LEARN ETHICAL HACKING WITH DVWA & DWWS

DAMN VULNERABLE WEB APPLICATION Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and to aid both students…Read more LEARN ETHICAL HACKING WITH DVWA & DWWS

How to encrypt and decrypt your files with ccrypt

  Encryption is one way that ensures the safety and security of our data, making the information unreadable to anyone who tries to get it without authorization. In addition to ensuring the integrity of your files, it allows access to be made ​​only for those who have the key (password) to decrypt it. We'll see…Read more How to encrypt and decrypt your files with ccrypt

GnuPG {PGP Keys}

  Index Introduction GnuPG OpenPGP Installation Use Encryption with phrase Generating Keys Adding More Information to the Keys Managing Keychain Exporting / Importing Keys Exporting Importing Encrypting files with keys Decrypting files with keys Using Servers Sending Keys Downloading Keys Conclusion References Introduction Gnu Privacy Guard [0] (or GnuPG, or further reduced GPG) is an…Read more GnuPG {PGP Keys}

Making scanning and raising vulnerabilities with Nikto

Nikto is a Perl tool developed by Chris Solo and David Lodge, which was written for vulnerability validation supporting multiple platforms, including Windows, Linux and UNIX. Unlike some security scanners, Nikto is designed to operate in a stealth mode, yet it causes a noise like other scanners. It is an open source licensed under the…Read more Making scanning and raising vulnerabilities with Nikto

Auditing and creating vulnerability analysis report with Nessus

  Nessus is one of the best tools to do vulnerability assessment, due to present an interactive interface and be able to generate and robust reporting. We will bring here how to install it, and how to make a vulnerability assessment (scanning) on ​​the target, showing some of its features such as report generation. Entering…Read more Auditing and creating vulnerability analysis report with Nessus

Performing Man in the Middle attack with sslstrip and Ettercap

In this tutorial we will address the type of attack known as Man in the Middle. This test "poison" the ARP table of the victim, causing the attacker machine - our machine - to pass through the router, so that we can intercept the traffic and have access to sensitive data exchanged between the two…Read more Performing Man in the Middle attack with sslstrip and Ettercap

An Informal Guide to Linux Distributions For the Unwashed Hacker

  I have decided to adapt a long post of mine detailing the “big five” minimalistic Linux distributions into a general guide for newcomers on entering the Linux ecosystem and choosing their first distro. == 1. A Quick and Dirty Introduction == I’m not going to cover the history of GNU, Linux and the free…Read more An Informal Guide to Linux Distributions For the Unwashed Hacker