background preloader

Security/PT

Facebook Twitter

Arachni Web Application Scanner in Kali Linux | CyberPedia. The Arachni web application scanner is an escalated tool that runs from a web interface much likened to that of Tenable’s Nessus. Notwithstanding, dissimilar to Nessus, Arachni can just perform a scan against one host on one port at a time. On the off chance that there are different web services running on a host and not serviced from the port, then repeated scan will must be launch separately. For example, is facilitating a web service on port 80 and phpmyadmin on port 443 (HTTPS), the Arachni scanner will must be run twice. It’s not a blaze and overlook kind of system. Arachni likewise has an exceptionally configurable structure. The plugins and settings for Arachni take into account accuracy checking, and all plugins are enabled by default.

Reporting is a snap and could be designed in numerous diverse sorts of output. #apt-get install arachni “Note: Repository should be configured in Kali Linux system” Arachni breaks down the report into two subcategories. Lessons « n00bpentesting.com. SecurityFocus. New Phishing Exploits Emerge. Phishing experts are tracking a new school of exploits - and some of them are shark-scary The phish are biting, alright -- and your users could be next on the menu. The Anti-Phishing Working Group (APWG) yesterday released its latest phishing trends report, which shows that the number of different "brands" (organizations) reporting phishing attacks jumped from 97 in April to 137 in May: the most since December, when it was at 121. "That's a pretty severe" increase, says Peter Cassidy, secretary general of the APWG and director of research for Triache, a consultancy. "It had started to look like conventional phishing had leveled off.

" There were more newly detected unique phishing Websites last month, too, according to the APWG report, up to 11,976. While phishing is spreading, however, many observers are more worried about the improved quality of attacks than about their quantity. Phishers are becoming more efficient, too, often reusing a single keylogger to attack multiple sites.

How to Hack a Computer & Spy on Anyone, Part 1. Hack Like a Pro: How to Hack a Computer & Spy on Anyone, Part 1 Welcome back, my rookie hackers! Now that nearly everyone and everyplace has a computer, you can use those remote computers for some good old "cloak and dagger" spying. No longer is spying something that only the CIA, NSA, KGB, and other intelligence agencies can do—you can learn to spy, too. In this brand new series, we will explore how we can use the ubiquity of the computer to peek in on just about anyone and anyplace. Unlike the spy movies of yesteryear where the spy had to place a listening device in the lamp or in a houseplant, as long as there is a computer in the room, it can be used as a "bug. " We will examine how to turn that commonplace computer into our own bug to listen in on conversations, use as a spy camera, track Internet searches, and more.

In this first part, I will show you how to convert any computer, anywhere, into a listening device. Step 1: Fire Up Kali Step 2: Compromise the Remote Computer See Also. Occupytheweb's Profile « Wonder How To. Thoughts on Security. Learn Network Security - NetSecNow. Safe To Hack Sites | pentest-n00b. Metasploit Unleashed.