background preloader

Rebirth of BackTrack, the Penetration Testing Distribution.

Rebirth of BackTrack, the Penetration Testing Distribution.

https://www.kali.org/

Related:  Tools: Security - Forensics - Pentesting - Ethical HackingOpSecSecu_USBRaspberrySecurity

SIFT Kit/Workstation: Investigative Forensic Toolkit Download SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3.0 Download SIFT Workstation VMware Appliance Now - 1.5 GB Having trouble downloading? If you are having trouble downloading the SIFT Kit please contact sift-support@sans.org and include the URL you were given, your IP address, browser type, and if you are using a proxy of any kind. Having trouble with SIFT 3? BleachBit Portable cache, temp file and history cleaner BleachBit quickly frees disk space, removes hidden junk, and easily guards your privacy. Erase cache, delete cookies, clear Internet history, remove unused localizations, shred logs, and delete temporary files. Tools for a Safer PC An important aspect of securing any system is the concept of “defense-in-depth,” or having multiple layers of security and not depending on any one approach or technology to block all attacks. Here are some links to tools and approaches that I have found useful in stopping malware from invading a PC. Your mileage may vary. Learn, Memorize, Practice the 3 Rules Follow Krebs’s 3 Basic Rules for online safety, and you will drastically reduce the chances of handing control over your computer to the bad guys.

Speech Recognition using the Raspberry Pi I've finally received my Raspberry Pi, and I've immediately gotten to work transferring the speech recognition system I used for the robotic arm to the pi. Due to its small size and low power requirements, the Raspberry Pi is an excellent platform for the Julius open-source speech recognition system. This opens up almost limitless possibilities for voice command applications. FBI Says Cybercriminals Keep Getting Away, Need Unprecedented Authority - GovernmentSecrets.com By Jonah Bennett, DCNF The Federal Bureau of Investigation (FBI) wants expanded authority to remotely hack U.S. and international computers, leaving civil rights organizations horrified at what they term serious violations of the First and Fourth amendments, The Hill reports. Some privacy advocates are saying the request for expansion constitutes an unprecedented and dangerous increase. “Possibly the broadest expansion of extraterritorial surveillance power since the FBI’s inception,” added Ahmed Ghappour, a computer law specialist at the University of California-Hastings College of the Law.

Black Hat USA 2014 - Arsenal Returning bigger than ever for 2014, Black Hat is pleased to once again present Arsenal--a Tool/Demo area where independent researchers and the open source community will showcase some awesome weapons. See below for the full list and descriptions of each of these tools. Hours and Location: August 6, 2014 | 10:00 - 18:00 | Breakers JK August 7, 2014 | 10:00 - 18:00 | Breakers JK Android Device Testing Framework The Android Device Testing Framework ("dtf") is a data collection and analysis framework to help individuals answer the question: "Where are the vulnerabilities on this mobile device?" Dtf provides a modular approach and built-in APIs that allows testers to quickly create scripts to interact with their Android devices.

IO Ninja Scriptable/Programmable The word "programmable" speaks for itself. Now you can turn IO Ninja into your personal IO debugger and tune it to your liking with Jancy scripting. Whether you need a non-standard protocol analyzer, a network device emulator or an IO testing utility, IO Ninja can be programmed to do the job. We also provide an IO Ninja IDE (Integrated Development Environment) to assist you in exploring and making use of scripting in IO Ninja. How France's TV5 was almost destroyed by 'Russian hackers' Image copyright Getty Images A powerful cyber-attack came close to destroying a French TV network, its director-general has told the BBC. TV5Monde was taken off air in April 2015. A group calling itself the Cyber Caliphate, linked to so-called Islamic State, first claimed responsibility. But an investigation now suggests the attack was in fact carried out by a group of Russian hackers.

Related:  HackingOutilsWiFi Info GatheringDistroAdministratorToolsOs