LEARN ETHICAL HACKING WITH DVWA & DWWS

DAMN VULNERABLE WEB APPLICATION Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and to aid both students…Read more LEARN ETHICAL HACKING WITH DVWA & DWWS

Advertisements

How to encrypt and decrypt your files with ccrypt

  Encryption is one way that ensures the safety and security of our data, making the information unreadable to anyone who tries to get it without authorization. In addition to ensuring the integrity of your files, it allows access to be made ​​only for those who have the key (password) to decrypt it. We'll see…Read more How to encrypt and decrypt your files with ccrypt

Making scanning and raising vulnerabilities with Nikto

Nikto is a Perl tool developed by Chris Solo and David Lodge, which was written for vulnerability validation supporting multiple platforms, including Windows, Linux and UNIX. Unlike some security scanners, Nikto is designed to operate in a stealth mode, yet it causes a noise like other scanners. It is an open source licensed under the…Read more Making scanning and raising vulnerabilities with Nikto

Auditing and creating vulnerability analysis report with Nessus

  Nessus is one of the best tools to do vulnerability assessment, due to present an interactive interface and be able to generate and robust reporting. We will bring here how to install it, and how to make a vulnerability assessment (scanning) on ​​the target, showing some of its features such as report generation. Entering…Read more Auditing and creating vulnerability analysis report with Nessus

Performing Man in the Middle attack with sslstrip and Ettercap

In this tutorial we will address the type of attack known as Man in the Middle. This test "poison" the ARP table of the victim, causing the attacker machine - our machine - to pass through the router, so that we can intercept the traffic and have access to sensitive data exchanged between the two…Read more Performing Man in the Middle attack with sslstrip and Ettercap

An Informal Guide to Linux Distributions For the Unwashed Hacker

  I have decided to adapt a long post of mine detailing the “big five” minimalistic Linux distributions into a general guide for newcomers on entering the Linux ecosystem and choosing their first distro. == 1. A Quick and Dirty Introduction == I’m not going to cover the history of GNU, Linux and the free…Read more An Informal Guide to Linux Distributions For the Unwashed Hacker

Great Links & Tools to Learn From

I am not taking any credit for this list. I found this list and I am posting it here to share with everyone. I have checked most of the links but not all of them so if any are dead let me know and I will look for alternatives. Security Forums https://evilzone.org https://www.hackthissite.org/forums/index.php https://www.ethicalhacker.net/forums/index.php http://forum.antichat.ru/…Read more Great Links & Tools to Learn From