LokiSec.com

LokiSec.com
  • Security
    • Security Tools
    • Website Defense
    • Personal Security
    • Standards
    • Lab
  • Books
    • Technical

Posts Tagged Pentest

Archive

August 13, 2012 by CyberRad

Backtrack 5 r3 has been released!

Check it out here! Note: Be aware that there are many unofficial releases of Backtrack 5r3.  Be sure to download Backtrack 5r3 from the official source www.backtrack-linux.org.
Posted in Security Tools · Tagged aircrack-ng, armitage, Backtrack, cree.py, Linux, metasploit, Nmap, Pentest, scan, security, Snort, tools, w3af · Leave a Reply ·

Archive

June 1, 2012 by CyberRad

Metasploit: The Penetration Tester’s Guide

Metasploit: The Penetration Tester’s Guide is written by Dave (ReL1K) Kennedy,  Jim O’Gorman (_Elwood_), Devon Kearns (dookie2000ca), and Mati Aharoni (muts).  This book is an essential read for anyone looking to get into the field of Penetration Testing as well as seasoned veterans.  There are a ton of examples through out the book that make […]
Posted in Books, Technical · Tagged Anti-Virus, armitage, assembly, AV, Backtrack, debugger, hacker, metasploit, meterpreter, msfconsole, msfencode, Nmap, Pentest, PTES, security, shell, vulnerability · Leave a Reply ·

Archive

April 15, 2012 by CyberRad

Google Hacking

Google Dorks are advanced search parameters that you can use with Google’s search engine to narrow down a search.  Google Hacking is the art of using Google Dorks to find specific information on Google’s databases.  For example finding a known vulnerable version of a web application. 
Posted in Security Tools, Website Defense · Tagged default, dorks, file, google, hacking, page, password, Pentest, scan, security, tools, tutorial, username, web · Leave a Reply ·

Archive

January 17, 2012 by CyberRad

Going Phishing with the Social Engineering Toolkit

Social Engineering Toolkit (SET) is a social engineering pen testing framework created by Dave (ReL1K) Kennedy.  SET contains numerous tools to help pen testers test the human element during a security engagement.
Posted in Security Tools · Tagged Backtrack, hacker, metasploit, meterpreter, Pentest, security, SET, Social Engineering Toolkit, tools, tutorial · 15 Replies ·

Archive

August 12, 2011 by CyberRad

Cracking the wireless network using aircrack-ng

Aircrack-ng is a suite of programs that allow for auditing of IEEE 802.11 networks.  Below I will go over using the Aircrack-ng suit in Backtrack 5 to capture and crack WEP and WPA.
Posted in Security Tools · Tagged 802.11, aircrack-ng, Backtrack, network, Pentest, tools, tutorial, WEP, wireless, WPA, WPA2 · Leave a Reply ·

Archive

May 16, 2011 by CyberRad

Using Armitage, An attack management tool for Metasploit

Armitage is a great attack management tool for Metasploit.  Armitage shows a graphical representation of your attack as you are putting it in motion.  Armitage also allows for Red Teaming by allowing your team a way to collaborate an attack in the same Metasploit session.
Posted in Security Tools · Tagged armitage, Backtrack, GUI, metasploit, meterpreter, Pentest, tools, tutorial · Leave a Reply ·

Archive

May 12, 2011 by CyberRad

Backtrack 5 is here!

Just in case you missed it Backtrack 5 has been released.  Download it here.
Posted in Security Tools · Tagged Backtrack, Pentest, tools · Leave a Reply ·

Archive

May 10, 2011 by CyberRad

PTES – Penetration Testing Execution Standard

Penetration Testing… What is it?  To most companies, that either choose or are forced to get one, the image of Uber-hackers defiling their business critical systems comes to mind.  Yes, an Uber-hacker should be expected but this isn’t always the case.  There are a number of disreputable firms out there that run a Nessus scan […]
Posted in Standards · Tagged hacker, Pentest, PTES, Quality, Uber · Leave a Reply ·

Archive

May 5, 2011 by CyberRad

Using Netcat, the TCP/IP swiss army knife

Netcat has been called the TCP/IP swiss army knife and rightfully so.  It can act as a service by listening for a connection, a client and connect to open ports, a port scanner, a tool used to fingerprint a connectable service, and much more.  In this article I will touch on handful of these abilities.
Posted in Security Tools · Tagged Backtrack, netcat, network, Pentest, swiss army knife, tools, tutorial · 2 Replies ·

Archive

April 11, 2011 by CyberRad

Using Metasploit

So you have done some recon on your potential target and now you are on the exploitation phase of your pentest.  Metasploit can connect to a database to keep track of the recon you collected on your targets.  You can import an xml report from your Nmap scan or you can use the db_nmap command […]
Posted in Security Tools · Tagged Backtrack, metasploit, network, Pentest, tools, tutorial · Leave a Reply ·
← Older posts

Recent Posts

  • Creating a Lab with VMware ESXi
  • Backtrack 5 r3 has been released!
  • Metasploit: The Penetration Tester’s Guide
  • Google Hacking
  • Backtrack 5 r2 has been released!

Archives

  • April 2014
  • August 2012
  • June 2012
  • April 2012
  • March 2012
  • January 2012
  • December 2011
  • October 2011
  • September 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011

Tags

802.11 aircrack-ng aliases apache armitage audit Backtrack cree.py creepy flicker geolocation GUI hacker iis Linux metasploit meterpreter netcat network Nmap No Pentest php PTES Quality scan security SET Snort SQLi swiss army knife tools tutorial twitter Uber user-agent vulnerability w3af web weblabyrinth website WEP wireless WPA WPA2

Search

Spread the word!

Blogroll

  • Carnal0wnage
  • Darknet
  • DigiNinja
  • McGrew Security
  • mubix
  • PaulDotCom
  • SpyLogic
  • TaoSecurity