Articles

Online Port Scanning – Top 5 Resources

In the context of penetration testing, Port Scanning is usually performed to identify open ports against any target machine. Open ports correspond to the networked services that are running on a system. Programming errors or implementation flaws can make these services vulnerable to attack and can sometimes lead to total system compromise. To determine the […]

Articles

6 Linux Distributions For Forensics Investigation

Over the past 2-3 years, we’ve seen a dramatic increase in sophisticated attacks against organizations. Cyber attacks originating from China, named the APT (Advanced Persistent Threat), have proved difficult to supress. Financial attacks from Eastern Europe and Russia obtain credit card, and financial data resulting in millions of dollars stolen. Suggested Read: Top 8 Forensics Tools […]

Articles

Top 10 Online Free Scanners

Throughout the scanning phase, penetration testers and ethical hackers gather very useful information about the target environment that will be critical in the ongoing stages of a test. Scanning and identifying vulnerabilities is often considered one of the more tedious tasks by most penetration testers and ethical hackers. However, it’s one of the most important. […]

Articles

10 Most Popular Useful Kali Linux Hacking Tools

Kali is the latest and greatest version of the ever popular Backtrack Linux penetration testing distribution. The creators of the Backtrack series kept Kali in a format very similar to Backtrack, so anyone familiar with the older Backtrack platform will feel right at home. Kali includes more than 500 security testing tools. A lot of the […]

Articles

Windows MCQ – 1 to 20 With Answers

1. Device A has been configured for IRQ 3. Which of the following devices will Device A potentially conflict with? A. COM1 B. LPT1 C. COM2 D. LPT2 2. What is the default IO address assigned to COM1? A. 02F8 B. 0378 C. 03F8 D. 0278 3. Which of the following best describes DMA? A. […]

Articles

Top 15 Python Cheatsheets By Cheatography

Python is a general purpose programming language that is often applied in scripting roles. It is commonly defined as an object-oriented scripting language – a definition that blends support for OOP with an overall orientation toward scripting roles. In fact, people often use the word “script” instead of “program” to describe a Python code file. […]

Articles

7 Best Python Libraries for Administrative Interfaces

Python is one of those rare languages which can claim to be both simple and powerful. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python’s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language […]

Articles

Top 10 Metasploit Modules for Exploitation of ShellShock Vulnerability

A vulnerability in GNU Bash could allow an unauthenticated, remote attacker to inject arbitrary commands so called as ShellShock Vulnerability. The vulnerability is due to improper processing of environment variables by the affected software. An unauthenticated, remote attacker could exploit this vulnerability by submitting malicious environment variable values to an application using Bash. Processing the […]