A unique Site with Unique Contents!
Introduction

One thing I have always maintained is that aspiring or practicing penetration testers who use an exploitation product (such as CANVAS, Core Impact, Metasploit) should know how buffer overflows actually work. Having this knowledge will help you understand the circumstances under which these products can work, will help you troubleshoot when things don't work and will correct unrealistic expectations about what the products are capable of.

In addition, being able to reproduce buffer overflow exploits will also give you the tools to more accurately assess the risk of discovered vulnerabilities as well as to develop effective countermeasures for exploits out in the wild. These are important skills for incident responders and for those attempting to protect their networks.
Read more..
Your rating: None Average: 3.7 (111 votes)

Title: Ethical Hacking & Penetration Testing 
Author: Brad Causey & Bobby Rogers 

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links. 

Title Description Read more..
Your rating: None Average: 3.7 (50 votes)

F.B.I RAT (Full Backdoor Intergration) V0.1

Supports xp/Vista/Windows 7, all features have been tested on these OS's including injection, but there have been some limitations on the sniffer.

Features:Read more..

Your rating: None Average: 3.7 (45 votes)



CONTENT:

Module 01 - Getting Started with Nmap
Module 02 - Nmap Basics
Module 03 - Scans for Every Occasion
Module 04 - Back Pocket Scans
Module 05 - Useful Scanning Options
Module 06 - Nmap Pings - The Search for Hosts
Module 07 - Recon Scanning
Module 08 - Ninja Scanning
Module 09 - Output Options
Module 10 - Windows and Nmap
Module 11 - Real-World Nmap Scanning
Bonus Content

Download:

http://rapidshare.com/files/245053442/GSM-pmnstc.part01.rar
http://rapidshare.com/files/245058537/GSM-pmnstc.part02.rar
http://rapidshare.com/files/244999106/GSM-pmnstc.part03.rar
http://rapidshare.com/files/245003889/GSM-pmnstc.part04.rar
http://rapidshare.com/files/245008510/GSM-pmnstc.part05.rar
http://rapidshare.com/files/245013020/GSM-pmnstc.part06.rar
http://rapidshare.com/files/245017998/GSM-pmnstc.part07.rar
http://rapidshare.com/files/245023011/GSM-pmnstc.part08.rar
http://rapidshare.com/files/245027104/GSM-pmnstc.part09.rar
http://rapidshare.com/files/245031301/GSM-pmnstc.part10.rar Read more..
Your rating: None Average: 2.7 (11 votes)

Password less SSH login to another server can be very useful when you want to configure a remote backup server or when migrating servers. For enabling this you need to have openSSH installed on the server. Here is a tutorial on how to configure password less SSH login to server ‘mars’ from server ‘earth’

1. Login to earth as root.

2. Run the command ssh-keygen -t rsa
If the key already exists you can either go to step 3 or you can generate a new key by overwriting existing key (see image). It would be better to overwrite the existing key if you did not generate it.




3. Change directory to /root/.ssh/

root@earth:~# cd /root/.ssh/
root@earth:~/.ssh#

4. Copy the contents of the file id_rsa.pub to the directory /root/.ssh/authorized_keys
scp -P id_rsa.pub root@mars_server_IP:/root/.ssh/authorized_keys

5. You will be able to login to the remote server ‘mars’ by typing ssh root@mars_server_IP -p without password nowRead more..

Your rating: None Average: 3.8 (13 votes)

Is Linux secure? The question is much less useful, than 'Is Linux "securable"?' The answer to the latter is a definite yes.

Being securable means that Linux can be made more secure (to whatever degree necessary) by applying a clearly defined sequence

of steps that always produces the same result, and that can be automated and applied to systems that have been in operation for

a long time. It would be ideal to be able to make securing systems understandable by regular system administrators who don’t

have formal security training. However, the last requirement might be pushing it a bit, since security will likely always

require expertise.

Linux can be made more secure by hardening the system.

=================
| 1) Intruduction |
===================

I wrote a step by step paper how to secure linux server with cP/WHM and
Apache installed. By default, linux is not secured enough but you have
to understand there is no such thing as "totally secured server/system".
The purpose of this paper is to understand how to at least provide some
kind of security to the server. I prefer lsws web-server without anyRead more..
Your rating: None Average: 4.8 (21 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

Not all problems have a technological answer, but when they do, that is the more lasting solution.

Explore Tags

Follow Us

buy tablet pc