Home » Archive by category Security (Page 2)

The SSL Certificate and Your Website’s Security

When you are surfing the internet, a lot of information is being exchanged between the web host and the device being used to surf the internet. This type of information can always be easily breached by hackers, especially if it involves online transactions and this has always been...
Continue reading

wifite – Mass Wifi WEP/WPA Key Cracking Tool

wifite is created to to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision. Features sorts targets by power (in dB); cracks closest access points first...
Continue reading

Snort – Free Network Intrusion Detection & Prevention System

Snort is an open-source, lightweight, free network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats. It’s capable of of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching, and can be used to detect a...
Continue reading

Gophish – Open-Source Phishing Framework

Gophish is a phishing framework that makes the simulation of real-world phishing attacks very straight forwards. The idea behind gophish is simple – make industry-grade phishing training available to everyone. Features One-click Installation Standalone, portable binary with static assets Point-and-click Phishing Beautiful Web UI Automated Phishing campaigns RESTful...
Continue reading

SSL Handshake Simple Definition

Simple definition of how the SSL handshake works: The SSL uses asymmetric encryption to privately share the common password to be used later in the communication for symmetric encryption. SSL Handshake: The client initiates the connection and says he wants to connect with the server.  The server sends...
Continue reading

Cyborg Hawk Linux – Penetration Testing Linux Distro

Cyborg Hawk Linux is a Ubuntu (Linux) based Penetration Testing Linux Distro developed and designed for ethical hackers and penetration testers. Cyborg Hawk Distro can be used for network security and assessment and also for digital forensics. It also has various tools suited to the testing of Mobile...
Continue reading

Chat Using Command Prompt

To Chat Using Command Prompt Perform the following Steps Step1-You would require the IP Address of the person you wish to chat. Step2-Open Your Notepad and type the  following code. @echo off: A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto...
Continue reading

Acunetix Free Manual Pen Testing Tools

Acunetix Free Manual Pen Testing Tools allow penetration testers to further automated testing. Use the HTTP Editor to modify or craft HTTP requests and analyze responses, intercept and modify HTTP traffic on the fly using the integrated HTTP Sniffer, fuzz HTTP requests using the HTTP Fuzzer and test...
Continue reading

Microsoft Baseline SecurityAnalyzer(MBSA)

  Microsoft Baseline Security Analyzer Tutorial http://www.microsoft.com/en-us/download/details.aspx?id=7558 MBSA is a free security scanner for Microsoft products which analyzes a computer or a group of computers for missing patches/updates and common security mis‐configurations. When run MBSA provides a checklist of configuration problems and missing updates/patches. The most important part of the security report provided by the Microsoft Baseline Security Analyzer (MBSA) is the way information given on the lines of “What was scanned”, Result details” and “How to correct this”. Some of the checks that MBSA performs: • Check for missing Windows security updates • Check for missing IE security updates • Check for missing Windows Media Player security updates • Check for missing Office security updates • Check for file system type on hard drives • Check if Auto Logon feature is enabled • Check if Guest account is enabled • Check the number of local Administrator accounts • Check for blank or simple local user account passwords • Check if unnecessary services are running • Check if Internet Connection Firewall is enabled • Check if Automatic Updates is enabled • List the Internet Explorersecurity zone settingsfor each local user • Check if Internet Explorer Enhanced Security Configuration is enabled for Administrators • Check if Internet Explorer Enhanced Security Configuration is enabled for non‐ Administrators...
Continue reading