Setting up a lab is an easy and cheap endeavor that nets you huge advantages in gaining hands on knowledge. All it takes is a spare machine that has a decent amount of RAM, a NIC, and a sizable hard drive. Below I will outline steps which you can follow to create your own ESXi […]
Google Dorks are advanced search parameters that you can use with Google’s search engine to narrow down a search. Google Hacking is the art of using Google Dorks to find specific information on Google’s databases. For example finding a known vulnerable version of a web application.
Social Engineering Toolkit (SET) is a social engineering pen testing framework created by Dave (ReL1K) Kennedy. SET contains numerous tools to help pen testers test the human element during a security engagement.
If you are looking for a way to secure your linux server from some of the most common attacks being carried out today against linux servers then look no further then Rel1K’s Artillery program. Artillery is a combination of a honeypot, file monitoring and integrity, alerting, and brute force prevention tool.
SQL Injection (SQLi) is an attack vector that is extremely easy to carry out. Most of the breaches you see today are perpetrated this way yielding huge payloads of data. Understanding this attack will help you defend against this type of attack.
Weblabyrinth is a dynamic maze of web pages written in PHP. The main goal of Weblabyrinth is to delay and occupy malicious web scanners to give incident handlers time to investigate and respond to threats. Weblabyrinth is designed to show a 404 error to legitimate web crawlers based on the crawlers user-agent. Here is how […]
Maintaining a website can be a large task. On the security side of the day to day tasks for the site you usually patch the web server and check the logs for potential issues. There are many automated tools that are out there scanning the internet for vulnerable web servers to compromise. Typically a compromised […]
Armitage is a great attack management tool for Metasploit. Armitage shows a graphical representation of your attack as you are putting it in motion. Armitage also allows for Red Teaming by allowing your team a way to collaborate an attack in the same Metasploit session.