background preloader

Offensive Security Training and Professional Services

Related:  Security

[Review] Pentesting With BackTrack (PWB) & Offensive Security Certified Professional (OSCP) The views and opinions expressed on this site are those of the author. Any claim, statistic, quote or other representation about a product or service should be verified with the seller, manufacturer or provider. Up until a month or so ago, everything I've learnt was done by using various free resources online. I wanted to do it for a few reasons:The challenge. We all learn differently and do so at different speeds. After looking at the syllabus, I set myself the goal of "getting into the admin network". In the last couple of days of lab time, I was ready to throw in the towel. My next mistake was to book the exam so soon after the Lab time ended. I should of known better than to go into an exam feeling so tired. There were a few "starting" problems to begin with - but there was an admin on hand in the IRC channel (as there seems to always be!) Sent the PDF within 24 hours after the exam ended. Overall I really did enjoy the whole course. To students currently doing it:

Hidden Wiki - HiddenWiki.org Downloads BackTrack 5 comes in several flavours and architectures. The following page will help you choose the right version for you. Although registration is not required, we would certainly appreciate it – and it would also give us the opportunity to update you when there are important BackTrack updates or news. BackTrack 5 is OUTDATED and no longer supported – Downloads have been discontinued . Please check the KALI LINUX project instead. I’ve downloaded my BackTrack image, now what ? If you are unsure of what to do after you have downloaded your copy of BackTrack, we suggest you head on to our BackTrack Wiki which contains step by step instructions on how to get up and running with BackTrack. Need a real world penetration testing course? Perhaps you are an experienced penetration tester who needs to go a step further? We would like to thank the following for mirroring Back|Track

Privacy.net - Internet privacy information BrowserSpy.dk How to surf anonymously without a trace Skip to comments. How to surf anonymously without a trace ComputerWorld ^ | 12 March 2007 | Preston Gralla Posted on Tue Mar 13 14:29:37 2007 by ShadowAce The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true. It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits. And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered. But you don't need to be a victim. What they know about you Whenever you surf the Web, you leave yourself open to being snooped upon by Web sites. Sites use a variety of techniques to gather and collate this information, but the two most basic are examining your IP address and placing cookies on your PC. Protect yourself: Surf anonymously To: ShadowAce

How To: Internet Anonymity With VMWare and JanusVM (Downloads) « TheMostBoringBlogInTheWorld I was fooling around with VMWare, DOWNLOAD HERE – Free VMware Player And I discovered this Virtual Appliance called JanusVM. DOWNLOAD HERE – JanusVM Once you have the VM player installed then you can open it and load the JanusVM application (it will be a .vmx file), then JanusVM sets up Tor and Privoxy. The interface is much like the command prompt so familiarity with that is a plus here. JanusVM will give you an ip path to enter into the Run window (found in the start window). \\192.168.1.71\setup\run.bat If the IP is different don’t worry. Show IP informationConfigure IP informationConfigure Anonymity + PrivacyShutdown/RebootCheck For UpdatesHelpQuit Enter number three. I am using it right now. Feel free to comment if I have made any mistakes, or if you have any suggestions for even tighter privacy configurations with VMWare player and JanusVM. Enjoy your freedom. Like this: Like Loading...

How can I mask my IP address and become untraceable online? Hide IP NG Concerned about Internet privacy? Want to hide your IP address? Hide IP NG (short for Hide IP Next Generation) is the software you are looking for! As low as $0.08/day BUY NOW ! Compatiblewith Vista ! Key Features of Hide IP NG: Don't waste time in testing slow and dangerous public proxies. Assign different IPs to your computers even they are behind the same router! A single click and you are ready to go. We never ask our users to create an acount before using. 1024 bits encryption prevent your ISP and your boss from spying on you! Prevent others from reading any data you transmit in Wi-Fi Hotspots. Support sites and double your security! Send anonymous email through any web based mail system (e.g. Post on bulletin boards without displaying your real IP address. Bypass the restrictions placed by some owners of Internet resources on users from certain countries or geographical regions. Great for monitoring your overseas search engine campaigns. Hide IP Address

Untraceable Computer Techniques So I can imagine a time when (if it is not already happening) that posts to the internet such as this will be actively traced to the source computer and the poster put under scrutiny at the least or jailed at the most. First off there are not any sure proof untraceable techniques that the average man can employ, but there are somethings that we can do to make it harder for those who would want to track activity. What are some techniques that one might use to go online to continue to gather information in regards to survival preparedness, government actions and or communicating with others? Computer Registration - All computers are serial numbered and it is easy enough to also track the MAC addresses of the Network Interface Cards within the laptop or etc. Most people buy a laptop with their credit card so it does not take a rocket scientist to figure out who has what laptop. IP Proxy Surfing This is a way to hide your IP address while browsing the internet.

How to Create a SSH Tunnel Through Your Seedbox IP (Proxy for Your Home PC) Faster torrents, high connectivity and seed-ability are notably the primary reasons why most of us opt to use a seedbox. Fair enough - but a seedbox (server) can be used to implement a variety of tasks that extend far beyond just torrenting. We’ll explain how you can run a SSH tunnel through your seedbox server, in order to use your seedbox’s IP address as a proxy on your local machine (home PC). And it works for most Internet apps that support SOCKS5 (web browser, IRC/MSN, even a home uTorrent client). Reasons/scenarios for how this can be applied • As a web proxy — You’ll be able to bypass any IP restrictions & firewalls, unblock certain websites, or torrent from college or work. What You’ll Need ** A seedbox server (VPS, dedi) that comes with shell (SSH) access. ** SSH client, such as PuTTY. For this demonstration we’ll be using a real server and it’s true IP address, so as to explain how[]1 to implement it through PuTTY and various webapps. Create Your SSH Tunnel 1. 2. 3. 4. 5. 6.

Related: