Info[SEC*] Redemp...
Follow
Find
3.6K views | +0 today
Info[SEC*] Redemption
Your new post is loading...
Your new post is loading...
Scooped by Chintan Gurjar
Scoop.it!

Kali linux - iptables firewall

Kali linux - iptables firewall | Info[SEC*] Redemption | Scoop.it
Well one of the things that Kali does not have is a firewall.. and even though I'm usually behind NAT (s/usually/always/g) I want to have one anyway.. so here it is:
root@hermes:~# cat /etc/firewall.sh
#!
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Kali linux - recon-ng v2

Kali linux - recon-ng v2 | Info[SEC*] Redemption | Scoop.it
Now moving from recon-ing people in the previous blog-post to hosts...
I assume we are at "recon-ng >" point so
use recon/hosts/gather/http/google
show options
set domain target.com
run
Notice how nicely it says
[*] Sleeping to Avoid Lock-out...
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Cleaning wash in Kali

Cleaning wash in Kali | Info[SEC*] Redemption | Scoop.it
So I would try to run wash on my Kali box and the result would be: root@hermes:~# wash -i mon0 Wash v1.4 WiFi Protected Setup Scan Tool Copyright (c) 2011, Tactical Network Solutions, Craig Heffner BSSID ...
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

USING METASPLOIT SOCKS PROXY AUXILIARY MODULE OVER A METERPRETER SESSION

USING METASPLOIT SOCKS PROXY AUXILIARY MODULE OVER A METERPRETER SESSION | Info[SEC*] Redemption | Scoop.it
During a penetration test , once you have compromised a machine on the internal network, the next step generally is to pivot and then scan, fingerprint exploit and compromise other hosts in the same internal network.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Web Service With CGI Support - Penetration Testing

Web Service With CGI Support - Penetration Testing | Info[SEC*] Redemption | Scoop.it
This report shows an hands-on penetration testing using Apache server with cgi access, it identifies some vulnerabilities and performs exploits with this vulnerability and It further patches it by mitigating this known threats.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Lets develop a source code from executable : Reverse engineering approach

Lets develop a source code from executable : Reverse engineering approach | Info[SEC*] Redemption | Scoop.it
Why mobile security is important ?
Now
a days world is becoming tiny with the latest inventions in gadgets.
Hardwares are becoming smaller and smaller and their efficiency and
usability is increasing rapidly.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Being a pretend-extrovert: Networking tips for introverts HR, Recruiting, Social Media Policies, Human Resources, HR Technology Blogging4Jobs

Being a pretend-extrovert: Networking tips for introverts HR, Recruiting, Social Media Policies, Human Resources, HR Technology Blogging4Jobs | Info[SEC*] Redemption | Scoop.it
For introverts, the idea of professional networking is a daunting one well outside the typical shy. Learn how to overcome these feelings with these tips.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

SANS Institute and CrowdStrike Partner to Offer "Hacking Exposed Live ... - MarketWatch (press release)

SANS Institute and CrowdStrike Partner to Offer "Hacking Exposed Live ...
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Securosis Blog | If You Don’t Have Permission, Don’t ‘Test’

New post: If You Don’t Have Permission, Don’t “Test” http://t.co/bZSxYbSJCa by @securosis #Infosec #Security #PenTest #AppSec #Apple
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Ubuntu Edge brings the promise of a dual-boot Linux and Android smartphone

Ubuntu Edge brings the promise of a dual-boot Linux and Android smartphone | Info[SEC*] Redemption | Scoop.it
Canonical has officially launched an Indiegogo campaign for the Ubuntu Edge smartphone. This handset is still aways off in terms of delivery, however those curious can commit some money and get one...
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Kali linux - recon-ng v3

Kali linux - recon-ng v3 | Info[SEC*] Redemption | Scoop.it
This is the third and final post on recon-ng, covering automation among other things. After all all this functionality is great but I don't want to kick it off manually every time!
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Kali linux - recon-ng v1

Kali linux - recon-ng v1 | Info[SEC*] Redemption | Scoop.it
During my regular net-tool-mining I have stumbled upon this tool which looks like a command line version/free version of Maltego (which ships preinstalled with Kali)...
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Installing Slackware 14 on a Linux Software RAID 1 (MIRRORING)

Installing Slackware 14 on a Linux Software RAID 1 (MIRRORING) | Info[SEC*] Redemption | Scoop.it
This  is beginners guide on how to install Slackware Linux 14 on a RAID 1 (mirrored) drive.
Boot the system with Slackware 14 ISO and then when prompted, choose the appropriate keyboard type. To login type root and press enter.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Clone/Duplicate a Xen Virtual Machine

Clone/Duplicate a Xen Virtual Machine | Info[SEC*] Redemption | Scoop.it
Steps:  [1] Install virt-clone utility : # apt-get install virtinst libvirt-bin   [2] Shutdown the virtual machine that you want to clone using one of the following commands : # xm shutdown OR # virsh -c xen:///virsh # shutdown [3]   Use the...
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Lets send packet without PING command - Introducing Scapy

Lets send packet without PING command - Introducing Scapy | Info[SEC*] Redemption | Scoop.it
Whats scapy?
Its packet manipulation mechanism. One can send and receive the packet of large no. of protocols. Its useful to send and receive reply in order to further analysis.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Advanced Threats, Imagination, And Perception - Dark Reading

Advanced Threats, Imagination, And Perception - Dark Reading | Info[SEC*] Redemption | Scoop.it
Advanced Threats, Imagination, And Perception Dark Reading While right-to-audit/pen test/assess clauses in service provider contracts are great, they are only ever generally applied when significant, obvious data sharing (such as a cloud provider...
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Police blotter - Newark Post

Police blotter - Newark Post | Info[SEC*] Redemption | Scoop.it
Police blotter
Newark Post
Also, the bill failed the cashier's pen test, which detects counterfeit currency, said Newark Police spokesman James Spadola.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

Black Hat USA: T-Minus One Month And Counting - Dark Reading

Black Hat USA: T-Minus One Month And Counting - Dark Reading | Info[SEC*] Redemption | Scoop.it
Black Hat USA: T-Minus One Month And Counting
Dark Reading
You'll learn how to build your own RFID physical pen-test toolkit, how to weaponize commercial badge readers, and how to defend yourself from others' RFID-hacking efforts.
more...
No comment yet.
Scooped by Chintan Gurjar
Scoop.it!

A code of conduct for young hackers - Boing Boing

A code of conduct for young hackers - Boing Boing | Info[SEC*] Redemption | Scoop.it
A code of conduct for young hackers
Boing Boing
The organizers have created a "code of conduct" for young hackers that is good advice for anyone doing infosec work, or exploring computers and systems: The Internet is a small place.
more...
No comment yet.