Learn Web Application Exploits and Defenses for free~Penetration Testing

Are you willing to Learn Web Application Exploitation and Defense against that? Here is the chance for you.   Google Labs provides a Lab to learn Web Application for free of cost.Penetration Testing : Learn how hackers find security vulnerabilities! Learn how hackers exploit web applications! Learn how to stop them!  This code lab shows how […]

Blackbuntu CE v0.3! is Released

What is Blackbuntu? “Blackbuntu is a Linux distribution for penetration testing which is specially designed for training security students and practitioners of information security. It is currently built on Ubuntu 10.10 with the Gnome desktop environment. Blackbuntu will also include the KDE desktop in the final release of Blackbuntu Community Edition 0.3. It is not […]

SQL Inject Me -SQL Injection Tool to test the Vulnerability for Pen Testers

So far i have written what is sql Injection, How to prevent SQL Injection? .  In this post, i am going to introduce a new SQLi tool for Pen Testers and Webmasters.The tool name is SQL Inject Me. What is SQL Inject Me?SQL Inject Me is Mozilla addon that is used to test the SQL […]

pyDetective- An Open Source Forensics Software

pyDetective is New Open source Forensics Software tool developed by Mr. Filip Szymanski. It is  used for computer crime investigations. It consists of two tools namely del2info & carver * del2info – A tool for analyzing Windows Recycle Bin INFO2 and $I?????? files* carver – A tool for extracting Thumbnails stored in Windows Explorer thumbcache_NN.db […]

Apache Log Extractor Tool for Pen Testers

We know that Apache Server is Famous Web server.  Let us see what is Apache log extractor tool . What is Apache Log Extractor Tool?Apache Log Extractor is a quick script to export URL information from Apache access logs. The thought behind this script was to provide a list of known URL’s on a remote […]

How to Become a Penetration Tester/Ethical Hacker//Security Professional?

 you can not become suddenly as a ethical hacker, you have to work harder.  I will just show the path to the security professionals, you have to walk in that path. (This blog will help you to become an Ethical Hacker) Internet Usage and security flows The Internet usage in India is rapidly increasing. Internet […]