Within the Linux community, there are two major ideological movements at work. The Free Software movement, which we'll get into in a moment, is working toward the goal of making all software free of intellectual property restrictions, which it believes hamper technical improvement and work against the good of the community. The Open Source movement is working toward most of the same goals, but takes a more pragmatic
29 August 2011
Free and Open Source Software
Labels:
free,
General Public License,
GNU Software License,
IT,
License GNU GPL,
Linux
28 August 2011
What Is Linux ???
Linux was started by Linus Torvalds in 1991 as a personal project. He was looking for a way to run a Unix-based operating system without spending a lot of money. In addition, he wanted to learn the ins-and-outs of the 386 processor. It was released free-of-charge to the public so that anyone could hack on it and make improvements under the GNU General Public License
27 August 2011
DEFCON 19
Defcon is the annual gathering of hackers around the world. This year, Defcon held back its activities at the Rio Hotel, Las Vegas on 4 - August 7, 2011 last. Who can not attend, you can download all the materials grand conference on the link below. Happy Hacking :D
24 August 2011
Trademark
A Trademark is a mark used by an individual or business organization which represents trade or business and which is capable of distinguishing goods or services from that of others.
23 August 2011
Exploring Armitage User Interface
The Armitage user interface has three main panels :
Modules
Modules
- The modules panel lets you launch a Metasploit auxiliary module, throw an exploit, or generate a payload.
22 August 2011
XSS Vulnerability in Wordpress 3.2.1
Improper sanitized code in Wordpress Core Module(post-template.
php) Causing Cross site Scripting. This file can be finded in
directory /wp-includes. Author can simply Update his Post title
to <a><script>alert('1');</script></a> and its will give out
alert on index page and post page.
Labels:
Exploit,
PHP,
Vulnerabilities,
Web Vulnerabilities,
Wordpress,
XSS
17 August 2011
Armitage Feature
Armitage Feature like :
1. Discovery
1. Discovery
- Armitage provide several Host Management features available in metasploit.
- You can import hosts and launch scans to buildup a database of possible targets and visualize them on the screen, working with visualizations is more interactive when you right click on them and configures the options and settings according to your network environment.
Armitage – The Ultimate Attack Platform for Metasploit
To use Armitage, it is necessary to understand Metasploit. Metasploit is a command line tool. Anything you do in Armitage is translated into a command that Metasploit understands. To make it easier and funnier “Raphael Mudge” designed Armitage, which is a user interface for Metasploit.Armitage is a graphical management tool for Metasploit. It helps you to indulge your senses by visualizing your targets, recommends exploits and exposes the advance capabilities of the framework.
Labels:
Access,
Armitage,
Database,
Exploit,
Framework,
Hostname,
Internet,
IP address,
Metasploit,
Network,
network protocol,
pentest,
Vulnerabilities
01 August 2011
TCP/IP protocol
The TCP/IP protocol suite allows computers of all sizes, from many different computer vendors, running totally different operating systems, to communicate with each other. It is quite amazing because its use has far exceeded its original estimates. What started in the late 1960s as a government-financed research project into packet switching networks has, in the 1990s, turned into the most widely used form of networking between computerrs. It is truly an open system in that the definition of the protocol suite and many of its implementations are publicly available at little or no
Labels:
Access,
Bandwidth,
Computer,
Gateway,
Internet,
IP address,
Network,
network protocol,
Online,
operating systems,
protocols,
Server