As more people are using the phrase “third platform”, I’ll assume it needs no introduction or explanation. The
mobile workforce has been mobile for a few years now. And most organizations have moved critical services to cloud-based offerings. It’s not…
How To Protect In Cafe/Public Computers While Surfing Internet?
People who surf internet on cafe/public computers, are more vulnerable to be hacked, reason is simple! They are unaware from the software installed on public computers, their privileges. It’s always secure to access internet from your personal computer…
Tutorial On DNS Cache Poisoning (Redirect abc.com By Entering xyz.com In Address Bar)
Hello guys! Today I’m going to post about a hacking technique named “DNS Spoofing or DNS Cache Poisoning”. DNS cache poisoning is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) name server’s cache database, c…
Kali Linux Amazon EC2 AMI
Kali Linux in the Amazon EC2 Marketplace
EDIT: For updated Kali Rolling images in the Amazon AWS, check this post.
After several weeks of “back and forth” with the Amazon EC2 team, Kali Linux has finally been approved into the Amazon EC2 ma…
Passing the Hash with Remote Desktop
Kali Linux contains a large number of very useful tools that are beneficial to information security professionals. One set of such tools belongs to the Pass-the-Hash toolkit, which includes favorites such as pth-winexe among others, already packaged in…
How to Nuke your Encrypted Kali Installation
There’s been a fair amount of discussion around the recently introduced LUKS nuke patch we added to the cryptsetup package in Kali Linux. We wanted to take this opportunity to better explain this feature, as well as demonstrate some useful approa…
Kali Linux 1.0.6 Release
Kernel 3.12, LUKS nuke, Amazon AMI / Google Compute images and more!
It’s been a while since our last minor release which makes 1.0.6 a more significant update than usual. With a new 3.12 kernel, a LUKS nuke feature, new Kali ARM build scripts, a…
Emergency Self Destruction of LUKS in Kali
Kali Linux Full Disk Encryption
As penetration testers, we often need to travel with sensitive data stored on our laptops. Of course, we use full disk encryption wherever possible, including our Kali Linux machines, which tend to contain the most sensi…
Ultimate Pentesting PwnBox (2013) – Utilite Pro
We’re always on the lookout for and interesting ARM hardware for Kali Linux. Whether it’s a Galaxy Note or a USB stick sized SS808, we want to see Kali run on it. You can therefore imagine our excitement, when we first laid our eyes on the …
Is MAM Identity and Access Management’s next big thing?
Mobile Application Management is making waves. Recent news from Oracle, IBM, and Salesforce highlight the market interest. It’s a natural extension of what you’ve been hearing at Identity trade shows over the past few years (and this year’s Gartner IAM…