A unique Site with Unique Contents!
pwntooth (pown-tooth) is designed to automate Bluetooth Pen-Testing. It scans for devices, then runs the tools specified in the pwntooth.conf; included blueper, bluesnarfer, Bluetooth Stack Smasher (BSS), carwhisperer, psm_scan, rfcomm_scan, and vcardblaster.

pwntooth is a fully automated "search and destroy" tool for advanced users who wish to run a series of tests against each device in the target area. While there are some pre-configured lines in the pwntooth.conf file, it is mostly designed for users to specify their own pen-testing configuration. pwntooth can be used in conjunction with mant other tools not included in the package.

Included utilities in the toolsetRead more..

Your rating: None Average: 2.5 (2 votes)

Thinking build your own social network, here is a list of free social network application  that able to build online social network for you own online Community similar like successful website such as MySpace, Bebo, and Facebook features.
Read more..
Your rating: None Average: 2.8 (4 votes)


When you hear of computer forensics, the first thing that pops to mind might be a Crime Scene Investigator, pulling the plastic sheet off of a computer and inspecting for signs of a struggle. Nobody really ever talked about forensics in daily life until they started making those scientifically accurate primetime cop shows, so of course, simple word association generally leads us to forensic sciences being “Something cops do, right?”

Incidentally, the science behind computer forensics really isn’t much different from the science between crime scene forensics. In both instances, the forensics team or expert is looking for a trail of evidence. In either case, the investigator looks at what has happened, determines how it happened, and from that, deducts who might be responsible.

The major difference between the two is that, while an investigator on the scene of a robbery or a violent crime is looking for physical evidence, the computer forensics investigator is looking for digital evidence.

Interestingly, where physical evidence can often be misleading, confusing, ambiguous, and difficult to put together without the help of witness statements, digital evidence tends to present itself in a much more direct manner.

Read more..

Your rating: None Average: 4 (3 votes)

Have you ever wanted to try the Android OS? but didn’t have the device that supports it, don’t worry you can still try the Google Android OS on your PC with the help of Live Android Image, just burn it on a disc and you are ready to experience the Android world, Insert the Disc and reboot your PC, Boot into Android OS, During Bootup you can use alt+F1 or alt+F7 to switch between GUI and console.


Google Chrome OS has also been announced, and it could be a better version of Android OS or may be completely different form of Linux OS specially designed for netbooks during its initial phase (releasing in second half of 2010), later it will also become available for mainstream desktop PCs.Read more..

Your rating: None Average: 4.6 (29 votes)


• Security testing methodologies
• The Ethical Hacking Profession
• Passive Intelligence Gathering – 2007 Version
• Network Sweeps
• Stealthily Network Recon
• Passive traffic identification
• Identifying system vulnerabilities
• Abusing Domain Name System (DNS)
• Abusing Simple Network Management Protocol
(SNMP)

• Introduction to Remote Exploits
• Engineering remote exploits
• Running shellcode in RAM vs. on disk
• Heap Buffer Overflows
• Compromising Windows 2003 Server Systems
• Compromising Solaris Unix and Linux Systems
• Attacking RDP (Remote Desktop Protocol) in
Windows XP, 2003 & Vista
• Windows password weaknesses & Rainbow Tables
• Unix password weaknesses
• Attacking Cisco’s IOS password weaknessesRead more..

Your rating: None Average: 3 (2 votes)

Using some tiny mirrors and basic electronic components, you can create your own security system Read more..
Your rating: None Average: 4.4 (8 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

Time is our most precious asset, we should invest it wisely.

Explore Tags

Follow Us