Nessus Security Scanner
According to the popular consensus, Nessus is by far among the best choices of vulnerability scanners. What’s more, it’s part of the Gnu’s Not Unix (GNU) GeneralPublic License (GPL) and can therefore be obtained and utilized at no charge.The following are some of the features of Nessus:
Plugin Architecture
Each security test is written as an external plugin. Thismeans that you can easily add your own tests without having to read the codeof the...
Monday, 31 October 2011
Nessus Security Scanner
Read More »
Security Architecture
Security Architecture
Security provided by IT Systems can be defined as the IT system’s ability to be able to protect confidentiality and integrity of processed data, as well as to be able to provide availability of the system and data.“IT Architecture” may be defined as a set of design artifacts, that are relevant for describing an object such that it can be produced to requirements (quality) as well as maintained over the period of its useful life. The design artifact describe the...
Server Hacking
IIS ( Web server/web page) hacking
IIS is Microsoft's internet server. It is very buggy and very exploitable. Defacing a IIS server is actually very easy. Alot of system administrators does not load patches on their IIS servers so they are the people who gets defaced (hacked). Current IIS servers I will show u to hack is IIS 4/5. IIS 6 is the industry standard at the moment, but there is still alot of IIS4/5 servers online. The way IIS server are being hacked is though buffer overflows...
MAC address
Getting a PC name, MAC address and user name logged onSo you would like to know someone's PC name, or their MAC address of their network card or the username that currently logged onto the PC? It can be very useful to have this info on someone. Their PC name can be their own name or company name. Their MAC address is the address of their network card, which is static, means that it can never change. Their username can also be useful if you would like to know this persons name. All of...
Hacking a PC with a exploit
Hacking a PC with a exploit
What is a exploit? It's a poorly coded piece in software which you can use to gain access to the system. There is many exploits available for the various MS Windows's out there. Windows Hacker exploit download page which has compiled exploits.Now if your a n00b, you don't know how to compile an exploit, basically you need some programming experience, so go learn how to program. Most exploits are written in C++ so try Bloodshed Dev C++ which you can use to...
Hacking a PC through NetBios shares
Finding PCs with shares over a LAN or over internet is very easy. Choose a certain IP range and use Netscan to search through the IP range for PCs with shares. A PC can only have shares if it is connected to a network or has file and printing enabled, so mostly computers with an network card. If you find a computer with a share, use Windows to connect to that share.
Go START, RUN and type in "\\IP\sharename". Example "\\198.55.77.216\c" or with the PC name "\\pc1\c" - then you will have...