
Topics include vulnerabilities, security bulletins, exploits, and how to fix them.
Bugtraq: is a complete mailing list of announcements and detailed expositions of computer security vulnerabilities. We have included the tools used in all four steps of a web pen-test. In developing this environment, we have based our tool selection on the tools we use in our security practice. The CD contains the best of the open source and free tools that focus on testing and attacking websites. The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. It can be used to sniff packets on a network, reverse engineer compiled programs, and other tasks that might be required of a security expert. It comes bundled with many tools for performing network penetration testing, security testing, and ethical hacking. BackBox, also known as BackBox Linux, is a variant of the Linux operating system that is based on Ubuntu. It includes a full portable laboratory for security and digital forensics experts, but it also includes all you need to develop your own softwares or protect your privacy with anonymity and crypto tools. Parrot Security: Security GNU/Linux distribution designed with cloud pentesting and IoT security in mind. Kali tools are often updated and can be used on other platforms, such as VMware and ARM. Kali Linux is the most versatile and advanced penetration testing tool release operating system. Mati Aharoni and Devon Kearns rewrote BackTrack. Kali Linux is a Debian-based distribution for digital forensics and penetration testing, developed and maintained by Offensive Security. Here are list 17 operating systems for penetration testing. DoubleLocker – New Ransomware Infects Android and Changes Pin. NACKered: bypass 802.1x Network Access Control. Mimikittenz: Extracting Info From Memory. VOIP Security Audit Framework (vsaudit). NAS4Free – Open Source Network Storage System. Keylogger Found On Over 460 HP Laptop Models.
LogViewer: viewing and searching large text files. Top 5 Slightly Illegal Android Apps Not On Google Playstore. Wireless penetration testing never been so easy.
How hackers will crack your “secure” password.
How to extend free trials with fake credit cards. How to Get SQL Server Security Horribly Wrong. Top 5 SIM Cloning Tools To Clone SIM Card. Your Phone Is Listening To Your Conversations. CainSec – Training For Security Professionals.