Check it out here!
Note: Be aware that there are many unofficial releases of Backtrack 5r3. Be sure to download Backtrack 5r3 from the official source www.backtrack-linux.org.
Google Dorks are advanced search parameters that you can use with Google’s search engine to narrow down a search. Google Hacking is the art of using Google Dorks to find specific information on Google’s databases. For example finding a known vulnerable version of a web application. Read More »
Just in case you missed it Backtrack 5 r2 has been released with a ton of new tools including Reaver, Pyrit, and Pipal. The distribution also includes huge improvements to existing tools including Metasploit, Armitage, BeEF, and SET. The new distribution can be found on the Backtrack website.
Social Engineering Toolkit (SET) is a social engineering pen testing framework created by Dave (ReL1K) Kennedy. SET contains numerous tools to help pen testers test the human element during a security engagement. Read More »
Maintaining a website can be a large task. On the security side of the day to day tasks for the site you usually patch the web server and check the logs for potential issues. There are many automated tools that are out there scanning the internet for vulnerable web servers to compromise. Typically a compromised web server is turned into a spam serving server. What about your web application that you use to serve your content? Can you trust that it does not allow the attacker access to your web server? This is where w3af comes in. w3af attempts to find vulnerabilities in your web application using known attack methods. Read More »
Armitage is a great attack management tool for Metasploit. Armitage shows a graphical representation of your attack as you are putting it in motion. Armitage also allows for Red Teaming by allowing your team a way to collaborate an attack in the same Metasploit session. Read More »
Netcat has been called the TCP/IP swiss army knife and rightfully so. It can act as a service by listening for a connection, a client and connect to open ports, a port scanner, a tool used to fingerprint a connectable service, and much more. In this article I will touch on handful of these abilities.
Read More »
So you have done some recon on your potential target and now you are on the exploitation phase of your pentest. Metasploit can connect to a database to keep track of the recon you collected on your targets. You can import an xml report from your Nmap scan or you can use the db_nmap command in Metasploit. That is jumping the gun a little. We will first need to bring up Metasploit and then create a database connection to your database of choice. All examples and commands will be done through Backtrack 4 R2. Read More »