Security

“Offensive Security 101 v.2.0? is a course designed for network administrators and security professionals who need to get acquainted with the world of offensive security. The course introduces the latest hacking tools and techniques, and includes remote live labs for exercising the material presented to the students.

This course gives a solid understanding of the penetration testing process, and is equally important for those wanting to either defend or attack their network.

Offensive Security 101 v.2.0 qualifies you for 40 ISC2 CPE Credits. This applies to students who submit their exercise documentation at the end of the course, or pass the certification challenge.
Read more..
Your rating: None Average: 3.2 (12 votes)

Required Tools:

Introduction

This tutorial includes all the code you'll need to carry out these exercises.Read more..

Your rating: None Average: 4 (3 votes)


Follow the steps below for unlimited mobile browsing hacking

After a Lot of research we have found another hack for free Unlimited GPRS for Airtel live users. The new trick for Airtel free web is as simple as installing a application on your mobile phone.

Actually the trick is to install a Mobile Web Browser called Teashark or Ucweb on your mobile phone.

2. Install the browser and select Airtel Live as the access point and start browsing absolutely free (Dont worry airtel wont charge you).

1. Download Teashark browser(for MIDP 2.0 handsets only) from here or from wap.teashark.com if you are using mobile browser.

Note: If Teashark browser doesnt work then go for Ucweb browser which can be downloaded from here. They also have lots of features like built-in download manager,search function,email service and also page saving options.

method 2 Try these proxys with the Teashark browser and Try the combinationsRead more..

Your rating: None Average: 2.3 (8 votes)

pwntooth (pown-tooth) is designed to automate Bluetooth Pen-Testing. It scans for devices, then runs the tools specified in the pwntooth.conf; included blueper, bluesnarfer, Bluetooth Stack Smasher (BSS), carwhisperer, psm_scan, rfcomm_scan, and vcardblaster.

pwntooth is a fully automated "search and destroy" tool for advanced users who wish to run a series of tests against each device in the target area. While there are some pre-configured lines in the pwntooth.conf file, it is mostly designed for users to specify their own pen-testing configuration. pwntooth can be used in conjunction with mant other tools not included in the package.

Included utilities in the toolsetRead more..

Your rating: None Average: 2.5 (2 votes)


When you hear of computer forensics, the first thing that pops to mind might be a Crime Scene Investigator, pulling the plastic sheet off of a computer and inspecting for signs of a struggle. Nobody really ever talked about forensics in daily life until they started making those scientifically accurate primetime cop shows, so of course, simple word association generally leads us to forensic sciences being “Something cops do, right?”

Incidentally, the science behind computer forensics really isn’t much different from the science between crime scene forensics. In both instances, the forensics team or expert is looking for a trail of evidence. In either case, the investigator looks at what has happened, determines how it happened, and from that, deducts who might be responsible.

The major difference between the two is that, while an investigator on the scene of a robbery or a violent crime is looking for physical evidence, the computer forensics investigator is looking for digital evidence.

Interestingly, where physical evidence can often be misleading, confusing, ambiguous, and difficult to put together without the help of witness statements, digital evidence tends to present itself in a much more direct manner.

Read more..

Your rating: None Average: 4 (3 votes)

Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find the password.. but when? How long will it take? The two-character password will require 26*26=676 combinations. The number of possible combinations (and therefore required time) grows rapidly as the length of the password increases and this method quickly becomes useless. Do you ready to wait for two months while your 9-character password is cracked? What about one hundred years for an 11-character password? Besides the maximal length of the character set you should also specify the character set i.e. the list of characters that will be included in the combinations. The longer the character set is, the longer the required period of time is. Here is the problem: usually you have no idea of what characters are present in the password.Read more..
Your rating: None Average: 3.8 (4 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

Always think outside the box and embrace opportunities that appear, wherever they might be.

Explore Tags

Follow Us