Kali & NetHunter Security Release Fixes

Squash the Bugs with Kali 1.0.9a
Over the past couple of weeks, we’ve seen a bunch of nasty bugs hit the scene, from shellshock to Debian apt vulnerabilities. As we prefer not to ship vulnerable ISOs, we’ve rolled up new images for our Kali…

October 6, 2014
Read More >>

Kali Tools Website Launched, 1.0.9 Release

Now that we have caught our breath after the Black Hat and DEF CON conferences, we have put aside some time to fix an annoying bug in our 1.0.8 ISO releases related to outdated firmware as well as regenerate fresh new ARM and VMware images (courtesy of…

August 25, 2014
Read More >>

BMWs and Bicycles: The Value of Complexity

If your ideas about Oracle Identity & Access solutions start and end with the word complexity, you’re missing the big picture. Contrary to what competitors might be telling you, Oracle’s current IAM solution looks nothing like a conglomeration of d…

July 28, 2014
Read More >>

WordPress Security: Securing Sites From Hackers / Future Attacks

As WordPress is the most popular CMS available on the web but also vulnerable to threats if we don’t follow the necessary security measures.

In one of previous guest post, Sarah Rexman mentioned some tips about securing WordPress and in this post I’m gonna share my own experience. While working as freelancer on Upwork, PeoplePerHour and Freelancer; clients always have issues about securing their sites from hackers and ask about how to prevent from future attacks. So consider these points to secure your WordPress site for now and future:

  • Keep your WordPress up to date. Latest stable version is 6.7.2 released on 11th February, 2025.
  • Keep your all plugins, themes up to date.
  • Always keep backup of your database, files and make it update after some interval.
  • If site has been compromised, then you must change your salt keys from your wp-config.php file under root directory. You can generate new keys from here. It will force all users to have to log in again.
  • Change your all passwords associated with site at regular interval.
  • Use strong passwords for all logins. Include the mixture of atleast one uppercase letter, lowercase letter, special character, number.
  • Change your WP-Admin username from admin to some other name.
  • Change database prefix from wp_ to some other complicated characters to avoid zero-day SQL injection attacks.
  • Remove timthumb script if your site running it as its no longer supported or maintained.
  • Use plugins after testing it properly. Going through plugin review, Google search will let you know about the reputation of the plugin.
  • Keep track of latest visitors through log files for tracking site users. If you find any suspicious activity at any particular time, then logs files might help you to know a bit about the attacker.
  • Change permissions for .htaccess, wp-config.php, themes main files to 444.
  • Proper file permissions for other files and folders. Best practice is to use 644 for files and 755 for folders.
  • Keep your own system virus free.
  • Always try accessing the site credentials from your own system only.
  • Validate all user inputs  like URL, image uploads etc.
  • Keep track of WP-Admin, FTP accounts user section for any unauthorized user.
  • You can also use Wordfence plugin to monitor from malicious scripts.
  • Put some security to the server on which your site is hosted, either it hosted on dedicated or a shared server.
  • Keep updated with latest vulnerabilities.
Is your own site get infected with malware/virus, contact me through contact form to get rid of malware with future security implementation. In some cases, site might be hit by pharma hack, you can check it either through site content or by searching your site on Google with query “site:example.com pharma”
Having any further issue? Please comment down!
July 27, 2014
Read More >>

Kali Linux 1.0.8 Release with EFI Boot Support

The long awaited Kali Linux USB EFI boot support feature has been added to our binary ISO builds, which has prompted this early Kali Linux 1.0.8 release. This new feature simplifies getting Kali installed and running on more recent hardware which requi…

July 22, 2014
Read More >>

What Do We Think About Comcast Home Security

Xfinity (Comcast) is a cable and internet company.  Comcast Home Security very new to the home security market but already have generated plenty of reviews.  Please read them.  Not the ones they may post on their own website, instead search for the rea…

June 10, 2014
Read More >>

What Do We Think About ADT

If you are looking for home security systems you will likely look at ADT. Unless, you already have been an ADT customer and realized what you received for your hard earned dollar. These folks are looking elsewhere. The reason you will look is because t…

May 29, 2014
Read More >>

Kali Linux 1.0.7 Release

Kernel 3.14, Tool Updates, Package Improvements
Kali Linux 1.0.7 has just been released, complete with a whole bunch of tool updates, a new kernel, and some cool new features. Check out our changelog for a full list of these items. As usual, you don&rs…

May 27, 2014
Read More >>

Tutorial On Information Gathering / Foot Printing (Hacking Technique)

Information Gathering

Information gathering or Foot printing is the basic technique of hacking which includes gathering maximum information about the target computer systems. It is a very important part of hacking because the more information about target system we have, more the number of attacks we can launch. Information gathering is the important technique because all other process of hacking based on information that you have. Therefore we must know what information to gather, where to find it, how to collect it & how to process the collected information.

Let’s start with an example: Suppose your designation is as a hacker in your company & company wants some information about the target system like physical location, IP records and some details about the specific domain. What you’ve is only the domain name (e.g. www.example.com) or IP address. There are some practical steps you need to follow while gathering information about target system:

  • First step is to finding the IP address:
    • Go to command prompt> type ping www.example.com
    • It will give you IP of the target system.
  • After getting IP, next step is to know about the physical location of the victim:
    • Go to IP2location from here, enter the IP in search field & hit enter.
    • It will give you details about the physical location of the victim.
  • Now, we have to find out the details of the domain (example.com):
    • Go to who.is or whois.domaindetails.com & type the site address of victim.
    • It will give you details about domain owner, server, domain expiry/creation date.\
  • Use Traceroute for tracing the websites path:
  • Use Google for getting more information about the victim.
Following above methods will help you in getting maximum information about the target system & if you need further information, then google it with your queries.
Some of the tools used for information gathering are nslookup, traceroute & Nmap. Very soon, I will explain about Information Gathering technique using Back Track.
May 21, 2014
Read More >>