877.791.9571 |

Monthly Archives: July 2012

A Review of the eSoft InstaGate UTM Appliance

It can take an organization several years to build out an information security infrastructure capable of providing them with sufficient protection. This is especially true of small to medium sized companies, who usually have to work within tighter financial constraints, and all too often are reluctant to add additional […]

By |July 31st, 2012|Other|0 Comments

Defcon 20 Day 2

The talks on Defcon day 2 were scheduled to begin from 10 am. I reached the venue at 8:30 am and decided to use the time to buy some Defcon merchandise. The lines for the merchandise are usually very long but it wasn’t at that time of the day.

After […]

Defcon 20 Day 1 Review

This article will discuss about the talks and events that happened on Defcon day 1.
Venue: Rio Hotel and Casino

We reached Rio Hotel at around 8 am. We thought we did good on time until a nice gentleman came to us and said “It’s a 3 hour long line guys […]

Keeping Your Site Safe Online

Why do websites get hacked? Websites get hacked for a bunch of different reasons:

To plant hidden links to other sites in an attempt to game search engines and raise those site’s rankings
To plant spyware on your site that will infect your visitors and take over their computers, to make […]

Lifehacking – What It Really Is

Two things made me write this article. The first was a conversation with a friend of mine, Luigi (Thanks Luigi!) The second was a conversation I had with a woman last night. She disagreed with the idea that a person’s entire life can be invaded and called me crazy. […]

A Closer Look at WordPress Password Hashes

WordPress is one of the most popular open source web applications used by major Fortune 500 companies as well as many independent websites and blogs. Like many web applications, WordPress stores user accounts in a MySQL database, including administrative user accounts with their associated password hashes. A closer inspection […]

Interview: Tony Busseri, CEO of Route1

Tony Busseri is the CEO of Route1. He leads the management team in executing Route1’s strategic vision. Mr. Busseri is an entrepreneurial executive with a track record of producing results and shareholder value. He is committed to delivering Route1 solutions to customers and advancing excellence in the organization.

Mr. Busseri […]

Interview: Charles Weaver, CEO of MSPAlliance

Charles Weaver is the co-founder and CEO of the MSPAlliance. In addition to running the daily operational operations of the association, he writes and speaks extensively around the world on issues and topics related to the managed services industry.

Prior to founding the MSPAlliance, Mr. Weaver was an editor for […]

IBM Rational Appscan Part 1

IBM Rational Appscan is one of the most widely used tools in the arena of web application penetration testing. It is a desktop application which aids security professionals to automate the process of vulnerability assessments. This article focuses on configuring and starting a scan using Appscan. Analysing the scan […]

By |July 23rd, 2012|Hacking|21 Comments

Nmap from Beginner to Advanced

Network Mapped (Nmap) is a network scanning and host detection tool that is very useful during several steps of penetration testing. Nmap is not limited to merely gathering information and enumeration, but it is also powerful utility that can be used as a vulnerability detector or a security scanner. […]

Sulley Fuzzing Framework Intro

1. Sulley Fuzzing Framework

Sulley is python fuzzing framework that can be used to fuzz file formats, network protocols, command line arguments, and other codes. In this three-part series, we’ll learn how to fuzz a threaded TCP server application called Vulnserver using a Sulley fuzzing framework. In this first article, […]

Wi-Fi Hacking

This tutorial focuses on how to crack Wi-Fi networks that are insecurely Wi-Fi. I am using an External Wi-Fi card (AWUSO36H 802.11 b/g 5db), which is quite popular among Wi-Fi hackers and it will cost you around $20- $35 USD. The major advantages of using this ALFA card are […]

Chapter 10 – Virtualization Security

Virtualization brings significant value to business managers and engineers attempting to keep pace with business pressure for additional servers. It enables maximum use of hardware resources while introducing an increased flexibility in how organizations design and implement new solutions. However, it also introduces new security concerns. Until recently, organizations […]

By |July 12th, 2012|Hacking|2 Comments

Agile Methodology—How Does it Bite?

This article will provide readers with an introduction to the statistical and dynamic analysis of code. However, before proceeding to analysis, we must first understand the concept of agile methodologies for code development. To begin, we’ll start with an exploration of agile/scrum methodology and how it plays into the […]

Defending the Internet with Project Meshnet

Topics related to Internet censorship have been debated frequently in the last few years. The main purpose of most Internet censorship actions is to deny access to certain information on the web. This information can be censored throughout the world, or in some cases, can be limited to certain […]

Make Way for the Sizzling ROOTCON 6 – Hacker Conference

Information security and hacking conferences or gatherings are awesome events where you can hang out with cool people, a good environment where you can listen to topics related to computer security and security researches, and play challenging games like Capture the Flag (CTF), Hacker Jeopardy, Wireless Cracking and other […]

By |July 10th, 2012|Other|4 Comments

System Exploitation with Metasploit

Metasploit is an exploit development framework that facilitates penetration testing of IT systems. This tool initially started off as a game and was taken over by Rapid 7 for maintenance and further development. The main objective of this article is to learn the basics of exploitation with Metasploit and […]

By |July 9th, 2012|Hacking|3 Comments

WebDAV Application DLL Hijacking Exploitation

In this article, I will explain WebDAV application DLL hijacking exploitation using our all time favorite, Metasploit. Here we will cover the module which has a directory of file extensions that can lead to code execution. This module presents a directory of file extensions that can lead to code […]

Social Engineering 2—What Do We Have To Watch?

In my previous article we focused on providing an introduction to social engineering. For the purposes of this article, I want readers to consider the words of Albert Einstein to be their mantra: “Only two things are infinite – the universe and human stupidity, and I’m not sure about […]

Social Engineering – We Start Playing

If hacking is known as entering a computer system through a breach of security, social engineering can be referred to as an intrusion into the mind. That really is the basic meaning of social engineering (to influence and manipulate people) and cracking (breaking into computer systems). Many people may […]