July 02, 2011

ARP Poisoning with Ettercap + Video

 Ettercap is a suite for man in the middle attacks on LAN (local area network ). It features sniffing of live connections, content filtering on the fly and many other interesting tricks.It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. In this tutorial i will explain how to sniff (user names,passwords) in LAN using Ettercap


May 14, 2011

Metasploit Framework 3.7.0 Released!

The Metasploit team has spent the last two months focused on one of the least-visible, but most important pieces of the Metasploit Framework; the session backend. Metasploit 3.7 represents a complete overhaul of how sessions are tracked within the framework and associated with the backend database. This release also significantly improves the staging process for the reverse_tcp stager and Meterpreter session initialization. Shell sessions now hold their output in a ring buffer, which allows us to easily view session history -- even if you don't have a database.


April 06, 2011

The 10 Commandments of Internet Safety

Must draw a distinction between two types of hackers, the firstaims to do something bad, and the second aimed to create digital solutions more secure and in this sense we will give you a number of tips to avoid falling into the trap of bad hacking,

March 29, 2011

A penetration test by Metasploit and see the alarm monitoring in Snort

In the previous episode we saw how to do adjust Snort, but we did not see it if working or not, and today we monitor the results when attack Windows XP with metasploit in Video.

March 20, 2011

Hack Passwords Using USB Drive

Today we will show you how to hack Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer. We need the following tools to create our rootkit.




March 03, 2011

Network intrusion methodology

The goal of this article is to explain the methodology that pirates generally use to infiltrate a computer system. Its purpose is not to explain how to compromise a system but to help you understand how the process works so you can better protect yourself. The best way to protect your system is to use the same approach pirates do in order to map the system's vulnerabilities. As such, this article does not provide specific information about how flaws are exploited, but rather it explains how to detect and correct them.




March 01, 2011

The different types of attacks

The computer is a very wide area, the number of vulnerabilities on system may be important. Thus, attacks against these vulnerabilities may be the both very diverse and very dangerous. Therefore we will initially analyze what we call "the anatomy of an attack, then a second time, we characterize these attacks and observe their progress.



February 15, 2011

Attack Types and Vulnerabilities

Introduction

There exist numerous ways to attack a target system. It could be achieved by exploiting known vulnerabilities in software or taking advantage of a badly configured security policy; it could be implemented remotely or internally. The techniques and methods used are likely to vary depending on the target and they should be chosen appropriately having assessed the situation fully. The attack types and vulnerabilities discussed in this module, are:

• Buffer Overflow attacks.

• Denial of Service (DoS) attacks.

• Misconfigurations.

• Abuse of Trust.

• Brute force attacks.

• CGI and WWW services.

• Back doors and Trojans.
 

Who The Hackers Are ?


The hackers are just like us. Made of same flesh and bones but think differently. What normal people cannot think even in their dreams, hackers can do that in reality.

The hackers possess higher degree of attitude and fortitude. Whatever they do is for humanity. They are responsible for the modern day technology and they have developed the techniques to cop with future problems. They are responsible for creating and updating the top security systems. Think about it, if hackers will be absent from our society, then, our society will be totally unable to secure the country and will be considered as a dull society.