본문 바로가기

Penetration Testing11

Tor-nonymous - Using Tor for Pen Testing [Editor's Note: In this article, Chris Crowley provides some really useful tips for using Tor to anonymize your penetration testing. He provides details on strategy and tactics, along with some helpful configuration settings and scripts. His discussion of Privoxy is especially useful. Thanks, Chris! --Ed.]By Chris CrowleyPen testing derives its value from being able to emulate the behavior of re.. 2014. 4. 30.
Kali Linux ( BackTrack Linux ) Kali Linux is the successor of the BackTrack Penetration Testing Linux distribution has been released. From the official project page:Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.Fig.01: Kali Linux desktop What's new in Kali Linux .. 2013. 9. 12.
Password List For Penetration Testing This is a list with very common passwords that it can be used in a penetration testing.qwertyabc123monkeyadminsystem12345612345678letmeintrustno1dragon1234567lifehack111111consumer12345letmein!iloveyouabcangellovesoccerrockyou123456789Password123Secret1michaelDanielNicoleSimplepass654321testP4ssw0rd1234696969mustangbaseballmastershadowpass6969harleyrangerthomastiggerrobertaccessgeorgecharlieandr.. 2012. 9. 14.
BackTrack 5 R3 Released! The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released. R3 focuses on bug-fixes as well as the addition of over 60 new tools – several of which were released in BlackHat and Defcon 2012. A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collec.. 2012. 8. 14.
Metasploit Framework 4.2.0 “The Metasploit Framework is a penetration testing toolkit, exploit development platform, and research tool. The framework includes hundreds of working remote exploits for a variety of platforms. Payloads, encoders, and nop slide generators can be mixed and matched with exploit modules to solve almost any exploit-related task.“ Official change log for Metasploit Framework 4.2.0: IPv6 Coverage: M.. 2012. 2. 23.