Saturday, September 14, 2013

Webcruiser - Scan web Vulnerable

WebCruiser - Web Vulnerability Scanner a títulocompacto but powerful web analytics tool that will help you in auditing your site! It has a vulnerability scanner and a series of security tools. It can support scanning website as well as POC (Proof of concept) for web vulnerabilities: SQL Injection, Cross Site Scripting, XPath Injection etc.. Therefore, it is also a tool WebCruiser automatic SQL injection, XPath injection tool,...

Backtrack: Getting Started "Experience"

Well, as many of you, I thought that this would work with an OS (Operating System) computer security oriented and today I have a couple of conclusions will discuss in this article. For starters, it is very important before any movement, have supported our team, but all are solvable problems we face concerning partitions and lost, it would not hurt this tedious step. Once we have that done, I recommend using Partition Magic in the case of Windows...

Backtrack 5 R3-BeEF The Browser Exploitation Framework

The Browser Exploitation Framework BeEF What is BeEF? BeEF The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.Amid growing concerns about the web-borne attacks against customers, including mobile clients, beef allows the professional penetration tester to evaluate the current security situation of a target environment using the attack client . Unlike other security frameworks,...

Facebook-Gmail "Tango Down" 10Diciembre

Today December 10, 2012 the social network "facebook" is dropped like gmail. At about 20.30 hours off Facebook adds just over half an hour. Some users can not enter directly the Facebook page, the previous time seemed to have a slow, but this time the errors are more dependent on the chrome browser: This webpage is not available in Firefox: Server not found, the decline could be due to a failure problem worldwide telecom backbone...

Backtrack 5 R3 DNS Spoofing

DNS Spoofing  Impersonation domain name. This is the distortion of a "domain name-IP" to a name resolution query, ie solve a fake IP address a certain name NS or vice versa. This is achieved by distorting the relationship entries-IP domain name of a DNS server by any particular server vulnerability or confidence to unreliable servers. Falsified entries of a DNS server are likely to infect (poison) the DNS cache different...