Saturday, 30 August 2014

Maltego Tutorial

maltego basic

maltego advance

Maltego is proprietary software used for open-source intelligence and forensics, developed by Paterva. Maltego focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining.Maltego permits creating custom entities, allowing it to represent any type of information in addition to the basic entity types which are part of the software. The basic focus of the application is analyzing real-world relationships between people, groups, websites, domains, networks, internet infrastructure, and affiliations with online services such as Twitter and Facebook. It is also mentioned in an episode of mtv webbed season 2, by a cyber expert sunny vaghela.
Facebook.com Twitter.com Youtube.com

Hack wordpress vulnerability exploit

WordPress users are strongly encouraged to update their sites to 3.9.2 as it’s a security focused release.Since the vulnerability is present in WordPress 3.5 to 3.9.1, there are several sites that need to be manually updated in order to be protected. Automatic updates for security releases was introduced in WordPress 3.7, leaving users of 3.6 and 3.5 especially vulnerable.According to stats on WordPress.org, 26.8% of all WordPress sites will not be auto updated. Among those sites, 18.8% are still using WordPress 3.5.

Facebook.com Twitter.com Youtube.com

Tuesday, 26 August 2014

Hack Facebook Page By Haroun ScorpionS

Hack Facebook Page By Haroun ScorpionS

Facebook.com Twitter.com Youtube.com

Hack a Website with Metasploit


Hack and Deface a Website with Metasploit

Facebook.com Twitter.com Youtube.com

Joomla Vulnerability Scanner


OWASP Joomla Vulnerability Scanner Joomla! is probably the most widely-used CMS
watching its vulnerabilities and adding such vulnerabilities as KB to Joomla scanner takes ongoing activity.It will help web developers and web masters to help identify possible security weaknesses on their deployed Joomla! sites. No web security scanner is dedicated only one CMS.

Download

Facebook.com Twitter.com Youtube.com

Saturday, 23 August 2014

Network Vulnerable Scan

Introduction How to Use Nessus Vulnerability Scanner.

Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritized list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process.

This video shows you how-to get started using the Nessus vulnerability scanner, including: 1.Where to download Nessus 2.Introduction to policies, scans, and reports 3.Performing an asset discovery scan 4.Running a network-based vulnerability scan 5.Configuring a patch uditing scan 6.Performing a configuration audit 7.Detecting sensitive data (SSN & credit cards) 8.Running web application tests 9.Reporting & filtering 10.Risk analysis and compliance (PCI DSS)

Facebook.com Twitter.com Youtube.com

CERTIFIED ETHICAL HACKING

An Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.

Certified Ethical Hacking Professional training videos:

01. Certified Ethical Hacker Series Introduction
02. Introduction to Certified Ethical Hacking  
03. VMWare and Linux 
04. Footprinting and Reconnaissance Part 1
05. Footprinting and Reconnaissance Part 2
06. Scanning Part 1
07. Scanning Part 2
08. Enumeration
09. Passwords Part 1 Windows 
10. Passwords Part 2 Linux 
11. System Hacking 
12. Malware 
13. Hack O Rama
14. Sniffing 
15. Social Engineering 
16. Denial of Service
17. Session Hijacking
18. Web and SQL Hacking 
19. Cryptography
20. Intrusion Detection Systems
21. Hacking Wireless Networks
 
Facebook.com Twitter.com Youtube.com

Web Application Penetration Testing

The following sections describe the 12 subcategories of the Web Application Penetration Testing Methodology:

1. Introduction and Objectives
2. Information Gathering
3. Configuration and Deployment Management Testing
4. Identity Management Testing
5. Authentication Testing
6. Authorization Testing
7. Session Management Testing
8. Input Validation Testing
9. Error Handling
10. Cryptography
11. Business Logic Testing
12. Client Side Testing
 
This article is part of the new OWASP Testing Guide v4. At the moment the project is in the REVIEW phase.
Facebook.com Twitter.com Youtube.com

SonicRun