firewall is enabled • Check if Automatic Updates is enabled • List the Internet Explorersecurity zone settingsfor each local user • Check if Internet Explorer Enhanced Security Configuration is enabled for Administrators • Check if Internet Explorer Enhanced Security Configuration is enabled for non‐ Administrators...
Continue reading
January 13, 2014 nkcode
Security, Windows Servers