Check it out here!
Note: Be aware that there are many unofficial releases of Backtrack 5r3. Be sure to download Backtrack 5r3 from the official source www.backtrack-linux.org.
Metasploit: The Penetration Tester’s Guide is written by Dave (ReL1K) Kennedy, Jim O’Gorman (_Elwood_), Devon Kearns (dookie2000ca), and Mati Aharoni (muts). This book is an essential read for anyone looking to get into the field of Penetration Testing as well as seasoned veterans. There are a ton of examples through out the book that make it more interactive and enjoyable to read. Below I will go over a chapter by chapter analysis. Continue reading →
Google Dorks are advanced search parameters that you can use with Google’s search engine to narrow down a search. Google Hacking is the art of using Google Dorks to find specific information on Google’s databases. For example finding a known vulnerable version of a web application. Continue reading →
Just in case you missed it Backtrack 5 r2 has been released with a ton of new tools including Reaver, Pyrit, and Pipal. The distribution also includes huge improvements to existing tools including Metasploit, Armitage, BeEF, and SET. The new distribution can be found on the Backtrack website.
I thought it would be nice to write about what you should do when your *nix server is compromised. The idea came from a conversation that was sparked on the Full Disclosure List. Continue reading →
If you are looking for a way to secure your linux server from some of the most common attacks being carried out today against linux servers then look no further then Rel1K’s Artillery program. Artillery is a combination of a honeypot, file monitoring and integrity, alerting, and brute force prevention tool. Continue reading →
SQL Injection (SQLi) is an attack vector that is extremely easy to carry out. Most of the breaches you see today are perpetrated this way yielding huge payloads of data. Understanding this attack will help you defend against this type of attack. Continue reading →
Weblabyrinth is a dynamic maze of web pages written in PHP. The main goal of Weblabyrinth is to delay and occupy malicious web scanners to give incident handlers time to investigate and respond to threats. Weblabyrinth is designed to show a 404 error to legitimate web crawlers based on the crawlers user-agent. Here is how you install and configure Weblabyrinth. Continue reading →
© 2011-2013 LokiSec.com All Rights Reserved