Archive for December 2010
Hacking Tool: WebInspect
This method will scan the web server for the top 20 vulnerabilities list published by SANS/FBI (www.sans.org)· WebInspect is an impressive Web server and application-level vulnerability scanner which scans over 1500 known attacks.· It checks site.
Shadow Security Scanner
http://www.safety-lab.com· Security scanner is designed to identify known and unknown vulnerabilities, suggest fixes to identified vulnerabilities, and report possible security holes within a network's internet, intranet and extranet environments.· Shadow.
Types of session Hijacking
There are two types of hijacking attacks:1. ActiveIn an active attack, an attacker finds an active session and takes over.2. PassiveWith a passive attack, an attacker hijacks a session, but sits back and watches and records all of the traffic that is.
What is Cloud Computing?
What cloud computing really meansCloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing.
What Is A Botnet?
A large number of computers that have been infected, and effectively hijacked, can be grouped together to achieve a common purpose.This group of hijacked computers is commonly referred to as a ‘botnet’.what is a botnet?Cyber criminals, who are often.
Basic Commands of Nmap.

Basic commands of Nmap are as following:nmap -v scanme.nmap.orgThis option scans all reserved TCP ports on the machine scanme.nmap.org . The -v option enables verbose mode.nmap -sS -O scanme.nmap.org/24Launches a stealth SYN scan.
What is Nmap?

Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) used to discover hosts and services on a computer network,.
Metasploit Basic Tutorial.

Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world's largest database of public, tested exploits. In simple words, Metasploit can.
What is Keylogger?

A Keylogger is a Program or hardware that record all the typed material."Keystroke logging (often called keylogging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person.