KaffeNews: The Journal
WebSploit is an open source project for scan and analysis remote system from vulnerability: Autopwn – Used From Metasploit For Scan and Exploit Target Service wmap – Scan,Crawler Target Used From Metasploit wmap plugin format infector – inject reverse & bind payload into file format phpmyadmin – Search Target phpmyadmin login page lfi – Scan,Bypass [...]
PacketFence supports a complete, reliable, free and open source Network Access Control (NAC) solution. With an impressive feature set, including a captive portal for entry and recovery, centralized wired and wireless management, support 802.1X, Layer-2 Isolation of problematic devices, by integrating the IDS Snort and vulnerability scanner Nessus, PacketFence can be used order to effectively [...]
Hello Viewers, We have gotten really slow lately (in terms of blogging), although some of us are still trying to catch up to keep the blog pumping. DigitOnto LLC will be picking up its pace in a lot of different directions including project and site releases, blogging and various other domains. We have expanded by [...]
Secunia Personal Software Inspector (PSI) is available for free download at http://secunia.com/products/consumer/psi/. PSI is one of the few products out there in the market that does its job, like it should. One might wonder that it is common for products to do what it is supposed to, but when you test them 90% of the [...]
We have added API and Credit sections for www.UnmaskContent.com. For API page, click here: http://www.unmaskcontent.com/common/pages/api.php For Credit page, click here: http://www.unmaskcontent.com/common/pages/credit.php If we have forgotten to add you in Credits page or if you have any comments/concerns, please feel free to reach out to us. Thank you.
I am pleased to announce that we have a SANS GCIH Mentor session at Herndon, VA. This is a 10 week session: Thursday, May 17, 2012 – Thursday, July 19, 2012. This is my very first mentoring opportunity and I really hope to take this opportunity to spread the knowledge, socialize with local groups and [...]
Anti consists of 2 parts: The Anti version itself and extendable plugins. Upcoming updates will add functionality, plugins or vulnerabilities/exploits to Anti Using Anti is very intuitive on each run, it will map your network, scan for active devices and vulnerabilities, and will display the information accordingly: Green led signals an ‘Active device’, Yellow led [...]
“Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage [...]
The Pentagon has approved a version of Android running on Dell hardware to be used by DoD officials, along with the BlackBerry. The approval of Android by the DoD is a major setback for Apple’s iPhone. The military approval is quite specific. Android can only be used on Dell’s hardware running Android 2.2. Dell is [...]
The most people set password which are very easy to crack such as qwerty, abc123, 123456 etc. To avoid setting common passwords for your accounts and creating a strong password that is easy to remember, check out the infographic(below). (Click image to enlarge)
Bad Behavior has blocked 2577 access attempts in the last 7 days.