29 August 2011

Free and Open Source Software

Within the Linux community, there are two major ideological movements at work. The Free Software movement, which we'll get into in a moment, is working toward the goal of making all software free of intellectual property restrictions, which it believes hamper technical improvement and work against the good of the community. The Open Source movement is working toward most of the same goals, but takes a more pragmatic

28 August 2011

What Is Linux ???

Linux was started by Linus Torvalds in 1991 as a personal project. He was looking for a way to run a Unix-based operating system without spending a lot of money. In addition, he wanted to learn the ins-and-outs of the 386 processor. It was released free-of-charge to the public so that anyone could hack on it and make improvements under the GNU General Public License

27 August 2011

DEFCON 19

Defcon is the annual gathering of hackers around the world. This year, Defcon held back its activities at the Rio Hotel, Las Vegas on 4 - August 7, 2011 last. Who can not attend, you can download all the materials grand conference on the link below. Happy Hacking :D

24 August 2011

Trademark

A Trademark is a mark used by an individual or business organization which represents trade or business and which is capable of distinguishing goods or services from that of others.

23 August 2011

Exploring Armitage User Interface

The Armitage user interface has three main panels :
Modules
    • The modules panel lets you launch a Metasploit auxiliary module, throw an exploit, or generate a payload.

22 August 2011

XSS Vulnerability in Wordpress 3.2.1


Improper sanitized code in Wordpress Core Module(post-template. 
php) Causing Cross site Scripting. This file can be finded in 
directory /wp-includes. Author can simply Update his Post title
to <a><script>alert('1');</script></a> and its will give out 
alert on index page and post page.

17 August 2011

Armitage Feature

Armitage Feature like :
1. Discovery
  • Armitage provide several Host Management features available in metasploit.
  • You can import hosts and launch scans to buildup a database of possible targets and visualize them on the screen, working with visualizations is more interactive when you right click on them and configures the options and settings according to your network environment.

Armitage – The Ultimate Attack Platform for Metasploit

To use Armitage, it is necessary to understand Metasploit. Metasploit is a command line tool. Anything you do in Armitage is translated into a command that Metasploit understands. To make it easier and funnier “Raphael Mudge” designed Armitage, which is a user interface for Metasploit.Armitage is a graphical management tool for Metasploit. It helps you to indulge your senses by visualizing your targets, recommends exploits and exposes the advance capabilities of the framework.

01 August 2011

TCP/IP protocol

The TCP/IP protocol suite allows computers of all sizes, from many different computer vendors, running totally different operating systems, to communicate with each other. It is quite amazing because its use has far exceeded its original estimates. What started in the late 1960s as a government-financed research project into packet switching networks has, in the 1990s, turned into the most widely used form of networking between computerrs. It is truly an open system in that the definition of the protocol suite and many of its implementations are publicly available at little or no