Month: May 2015

Learn | Teach Open Source Technologies

Configuration of LAMP server for launching of Prestashop Open Source e-Commerce online shop Urdu CBT

  Configuration of LAMP (Linux Apache MySQL PHP) server on CentOS 6.4 Linux for launching of Prestashop Open Source e-Commerce online shop Urdu CBT

Use the Emacs Editor in Linux

Emacs is one of the oldest and most versatile text editors available for Linux and UNIX-based systems. It’s been around for a long time (more than twenty years for GNU emacs) and is well known for its powerful and rich editing features.

Open Source OS meant for “Privacy for anyone anywhere” Tails based on Debian GNU/Linux — Free Software

Tails an Open Source Operating system based on famous GNU/Linux OS Debian which is meant for “Privacy for anyone anywhere”  has been launched. Tails is new Operating System in the list of Operating Systems which provides anonymity online; It is meant to provide  “Privacy for anyone anywhere”  Tails is Live Operating System which can be downloaded…
Read more

Vim Editor in Linux / Unix / Solaris

The vim editor is a very powerful tool and has a very extensive built-in manual, which you can activate using the :help command when the program is started (instead of using man or info, which don’t contain nearly as much information). We will only discuss the very basics here to get you started.

How to Crawl Hidden Friends on Facebook (Fake App)

Hackers have a new tool in their arsenal dubbed Facebook Friends Mapper that allows them to crawl Facebook Hidden Friends list just in a click. Facebook users can protect their privacy by setting the “privacy level” for every information related their profile or content they post online.

Thousands Linux and FreeBSD Servers Infected with Mumblehard Spamming Malware

The sophisticated Mumblehard spamming malware infects thousands of Linux and FreeBSD servers going under the radar for at least five years. In the last seven months, several thousand Linux and FreeBSD machines have been infected with a sophisticated malware dubbed Mumblehard. The infected machines were part of a botnet used, in the last five years, to…
Read more

The Ethics of Information Security

The ethical vision of security testing constitutes rules of engagement that have to be followed by an auditor to present professional, ethical, and authorized practices. These rules define how the testing services should be offered, how the testing should be performed, determine the legal contracts and negotiations, define the scope of testing, prepare the test…
Read more

Social Engineering

Practicing the art of deception is considerably important when there is no open gate available for an auditor to enter the target network. Thus, using a human attack vector, it is still possible to penetrate the target system by tricking a user into executing malicious code that should give backdoor access to the auditor. Social…
Read more

Types of Penetration Testing

Although there are different types of penetration testing, the two most general approaches that are widely accepted by the industry are the black box and white box. These approaches will be discussed in the following sections.  Black box testing

Getting network routing information with Open Source tools

The tools in this category can be used to get the network routing information of a target. We will describe several tools that are commonly used for this purpose. Knowledge of the network routing information will allow the penetration tester to understand the network of the target machine, such as which path is taken by…
Read more