Quantcast
Channel: Information Security Expert Blog »» Penetration Test
Browsing all 9 articles
Browse latest View live

Security Expert Releases New Linux Distribution for Ethical Hacking and...

The Live Hacking CD is a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. Based on Ubuntu this ‘Live CD’ runs directly...

View Article


Live Hacking CD a Huge Success; Initial Download Figures for Ethical Hacking...

Live Hacking CD, a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification, was only released a few weeks ago but already there...

View Article


New Linux Mini Distribution for Penetration Testing and Ethical Hacking Fits...

Following the success of the Live Hacking CD a Linux distribution packed with tools for ethical hacking and penetration testing, I decided to turn my attention to a smaller, leaner variant which fits...

View Article

Constructive vs. Destructive Competition

Information security is a complicated field with many branches and specializations. There are many information security related  training programs and certification exams like CISSP, CEH, CHFI, CISM,...

View Article

Nmap Defcon Release: Version 5.35DC1‏

This new release includes 131 NSE scripts (17 new), 6,622 version detection signatures, 2,608 OS fingerprints with reference to Insecure.org. This version has the new db2 and ms-sql scripts, and nfs-ls...

View Article


Apple is In Top Ten Vendors with Most Vulnerabilities

Vulnerability scanner software and appliances are popular in information security communities. They are known for their ease of use by those who are looking for an automated solution to test computer...

View Article

Metasploit Framework 3.4.1 Released

This release has 16 new exploits, 22 new auxiliary modules and 11 new Meterpreter scripts. Metasploit Framework 3.4.1 has 567 exploits and 283 auxiliary modules. In this version more than 40 reported...

View Article

How to Test Snort with Penetration Testing Tools

Recently, I deployed Snort on a cloud-based network to act as an Intrusion Detection System (IDS). The installation process and compiling Snort on a cloud server with CentOS 5.7 is an adventure on its...

View Article


Simple PHP Shell Script

Here is a simple PHP shell script which took less than 10 minutes to write. This tiny script lets you execute arbitrary shell commands or browse the filesystem on a remote Linux server. <HTML>...

View Article

Browsing all 9 articles
Browse latest View live