Posts

Showing posts with the label Itcyber

Easy Backtrack 5 Tutorial Designed For Total Beginners

Learn anything. Anywhere. Easy Backtrack 5 Tutorial Designed For Total Beginners backtrack5tutorialWhen it comes to learning how to perform penetration testing with Backtrack 5, you probably know how tough it looks. Hopefully, with this Backtrack 5 Tutorial, we’re going to change that for you. What if you don’t even know what penetration testing is? Well, before we get started, we’re going to tell you. In a nutshell, penetration testing is a way for an individual (or company) to test the security of a network. It sounds a lot like hacking, doesn’t it? Don’t worry! It’s perfectly legal as long as you are using it with good intentions such as exploiting your own network and using the tool to make your network more secure. Believe us when we say this, there is a big demand for this. After all, if you can get into a company’s network then that means that someone else probably can to. You’ll also hear of penetration testing referred to as ethical hacking or white hat hacking. Either way, it...

We are Anonymous.

Image
[caption id="" align="alignnone" width="692"] The anonymos  traces[/caption] We are Anonymous. We do not forgive. We do not forget A representative of the hackivists changing 21st century protest offers us a manifesto GREETINGS, PEOPLE OF THE WORLD - WE ARE ANONYMOUS There are many theories about us. That we’re anarchists, kids, crazy film-buffs that saw one too many superhero movies. The truth is, we are all these things. Anonymous is a symbol, like the flag a country flies. The flag is the symbol of the country. Our masks are our national identity. We are not Anonymous – we represent the ideals of Anonymous. Truth, freedom and the removal of censorship. Like any symbol, we affix it wherever we go, as you have seen from street protests. We have no leaders, civilians or soldiers. We are all one. We run operations because that is what the group decides to do. We choose targets because that is what the people who represent the ideals of Anonymous want to fi...

How to disable IPv6 in Exim

How to disable IPv6 in Exim The other day I was just [ seriously, for no apparent reason &#x1f600; ] going through the exim logs in my server and this error caught my eye. ASPMX3.GOOGLEMAIL.com [2a00:1450:400b:c02::1b] Network is unreachable Apparently, IPv6 wasn’t configured properly in the server and this was causing issues when trying to communicate with google’s IPv6 addresses. There are two ways you can fix this issue. The easy way and the correct way. The correct way would be to configure IPv6 properly ( obviously ). As lazy as I am, I chose the easy way. Anyway, this is how you would disable IPv6 in your exim mail server: Check if IPv6 is currently enabled. If you see tcp6, then it means IPv6 is enabled. <pre class="toolbar:2 lang:default decode:true">[root@server ~]# netstat -tulpn | grep :25 tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 23336/exim tcp 0 0 0.0.0.0:2525 0.0.0.0:* LISTEN 23336/exim tcp6 0 0 :::25 :::* LISTEN 23336/exim tcp6 0 0 :::2525 :::* LISTEN 23...

10 Most Notorious Hacking Groups of All Time

Image
10 Most Notorious Hacking Groups of All Time   Twitter Linkedin Facebook Pinterest Google Digg Reddit Stumbleupon Weibo Subscribe Mail Print Want to get caught up real quick on the history of hacking ? This article on the 10 most notorious hacking groups of all time will help you. Don’t forget to check out our article on the 10 most notorious hackers of all time .  1. Lizard Squad Lizard Squad has claimed responsibility for the cyber attacks on Malaysia Airlines which resulted in website visitors being redirected to a page which read “404 – plane not found,” as well as a DDoS attack on Facebook which downed the popular social media network. Facebook denied being hacked . Malaysia Airlines claimed that they had not been hacked and that their domain had only been temporarily redirected elsewhere. They’ve also hacked Sony , Microsoft and Facebook . The diverse history of work by Lizard Squad makes their intentions murky. They aren’t pure hacktivists since much of what they do is sl...

Ettercap and middle-attacks tutorial

Image
Ettercap and middle-attacks tutorial In the computer world, an attack is a way to destroy, expose and gain unauthorized access to data and computers. An attacker is a person that steals your data without permission and a feature of some attacks is that they are hidden. Attacks are not always simple; most of them are complex and it is a big challenge for security researchers and companies that offer a solution for them. An attack can be active or passive: Active attack : In this kind of attack, The Attacker attempts to alter system resources or destroy the data. The Attacker can change the data, etc. Passive attack : In this kind of attack, The Attacker attempts to gain information from the system without destroying the information. This attack is more like monitoring and recognition of the target. I want to familiarize you with different types of active and passive attacks: Active Attack: Denial-of-service attack. Spoofing. Man in the middle. ARP poisoning. Overflo...

DCN - Computer Network Security

Image
During initial days of internet, its use was limited to military and universities for research and development purpose. Later when all networks merged together and formed internet, the data useds to travel through public transit network.Common people may send the data that can be highly sensitive such as their bank credentials, username and passwords, personal documents, online shopping details, or confidential documents. All security threats are intentional i.e. they occur only if intentionally triggered. Security threats can be divided into the following categories: Interruption Interruption is a security threat in which availability of resources is attacked. For example, a user is unable to access its web-server or the web-server is hijacked. Privacy-Breach In this threat, the privacy of a user is compromised. Someone, who is not the authorized person is accessing or intercepting data sent or received by the original authenticated user. Integrity This type of threat include...

How to Stop a DSL Modem From Being Hacked

Image
A hacked DSL modem can result in a wide range of problems, from stolen personal information to computers infected with viruses. Many of the vulnerabilities of a standard DSL modem are related to its default settings; because users don't bother to change the settings after the initial installation, hackers have an easy way in. By adjusting your modem settings and staying on top of security, you can protect your network and your personal data.