-
Henry864 replied to the topic PentesterLab – Free Courses and ISOs for WebApp Pentesting in the forum Web Applications 4 years, 7 months ago
While teaching web application security and penetration testing, one of the most prevalent questions from the audience at the end of every week is: “How and where can I (legally) put in practice all the knowledge and test all the different tools we have covered during the training (while preparing for the next real-world engagement)?” Along the…[Read more]
-
Henry864 replied to the topic hacking tools: pc keylogger, mac keylogger, mobile keylogger in the forum Tools 4 years, 7 months ago
Several of you have you have emailed me asking whether it’s possible to install a keylogger on a victim’s computer using Metasploit. The answer is a resounding “YES”!
So, by popular request, in this guide I’ll show you how to install a keylogger on your girlfriend’s, boyfriend’s, wife’s, or husband’s computer.
For those of you wondering what a…[Read more]
-
Henry864 replied to the topic Alternative to Kali linux in the forum Tools 4 years, 7 months ago
When it comes to Linux distributions dedicated to ethical hacking and pen testing, very often we list Kali Linux and Parrot Security OS as our favorites. In this article, I’m going to tell you about Matriux — a Debian-based Linux operating system crafted for security enthusiasts.
The operating system comes with more than 300 open source tools for…[Read more]
-
Henry864 replied to the topic kali linux version 2 in the forum Tools 4 years, 7 months ago
We’re still buzzing and recovering from the Black Hat and DEF CON conferences where we finished presenting our new Kali Linux Dojo, which was a blast. With the help of a few good people, the Dojo rooms were set up ready for the masses – where many generated their very own Kali 2.0 ISOs for the first time. But the excitement doesn’t end for us ju…[Read more]
-
Henry864 replied to the topic Sharing my Penetration Testing Tools with Source in the forum Tools 4 years, 7 months ago
It’s the method of testing where the areas of weakness in software systems in terms of security are put to test to determine, if ‘weak-point’ is indeed one, that can be broken into or not.
Step #1. It starts with a list of Vulnerabilities/potential problem areas that would cause a security breach for the systems.
Step #2. If possible, this list…[Read more] -
Henry864 replied to the topic What are the interesting and trending topics in web security in the forum Web Applications 4 years, 7 months ago
In information security circles, 2014 has been a year of what seems like a never-ending stream of cyberthreats and data breaches, affecting retailers, banks, gaming networks, governments and more.
The calendar year may be drawing to a close, but we can expect that the size, severity and complexity of cyber threats to continue increasing, says…[Read more]
-
Henry864 replied to the topic webserver hacking in the forum Web Applications 4 years, 7 months ago
Customers usually turn to the internet to get information and buy products and services. Towards that end, most organizations have websites.Most websites store valuable information such as credit card numbers, email address and passwords etc. This has made them targets to attackers. Defaced websites can also be used to communicate religious or…[Read more]
-
Henry864 replied to the topic How to remove or reset Windows 7/Vista/XP/2000 password easily in the forum Physical Security 4 years, 7 months ago
Sometimes, if you forgot the Windows 7 administrator or user password, things can get tricky. Aside from using a previously created password reset disk to change your password to a new one, there is no Windows-provided way to help you bypass or remove password on Windows 7, 10, 8, Vista, XP, 2000, Server 2008, 2003. Luckily that’s no longer the…[Read more]
-
Henry864 replied to the topic Linux Memory Protection in the forum Programming 4 years, 7 months ago
Is there a way to check which memory protection mechanize is used by the OS?
I have a program that fails with segmentation fault, in one computer (ubuntu) but not in another (RH6).
One of the explanations was memory protection mechanize used by the OS. Is there a way I can find / change it?
Thanks,
http://academy.ehacking.net/ -
Henry864 replied to the topic wireless networks as a target for cyberwar? in the forum Cyber Warfare 4 years, 7 months ago
(Cyberwar.news) As the modern world increasingly becomes “wired,” more critical systems and infrastructure are being linked via the Internet. And while that has given rise to incredible new technologies that boost efficiency and capability, it has also meant that countries are more vulnerable to hacking and cyber attack.
Most nations do their bes…[Read more]
-
Henry864 replied to the topic Opinions on White Hat Hacking to protect Insecure hosts in the forum Cyber Warfare 4 years, 7 months ago
I am curious for peoples opinions on white hat hackers hacking vulnerable hosts and patching and backdooring them. I did some research and found this group who had compromised 1000’s of hosts just to secure them. Looking for some feedback – I did a write up on this at one of my sites and opened it up for comments but comments here are just as…[Read more]
-
Henry864 replied to the topic can you hack into a Pebble smartwatch? in the forum Hardware 4 years, 7 months ago
With the arrival of the Pebble Time Round this week, the smart watch market is heating up. We’ve been talking about wearables technology for a long time, but designing one people would actually wear has been elusive. As almost 90% of the standard watch market is made up of round watches, the new Pebble has joined an exclusive club. It’s one of the…[Read more]
-
Henry864 replied to the topic Hackers Race to Unlock iPhone in the forum Hardware 4 years, 7 months ago
Hackers are vowing to unlock the iPhone from the O2 mobile network, just days before it goes on sale in Britain. The £269 touchscreen mobile phone, dubbed “revolutionary” by its maker, Apple, is already one of the most eagerly awaited of gadgets and stores are expecting a shopper frenzy as it goes on sale in the UK this week.
Combining the music…[Read more]
-
Henry864 replied to the topic Using old iPhone to hack current iPhone in the forum Hardware 4 years, 7 months ago
One hacker has found a 30-second trick to bypass the iPhone’s lock screen on iOS 9 to access private information through Siri. Protect yourself with a simple update This hack comes days after French security firm Zerodium announced a total of $3m bounty rewards for iOS exploits and jailbreaks until October 31 – but the condition is the attacker…[Read more]
-
Henry864 replied to the topic CEH Study Material in the forum CEH – Certified Ethical Hacker 4 years, 7 months ago
Ready to ace your Certified Ethical Hacker (CEH) certification exam? You’ve come to the right place. This comprehensive, 300+ question study guide will equip you with the all of the required knowledge to be successful on the certification exam. You’ll review important topics such as the elements of security, testing methodologies and various att…[Read more]
-
Henry864 replied to the topic CEH application fee? in the forum CEH – Certified Ethical Hacker 4 years, 7 months ago
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the…[Read more]
-
Henry864 replied to the topic What would be the best certification in Ethical hacking? in the forum General Certification 4 years, 7 months ago
Hi Friend,
If You are Looking for Certified Ethical Hacking Training institute in Bangalore, then Blue Ocean Learning is the Exact Place to You to Go, where you will get the End-to-End Training in Cloud Computing Technology.Blue Ocean Learning Ethical Hacking Training includes the Following:
CERTIFIED ETHICAL HACKING
Introduction to Ethical…[Read more]
-
Henry864 replied to the topic Security Courses & Windows XP in the forum General Certification 4 years, 7 months ago
This is the bundle program composed of two must take info-sec courses. Using this bundle program you can strengthen your python & hacking skills. You will learn to automate most of the hacking tasks using the scripts and you will also learn to introduce your own scripts to solve the run-time issues and challenges.
Embrace yourself for Python,…[Read more]
-
Henry864 replied to the topic Online Security Degrees in the forum Security 4 years, 7 months ago
This is the bundle program composed of two must take info-sec courses. Using this bundle program you can strengthen your python & hacking skills. You will learn to automate most of the hacking tasks using the scripts and you will also learn to introduce your own scripts to solve the run-time issues and challenges.
Embrace yourself for Python,…[Read more]