Skip to main content

Posts

Showing posts from June 22, 2013

Note:- For Ad.ly Downloads

             For Adf.ly.. Hey Guys if you are unable to vi sit/open/Download anything from adf.ly links in this blog, Herez a smaal note:- a)Just do followin g thing ex :-adf.ly/as21 is the link as we know it will o pen[ONLY FOR INDIAN VISITORS ] {A s DOT has Blocked The Domain due Some Reas on s} Just Change The Lin k To  https://adf.ly/as21   & enjoy Downloading . .. :p      

Google as a Vulnerability Scanner

Google as a Vulnerability Scanner ---------------------------------- Todays Post Gonna Be something Different,we know Nowadays There are Many or we Can say various types Scanners Available but herez new Try out!! DO COMMENT!! Goolag Scan scours the Web for compromised systems and confidential information. But is it legal? Google, as everyone knows, excels at helping users find information scattered across the Web. Leveraging this fact, a hacker group known as cDc, or Cult of the Dead Cow, has created a tool that uses Google to automatically scour the Web for compromised systems and confidential information. A vulnerability scanner is a powerful tool that can be used for both good and evil purposes. The software, which searches and maps applications, computers and networks for existing weaknesses, can be used by an individual or business to spot and fix security holes — or by an attacker to find easy targets. Using Google, and its immense power to drive searches for attack friendl

#Security_Audit with #Nmap - commands List

# Security_Audit with #Nmap - commands List ------------------------------------------------- Courtesy:- https://www.facebook.com/geeksch00l Nmap -One of the best Tool for Security Scanning & Audits . . Her z Some Info on Its Command List . . .   Here are some nmap commands that will help for #VAPT #Vulnerability_Assessment #Penetration_Testing Basic #Scanning_Techniques --------------------------- Scan a single target —> nmap [target] Scan multiple targets —> nmap [target1,target2,etc] Scan a list of targets —-> nmap -iL [list.txt] Scan a range of hosts —-> nmap [range of IP addresses] Scan an entire subnet —-> nmap [IP address/cdir] Scan random hosts —-> nmap -iR [number] Excluding targets from a scan —> nmap [targets] –exclude [targets] Excluding targets using a list —> nmap [targets] –excludefile [list.txt] Perform an aggressive scan —> nmap -A [target] Scan an IPv6 target —> nmap -6 [target] Discovery Options --------------------- Perform

Become A Web-Developer from a scratch.

         Learn Web-Developing From A Scratch.   A Full Course Tutorial Availabe: 1).Full Course Link ..:-2.14GB Click Here   2). XHTML and CSS:-  Click Here:- 3.) Javascript:- 4). Php & Mysql:- 5). Json 6). AJAX:- 7). HTML5:- 8). CSS3:- 9). JQUERY:-           PLEASE COMMENT ON HOW'S THE TUT

#Firewall Tests and Supporting Tools

# Firewall Tests and Supporting Tools -------------------------------------------- Courtsey/:- https://www.facebook.com/geeksch00l Is your firewall still safe? Use these resources to test your firewall at least once per month and after any major change. Firewall testing can be a hassle, particularly in environments with multiple devices possessing multiple interfaces. Industry consultants, however, recommend that IT managers step up to this ounce of prevention. Wayne Haber, director of architecture at SecureWorks_Inc., a managed #security services provider, advised testing firewalls at least once per month and after any major change. Jonathan_Glass, senior systems administrator at SecureWorks, also recommended adding firewall testing to the firewall change management process. A battery of tests may be in order to make sure firewalls serve their purpose. This testing can prove time-consuming and labor-intensive, but a number of automated tools — both open-source and commercial —