background preloader

ModSecurity: Open Source Web Application Firewall

ModSecurity: Open Source Web Application Firewall

Certified Information Security Consultant (CISC) 6 Months, Training, Course, Certification - Institute of Information Security, Mumbai(India) CISC is 6 months training in information security for amateurs and professionals to make you an expert in the field of Information Security. The course is ideal for those wanting to differentiate themselves from candidates with an undergraduate degree only, as well as those already in industry wishing to advance their skills in this constantly evolving area. Many companies are actively recruiting security specialists and this course will prepare graduates for senior technical and management positions in many industry sectors. CISC training The CISC training is designed to make you an expert in the domain of information security. Benefits of CISC The CISC is the only completely hands-on, real-world oriented security certification. Schedule Course is of 4 hrs from Monday to Friday Course Contents Testimonials Faculties are good & very helpful. Ashish NageshkarStudent The teaching way and knowledge of Mahesh is really excellent, the extra things he shares keeps us competitive. Suleiman Farouk

The Metasploit Project Apache Tika - Apache Tika CryptAGE, tout sur la cryptographie Apache Harmony - Open Source Java Platform 15 Penetration Testing Tools That Every Pen-Tester Can Use! 1) Metasploit This penetration testing framework is very popular amongst hackers and penetration testers all over the world. It is based on the 'exploit' concept, which refers to a code that can break past a system's security measures. 2) Wireshark Compatible with a variety of platforms, including Windows, Linux, Solaris, FreeBSD and others, this is the most popular network protocol analyser used by ethical hackers and penetration testers today. 3) w3af This is a web application attack and audit framework that can be used for fast HTTP requests, injecting payloads etc. 4) CORE Impact This is a software that can be used for penetration testing on networks, mobile devices, password identification, password cracking and other activities. 5) Back Track This is one of the best known penetration testing platforms based on the Linux kernel. 6) Netsparker This is a web application scanner that identifies vulnerabilities and can also be used for SQL injection. 7) Nessus 8) Burpsuite 9) Cain & Abel 13) Retina

Herramientas inseguridad, monitorización y auditoria de redes in PING - Le Tutorial Facile Stats Nov 2010 82'909 Visiteurs 146'476 Pages196 paysStatistiques completes Aidez-nous à traduire nos tutoriaux! Réseau Ping Dern. mise à jour: 22-09-2010 If you like our tutorials, don't hesitate to support us and visit our sponsors! Ping - Table des matières Vue d'ensemble d'un paquet ICMP Fonctionnement de Ping Connectivité d'un hôte Congestion réseau (RTT) Longueur du voyage (TTL) Echo Request Echo Response Windows Linux ADRESSE IP and NOM D'HÔTE Ping est un outil bien connu pour vérifier la connectivité réseau entre deux hôtes IP. Ping est installé par défault sur les systèmes d'exploitation Windows, Apple et Linux/Unix. Vue d'ensemble d'un paquet ICMP Fonctionnement de Ping Ping envoie des très petits paquets vers un hôte IP qui va répondre en envoyant des paquets en retour. Haut de la Page Examinons une étude de cas où deux machines appelées Paris et Berlin "pingent" une machine appelée "". Ping depuis la machine Linux (Paris) vers "": Paris: ping ping B

Foros CanalGame - [MANUAL] SuperCard (CF y SD) ACTUALIZADO A 13 de Junio de 2007NOTA: Este manual es el que anteriormente era conocido como Scene de Nintendo DS.NOTA IMPORTANTE: Este manual NO SIRVE para jugar a roms comerciales BAJO NINGUN CONCEPTO. Solo sirve para cargar ROMS FREEWARE como pueden ser demos y software casero, y en todo caso BACKUPS de vuestros ORIGINALES. No me hago responsable de los posibles daños que se pueden causar en las consolas por usar material ilegal o cualquier otro modo que no sea el que está explicado en este manual. Avisados estais.Nota: No contesto dudas por privado ni por mensajeria instantánea. Preguntad en este hilo y asi entre todos podremos ayudarnos.En este manual vamos a saber cómo sacarle partido a nuestra Nintendo DS con una de las flashcarts más famosas: la SuperCard. Desde que apareció el modelo CF que requería passme, esta tarjeta ha evolucionado bastante y podemos encontrar modelos muy avanzados y mejorados.

Ping Tutorial: 15 Effective Ping Command Examples As you already know, ping command is used to find out whether the peer host/gateway is reachable. If you are thinking ping is such a simple command and why do I need 15 examples, you should read the rest of the article. Ping command provides lot more options than what you might already know. Ping Example 1. By default ping waits for 1 second before sending the next packet. Increase Ping Time Interval Example: Wait for 5 seconds before sending the next packet. $ ping -i 5 IP Decrease Ping Time Interval Example: Wait 0.1 seconds before sending the next packet. # ping -i 0.1 IP Note: Only super user can specify interval less than 0.2 seconds. $ ping -i 0.1 PING 0 ( 56(84) bytes of data. ping: cannot flood; minimal interval, allowed for user, is 200ms Ping Example 2. Before checking whether the peer machine is reachable, first check whether the local network network is up and running using any one of the following 3 methods. Ping localhost using zero (0) Ping localhost using name

Hacking Ético, aprende hackeando iStockphoto/ThinkStock A raíz de un artículo que leí de cómo usar Firefox como herramienta para hacking ético me he decidido a hablar un poco de qué es el hacking ético y algunos trucos y herramientas para empezar a adentrarnos en el tema. Como Internet está ahora en casi todos los ordenadores del mundo voy a centrarme principalmente en ataques realizados por este medio. Introducción al Hacking Antes de hablar de Hacking hay que definir bien éste concepto. Un Hacker es el neologismo que hace referencia a un experto en alguna disciplina relacionada con la informática o las telecomunicaciones. A diferencia de los Crackers, los Hackers no quieren robar, destruir o eliminar información. Hacking es también otro neologismo que indica la acción de un Hacker. Un hacker no va ligado a lo ilegal, de hecho puede trabajar para una empresa testeando las vulnerabilidades de aplicaciones o para la policía trabajando como Analista forense digital. Aprender Hacking Los comienzos siempre son complicados.

Want To Learn Wi-Fi Hacking? Here Are 10 Good Websites For You! 1.WildPackets WildPackets Inc, founded in 1990, develops hardware and software solutions that drive network performance, enabling organisations of all sizes to analyse, troubleshoot, optimise, and secure their wired and wireless networks. 2.Wireshark Wireshark is the world's foremost network protocol analyser. 3.Cracking WEP Using Backtrack: A Beginner’s Guide This tutorial is intended for user’s with little or no experience with linux or wifi. 4.How To Crack WEP and WPA Wireless Networks With the popularity of wireless networks and mobile computing, an overall understanding of common security issues has become not only relevant, but very necessary for both home/SOHO users and IT professionals alike. 5.Ethical Hacker Network The Ethical Hacker Network is the brainchild of Donald C. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. 7.Wi-foo

Nmap Online