What is John the Ripper? – Definition from WhatIs.com. John the Ripper is a popular open source password cracking tool that combines several different cracking programs and runs in both brute force and dictionary attack modes. John the Ripper is often used in the enterprise to detect weak passwords that could put network security at…
GNS3 1.0 Early Release. GNS3 is an open source software that simulate complex networks while being as close as possible to the way real networks perform. All of this without having dedicated network hardware such as routers and switches. http://www.gns3.net/
Hack Like a Pro: How to Spear Phish with the Social Engineering Toolkit (SET) in BackTrack « Null Byte.
Social engineering is the art of getting people to give you the information you are seeking, rather than breaking into a system to get it. Among the most sought after bits of information is the username and password. Many online systems—even financial websites—use your email address as a username. Then they ask you to provide…
Hack Like a Pro: The Ultimate List of Hacking Scripts for Metasploit’s Meterpreter « Null Byte. Metasploit framework is an incredible hacking and pentesting tool that every hacker worth their salt should be conversant and capable on.
Adobe Flash Player Regular Expression Heap Overflow ≈ Packet Storm. This Metasploit module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 11.5.502.149. By supplying a specially crafted swf file with special regex value, it is possible to trigger an memory corruption, which results in remote code execution under the context…
Preparing for PCI-DSS Version 3.0 – BankInfoSecurity. Version 3.0 of the PCI Data Security Standard goes into effect Jan. 1, 2014, so organizations need to shore up their compliance programs, say Troy Leach and Bob Russo of the PCI Security Standards Council.
lazykali script for kali linux is awesome. LazyKali Script! A very good script posted by “darkc0d3” on the Top-Hat Sec Forum for updating your Kali Linux. YouTube: http://www.youtube.com/watch?v=38PXNJpIwck Download: http://code.google.com/p/lazykali/
Pass the Hash toolkit, Winexe | Kali Linux.
PENETRATION-TESTING via Passing the Hash with Remote Desktop | Kali Linux. Kali Linux contains a large number of very useful tools that are beneficial to information security professionals. One set of such tools belongs to the Pass-the-Hash toolkit, which includes favorites such as pth-winexe among others, already packaged in Kali Linux.