Skip to main content

Posts

What is Metasploit?

The Metasploit is an open source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development and a tool for developing and executing exploit code against a remote target machine. Metasplot can be installed in Microsoft Windows, Linux, or MAC OS X. Metasploit can check for the latest exploits on the web. Installation is simple for Microsoft Windows or Linux. As you see in the picture below. Read the PDF to get started. File Name: What is Metasploit.pdf File Type: PDF File Size: 991 KB Download Now

Webgoat

WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use SQL injection to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson. From http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project WebGoat is a platform independent environment. It utilizes Apache Tomcat and the JAVA development environment. The only thing required from the user is Java which can be downloaded from http://java.sun.com/downloads/ . Webgoat allows the user to practice in a safe environment with in the user’s network and webgoat can be run in Windows Linux, or MAC OS X. First let’s download the latest copy of webgoat http://code.google.com/p/webgo...

Lack of formal end-user training program makes IT look bad

The Author: Toni Bowers talks about how some companies don’t see the value of proper end-user training. They’re willing to pay thousands of dollars for a new product that is supposed to improve productivity but aren’t willing to do the one thing that will help with that product’s adoption in the enterprise. A good end-user training strategy will make new software deployments more cost effective. It is good post to read on your down time. http://blogs.techrepublic.com.com/career/?p=2152&tag=main;banner

Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting hidden networks, and inferring the presence of non-beaconing networks via data traffic. Kismet Features 802.11b, 802.11g, 802.11a, 802.11n sniffing Standard PCAP file logging (Wireshark, Tcpdump, etc) Client/Server modular architecture Multi-card and channel hopping support Runtime WEP decoding Tun/Tap virtual network interface drivers for real-time export of packets Hidden SSID de-cloaking Distributed remote sniffing with Kismet drones XML logging for integration with other tools Linux, OSX, Windows, and BSD support Read more about it on the PDF. Kismet File Name: Kismet.pdf File Type: PDF File Size: 1.60 MB Download Now

Checking for root kits

There are many applications that check for root kits. (A rootkit is a software or hardware device designed to gain administrator-level control over a computer system without being detected. The term implies that the motive of using a rootkit is to perform malicious operations on a target host computing system without the knowledge of the administrators or users of that system. Rootkits can target the BIOS, hypervisor, boot loader, kernel or less commonly, libraries or applications.) From Wikipedia. File Name: Checking for rootkit.pdf File Type: PDF File Size: 797 KB Download Now

New DTS Enterprise Inferface

I been busy redesigning my other website @ dtsenterprise.tech.officelive.com . That is one of the reason I haven't posted a PDF last week. If you ever need to find a PDF that I posted just click the link above that says "Missed a documentation then go to DTS Enterprise Documentation" and it will take you all the PDF that's been.

How To Install and Use Nessus

The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks. Download the PDF to read more about File Name: How to install and use nessus.pdf Date Created: 06/29/10 File Size: 3210KB Download Now