Maltego is proprietary software used for open-source intelligence and forensics, developed by Paterva. Maltego focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining.Maltego permits creating custom entities, allowing it to represent any type of information in addition to the basic entity types which are part of the software. The basic focus of the application is analyzing real-world relationships between people, groups, websites, domains, networks, internet infrastructure, and affiliations with online services such as Twitter and Facebook. It is also mentioned in an episode of mtv webbed season 2, by a cyber expert sunny vaghela.
Saturday, 30 August 2014
Maltego Tutorial
Maltego is proprietary software used for open-source intelligence and forensics, developed by Paterva. Maltego focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining.Maltego permits creating custom entities, allowing it to represent any type of information in addition to the basic entity types which are part of the software. The basic focus of the application is analyzing real-world relationships between people, groups, websites, domains, networks, internet infrastructure, and affiliations with online services such as Twitter and Facebook. It is also mentioned in an episode of mtv webbed season 2, by a cyber expert sunny vaghela.
Hack wordpress vulnerability exploit
WordPress users are strongly encouraged to update their sites to 3.9.2 as it’s a security focused release.Since the vulnerability is present in WordPress 3.5 to 3.9.1, there are several sites that need to be manually updated in order to be protected. Automatic updates for security releases was introduced in WordPress 3.7, leaving users of 3.6 and 3.5 especially vulnerable.According to stats on WordPress.org, 26.8% of all WordPress sites will not be auto updated. Among those sites, 18.8% are still using WordPress 3.5.
Tuesday, 26 August 2014
Joomla Vulnerability Scanner
OWASP Joomla Vulnerability Scanner Joomla! is probably the most widely-used CMS
watching its vulnerabilities and adding such vulnerabilities as KB to Joomla scanner takes ongoing activity.It will help web developers and web masters to help identify possible security weaknesses on their deployed Joomla! sites. No web security scanner is dedicated only one CMS.
Saturday, 23 August 2014
Network Vulnerable Scan
Introduction How to Use Nessus Vulnerability Scanner.
Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritized list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process.
This video shows you how-to get started using the Nessus vulnerability scanner, including: 1.Where to download Nessus 2.Introduction to policies, scans, and reports 3.Performing an asset discovery scan 4.Running a network-based vulnerability scan 5.Configuring a patch uditing scan 6.Performing a configuration audit 7.Detecting sensitive data (SSN & credit cards) 8.Running web application tests 9.Reporting & filtering 10.Risk analysis and compliance (PCI DSS)
CERTIFIED ETHICAL HACKING
An Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.
Certified Ethical Hacking Professional training videos:
01. Certified Ethical Hacker Series Introduction 02. Introduction to Certified Ethical Hacking 03. VMWare and Linux 04. Footprinting and Reconnaissance Part 1 05. Footprinting and Reconnaissance Part 2 06. Scanning Part 1 07. Scanning Part 2 08. Enumeration 09. Passwords Part 1 Windows 10. Passwords Part 2 Linux 11. System Hacking 12. Malware 13. Hack O Rama 14. Sniffing 15. Social Engineering 16. Denial of Service 17. Session Hijacking 18. Web and SQL Hacking 19. Cryptography 20. Intrusion Detection Systems 21. Hacking Wireless Networks
Web Application Penetration Testing
The following sections describe the 12 subcategories of the Web Application Penetration Testing Methodology:
1. Introduction and Objectives 2. Information Gathering 3. Configuration and Deployment Management Testing 4. Identity Management Testing 5. Authentication Testing 6. Authorization Testing 7. Session Management Testing 8. Input Validation Testing 9. Error Handling 10. Cryptography 11. Business Logic Testing 12. Client Side Testing
This article is part of the new OWASP Testing Guide v4. At the moment the project is in the REVIEW phase.

