LokiSec.com

LokiSec.com
  • Security
    • Security Tools
    • Website Defense
    • Personal Security
    • Standards
    • Lab
  • Books
    • Technical

Standard

Creating a Lab with VMware ESXi

April 12, 2014 by CyberRad

Setting up a lab is an easy and cheap endeavor that nets you huge advantages in gaining hands on knowledge.  All it takes is a spare machine that has a decent amount of RAM, a NIC, and a sizable hard drive.  Below I will outline steps which you can follow to create your own ESXi Lab environment. Continue reading →

Posted in Lab · Tagged how to, Lab, network, pfsense, smhack, tutorial, vdisk, virtual, vm, vmware, vNIC · 1 Reply ·

Standard

Backtrack 5 r3 has been released!

August 13, 2012 by CyberRad

Check it out here!

Note: Be aware that there are many unofficial releases of Backtrack 5r3.  Be sure to download Backtrack 5r3 from the official source www.backtrack-linux.org.

Posted in Security Tools · Tagged aircrack-ng, armitage, Backtrack, cree.py, Linux, metasploit, Nmap, Pentest, scan, security, Snort, tools, w3af · Leave a Reply ·

Standard

Metasploit: The Penetration Tester’s Guide

June 1, 2012 by CyberRad

Metasploit: The Penetration Tester’s Guide is written by Dave (ReL1K) Kennedy,  Jim O’Gorman (_Elwood_), Devon Kearns (dookie2000ca), and Mati Aharoni (muts).  This book is an essential read for anyone looking to get into the field of Penetration Testing as well as seasoned veterans.  There are a ton of examples through out the book that make it more interactive and enjoyable to read.  Below I will go over a chapter by chapter analysis. Continue reading →

Posted in Books, Technical · Tagged Anti-Virus, armitage, assembly, AV, Backtrack, debugger, hacker, metasploit, meterpreter, msfconsole, msfencode, Nmap, Pentest, PTES, security, shell, vulnerability · Leave a Reply ·

Standard

Google Hacking

April 15, 2012 by CyberRad

Google Dorks are advanced search parameters that you can use with Google’s search engine to narrow down a search.  Google Hacking is the art of using Google Dorks to find specific information on Google’s databases.  For example finding a known vulnerable version of a web application.  Continue reading →

Posted in Security Tools, Website Defense · Tagged default, dorks, file, google, hacking, page, password, Pentest, scan, security, tools, tutorial, username, web · Leave a Reply ·

Standard

Backtrack 5 r2 has been released!

March 1, 2012 by CyberRad

Just in case you missed it Backtrack 5 r2 has been released with a ton of new tools including Reaver, Pyrit, and Pipal.  The distribution also includes huge improvements to existing tools including Metasploit, Armitage, BeEF, and SET.  The new distribution can be found on the Backtrack website.

Posted in Security, Security Tools · Tagged armitage, Backtrack, Linux, metasploit, Nmap, scan, SET, tools · Leave a Reply ·

Standard

Going Phishing with the Social Engineering Toolkit

January 17, 2012 by CyberRad

Social Engineering Toolkit (SET) is a social engineering pen testing framework created by Dave (ReL1K) Kennedy.  SET contains numerous tools to help pen testers test the human element during a security engagement. Continue reading →

Posted in Security Tools · Tagged Backtrack, hacker, metasploit, meterpreter, Pentest, security, SET, Social Engineering Toolkit, tools, tutorial · 15 Replies ·

Standard

What to do after your *nix web server has been compromised

December 17, 2011 by CyberRad

I thought it would be nice to write about what you should do when your *nix server is compromised.  The idea came from a conversation that was sparked on the Full Disclosure List. Continue reading →

Posted in Website Defense · Tagged apache, CentOS, iptables, Linux, log, netstat, php, Red Hat, security, Suse, tutorial, Ubuntu, Unix, web, website · Leave a Reply ·

Standard

Using Rel1K’s Artillery To Protect Your Server

October 26, 2011 by CyberRad

If you are looking for a way to secure your linux server from some of the most common attacks being carried out today against linux servers then look no further then Rel1K’s Artillery program. Artillery is a combination of a honeypot, file monitoring and integrity, alerting, and brute force prevention tool. Continue reading →

Posted in Website Defense · Tagged apache, Dave, Derbycon, free hugs, Linux, rel1K, scan, security, SET, tools, tutorial, web, website · Leave a Reply ·

Standard

How to perform a SQL Injection Attack

September 26, 2011 by CyberRad

SQL Injection (SQLi) is an attack vector that is extremely easy to carry out.  Most of the breaches you see today are perpetrated this way yielding huge payloads of data.  Understanding this attack will help you defend against this type of attack. Continue reading →

Posted in Security, Website Defense · Tagged asp, audit, coldfusion, Injection, php, SQL, SQL Injection, SQLi, tutorial, vulnerability, web, website · Leave a Reply ·

Standard

Cracking the wireless network using aircrack-ng

August 12, 2011 by CyberRad

Aircrack-ng is a suite of programs that allow for auditing of IEEE 802.11 networks.  Below I will go over using the Aircrack-ng suit in Backtrack 5 to capture and crack WEP and WPA. Continue reading →

Posted in Security Tools · Tagged 802.11, aircrack-ng, Backtrack, network, Pentest, tools, tutorial, WEP, wireless, WPA, WPA2 · Leave a Reply ·
← Older posts

Recent Posts

  • Creating a Lab with VMware ESXi
  • Backtrack 5 r3 has been released!
  • Metasploit: The Penetration Tester’s Guide
  • Google Hacking
  • Backtrack 5 r2 has been released!

Archives

  • April 2014
  • August 2012
  • June 2012
  • April 2012
  • March 2012
  • January 2012
  • December 2011
  • October 2011
  • September 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011

Tags

802.11 aircrack-ng aliases apache armitage audit Backtrack cree.py creepy flicker geolocation GUI hacker iis Linux metasploit meterpreter netcat network Nmap No Pentest php PTES Quality scan security SET Snort SQLi swiss army knife tools tutorial twitter Uber user-agent vulnerability w3af web weblabyrinth website WEP wireless WPA WPA2

Search

Spread the word!

Blogroll

  • Carnal0wnage
  • Darknet
  • DigiNinja
  • McGrew Security
  • mubix
  • PaulDotCom
  • SpyLogic
  • TaoSecurity
Copyright © 2017 - 2018 LokiSec.com. All Rights Reserved. Created by Blog Copyright.