Henry864

  • While teaching web application security and penetration testing, one of the most prevalent questions from the audience at the end of every week is: “How and where can I (legally) put in practice all the knowledge and test all the different tools we have covered during the training (while preparing for the next real-world engagement)?” Along the…[Read more]

  • Several of you have you have emailed me asking whether it’s possible to install a keylogger on a victim’s computer using Metasploit. The answer is a resounding “YES”!

    So, by popular request, in this guide I’ll show you how to install a keylogger on your girlfriend’s, boyfriend’s, wife’s, or husband’s computer.

    For those of you wondering what a…[Read more]

  • When it comes to Linux distributions dedicated to ethical hacking and pen testing, very often we list Kali Linux and Parrot Security OS as our favorites. In this article, I’m going to tell you about Matriux — a Debian-based Linux operating system crafted for security enthusiasts.

    The operating system comes with more than 300 open source tools for…[Read more]

  • Henry864 replied to the topic kali linux version 2 in the forum Tools 4 years, 10 months ago

    We’re still buzzing and recovering from the Black Hat and DEF CON conferences where we finished presenting our new Kali Linux Dojo, which was a blast. With the help of a few good people, the Dojo rooms were set up ready for the masses – where many generated their very own Kali 2.0 ISOs for the first time. But the excitement doesn’t end for us ju…[Read more]

  • It’s the method of testing where the areas of weakness in software systems in terms of security are put to test to determine, if ‘weak-point’ is indeed one, that can be broken into or not.

    Step #1. It starts with a list of Vulnerabilities/potential problem areas that would cause a security breach for the systems.
    Step #2. If possible, this list…[Read more]

  • In information security circles, 2014 has been a year of what seems like a never-ending stream of cyberthreats and data breaches, affecting retailers, banks, gaming networks, governments and more.

    The calendar year may be drawing to a close, but we can expect that the size, severity and complexity of cyber threats to continue increasing, says…[Read more]

  • Customers usually turn to the internet to get information and buy products and services. Towards that end, most organizations have websites.Most websites store valuable information such as credit card numbers, email address and passwords etc. This has made them targets to attackers. Defaced websites can also be used to communicate religious or…[Read more]

  • Sometimes, if you forgot the Windows 7 administrator or user password, things can get tricky. Aside from using a previously created password reset disk to change your password to a new one, there is no Windows-provided way to help you bypass or remove password on Windows 7, 10, 8, Vista, XP, 2000, Server 2008, 2003. Luckily that’s no longer the…[Read more]

  • Is there a way to check which memory protection mechanize is used by the OS?

    I have a program that fails with segmentation fault, in one computer (ubuntu) but not in another (RH6).

    One of the explanations was memory protection mechanize used by the OS. Is there a way I can find / change it?

    Thanks,
    http://academy.ehacking.net/

  • (Cyberwar.news) As the modern world increasingly becomes “wired,” more critical systems and infrastructure are being linked via the Internet. And while that has given rise to incredible new technologies that boost efficiency and capability, it has also meant that countries are more vulnerable to hacking and cyber attack.

    Most nations do their bes…[Read more]

  • I am curious for peoples opinions on white hat hackers hacking vulnerable hosts and patching and backdooring them. I did some research and found this group who had compromised 1000’s of hosts just to secure them. Looking for some feedback – I did a write up on this at one of my sites and opened it up for comments but comments here are just as…[Read more]

  • With the arrival of the Pebble Time Round this week, the smart watch market is heating up. We’ve been talking about wearables technology for a long time, but designing one people would actually wear has been elusive. As almost 90% of the standard watch market is made up of round watches, the new Pebble has joined an exclusive club. It’s one of the…[Read more]

  • Hackers are vowing to unlock the iPhone from the O2 mobile network, just days before it goes on sale in Britain. The £269 touchscreen mobile phone, dubbed “revolutionary” by its maker, Apple, is already one of the most eagerly awaited of gadgets and stores are expecting a shopper frenzy as it goes on sale in the UK this week.

    Combining the music…[Read more]

  • One hacker has found a 30-second trick to bypass the iPhone’s lock screen on iOS 9 to access private information through Siri. Protect yourself with a simple update This hack comes days after French security firm Zerodium announced a total of $3m bounty rewards for iOS exploits and jailbreaks until October 31 – but the condition is the attacker…[Read more]

  • Ready to ace your Certified Ethical Hacker (CEH) certification exam? You’ve come to the right place. This comprehensive, 300+ question study guide will equip you with the all of the required knowledge to be successful on the certification exam. You’ll review important topics such as the elements of security, testing methodologies and various att…[Read more]

  • A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the…[Read more]

  • Hi Friend,
    If You are Looking for Certified Ethical Hacking Training institute in Bangalore, then Blue Ocean Learning is the Exact Place to You to Go, where you will get the End-to-End Training in Cloud Computing Technology.

    Blue Ocean Learning Ethical Hacking Training includes the Following:

    CERTIFIED ETHICAL HACKING

    Introduction to Ethical…[Read more]

  • This is the bundle program composed of two must take info-sec courses. Using this bundle program you can strengthen your python & hacking skills. You will learn to automate most of the hacking tasks using the scripts and you will also learn to introduce your own scripts to solve the run-time issues and challenges.

    Embrace yourself for Python,…[Read more]

  • This is the bundle program composed of two must take info-sec courses. Using this bundle program you can strengthen your python & hacking skills. You will learn to automate most of the hacking tasks using the scripts and you will also learn to introduce your own scripts to solve the run-time issues and challenges.

    Embrace yourself for Python,…[Read more]

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?