background preloader

Mayuragnihotri

Facebook Twitter

Mayur Agnihotri

InfoSec Related. The Best Hacking Tutorial Sites - Learn Legal Hacking. Hacking tutorials sites & tools. _Reverse_Engineering. Hacking Ético y testing inteligente para validación de Infraestructuras de Seguridad. Introducción al Hacking Ético. Hacking Etico - Carlos Tori - Liberado por el Autor. Tools CTF. Pwntools, el framework que Gallopsled utiliza en cada CTF. Tools CTF. Kali Linux Tools Listing. Computer Forensics Tools. Tools: Security - Forensics - Pentesting - Ethical Hacking. Category: Anti-forensics tools - ForensicsWiki. Category: Tools - ForensicsWiki. Open source digital forensics. Digital Forensics Software. Digital Intelligence and Investigation Tools. By providing operational support to high-profile intrusion, identity theft, and general computer crime investigations, DIID is able to see the current limitations of computer forensics and incident response in the field first hand.

Digital Intelligence and Investigation Tools

Combining applied research with the unique talents, operational experience, research capabilities, and the vast knowledge base of Carnegie Mellon University, we have developed resources, training, and tools to facilitate forensic examinations and assist authorized members of the law enforcement community. Restricted Access Tools Users can access the following tools after they register and are vetted. Live View LE allows forensic investigators to take a physical device or an image file of a disk or partition and automatically transform it into a virtual machine. CCFinder is a suite of utilities designed to facilitate the discovery, organization, and query of financial data and related personally identifiable information in large-scale investigations. Metashield Analyser. Analisis of metadata online. Analizar Metadatos Online con MetaShield Analyzer. Google hacking - Automated website hacking tools based on Google dorks.

Google hacking is a must for hackers and pen testers, the popular search engine is a mine of information for targeted analysis and reconnaissance phase.

Google hacking - Automated website hacking tools based on Google dorks

In the past we discussed on how to use Google hacking techniques to gather information on specific targets and discover vulnerable website on a large-scale. I decided to start from a submodule of the hacking program proposed by The Hacker Academy dedicated to use of Google during a penetration test to extend the discussion with a proof of concept. The attacker’s job is advantaged by the availability on the black market of numerous DIY tools that make possible the execution of the large amount of specifically crafted query to discover vulnerable websites. Penetration testing, ethical hacking: tools, methodologies and tutorials.

Distributed Denial of Service (DDoS) Attacks/tools. Hacking, Security Papers. Infosec Tricks & Treats. Happy Halloween!

Infosec Tricks & Treats.

This time around, we thought we’d offer up a couple of infosec tricks and treats for your browsing pleasure. Around MSI, we LOVE Halloween! We dress up like hackers, bees and hippies. Of course, we do that most other days too… Here are a couple of tricks for you for this Halloween: Columbia University gives you some good tricks on how to do common security tasks here. University of Colorado gives you some password tricks here. Crackeando redes WPA y WPA2 sin diccionario. via @dragonjar. Utilizar ingeniería social para crackear redes WPA y WPA2 sin diccionario no es una técnica nueva, pero como con casi toda técnica cuando se automatiza y se facilita su uso se incrementa su popularidad (¿alguien recuerda firesheep?)

Crackeando redes WPA y WPA2 sin diccionario. via @dragonjar

, hoy varios medios se han hecho eco de la herramienta WiFiPhisher publicada en el sitio The Hacker News y la anuncian como si se tratara de una gran novedad. Lo que seguramente desconocen es que ya existían este tipo de herramientas hace años e incluso herramientas creadas por latinos como LINSET (Linset Is Not a Social Enginering Tool) del usuario vk496 de la comunidad SeguridadWireless supera con creses las prestaciones del ya famoso WiFiPhisher. ¿Como crackear redes WPA y WPA2 sin diccionario usando estos scripts?

Free Network Sniffers, Analyzers and Stumbers. This article will look at free network sniffers, analyzers, and stumblers for Windows, Mac, Linux, and even Android.

Free Network Sniffers, Analyzers and Stumbers.

Introduction There are many commercial network tools out there offering all the bells and whistles, but sometimes a simpler product will do the job. You can use them during site surveys, installs, troubleshooting, and even auditing. Here you’ll discover free network sniffers, analyzers, and stumblers for Windows, Mac, Linux, and even Android. Wireshark (Multiple platforms) 15 Penetration Testing Tools - Open Source - SecurityWing. Top 15 Open Source. Free Security. Tools. 1.

Top 15 Open Source. Free Security. Tools.

Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Free URL scanner. Exploit/Vulnerability Search Engine. Internet Security Vulnerabilities.

OWASP Testing Guide v4.0. Guia de seguridad en aplicaciones Web. La fundación Open Web Application Security Project lidera desde 2001 un proyecto libre sin ánimo de lucro orientado a promover la seguridad del software en general y de aplicaciones web en particular, manteniendo para ello varios proyectos e iniciativas.

OWASP Testing Guide v4.0. Guia de seguridad en aplicaciones Web.

Bajo licencia Creative Commons, genera y distribuye libremente material de alta calidad desarrollado por decenas de profesionales relacionados con el desarrollo y seguridad del software, entre ellos guías, plataformas educativas y herramientas de auditoría, etc. Situadas entre las publicaciones más valoradas en relación al sector de auditorías de seguridad, las guías publicadas por la fundación OWASP se han convertido en un referente en el mundo de la seguridad del desarrollo y evaluación de aplicaciones. En 2008 se editó la versión 3 de la guía, con su traducción al castellano en 2009 en la que participó activamente INTECO.

Search Vulnerabilities. Google Hacking Database, GHDB, Google Dorks. Exploits Database by Offensive Security. Hardware-based security more effective against new threats. With software security tools and network vulnerabilities constantly being targeted by hackers, securing hardware components will grow in importance given it is more secure and cybercriminals will find it difficult to alter the physical layer for their purposes.

Hardware-based security more effective against new threats

Patrick Moorhead, president and principal analyst of Moor Insight and Strategy, said hardware-based security is more secure than software tools such as antivirus since it cannot be altered. Hardware-based security refers to safeguarding the computer using components such as processors. An RSA spokesperson added the physical layer eliminates the possibility of malware, such as virtual rootkits, from infiltrating the operating system and penetrating the virtualization layer. In 2010, RSA, together with VMWare and Intel, introduced a proof-of-concept framework to integrate security into the entire hardware stack. One example is ARM's joint venture with Gemalto and Giesecke & Devrient to set up Trustonic in December 2012. Best Hacker Tools Online and tutorials (video). The Web's #1 Hacking Tools Directory - with tutorial videos! Hacking Tools Directory with Video Tutorials By Henry Dalziel | Information Security Blogger | Concise Courses We are big fans of blogging about Hacker Tools – for one major reason: if you are serious about working in cyber security you need to be able to use these tools like a boss.

The Web's #1 Hacking Tools Directory - with tutorial videos!

Hacking tools are what boxing gloves are to a boxer or what a spanner is to a plumber. A pentester (or ethical hacker) can be judged by their ability to use these tools, frameworks and programs, so get to know them! Herramientas Seguridad Via @dragonjar Colombia #TICs. ToolsWatch - The Hackers Arsenal Tools. Black Hat: Top 20 hack-attack tools. Network World - Turn someone else’s phone into an audio/video bug.

Black Hat: Top 20 hack-attack tools

Check. Use Dropbox as a backdoor into corporate networks. Check. Suck information out of pacemakers. Information Security Resources. Security Distributions. Forensic Distributions. Linux Security - The Community's Center for Security. Insecure.Org - Tools & Hacking resources. Top Network Security Tools.