Sunday, 24 January 2016

UA Tester- Kali Linux - Hacking OS - Tutorial

A tool for User Agent WAF,IDS/IPS, Redirection testing.

UA-tester is a tool to check whether a website provides different pages for different user agents like for mobile, desktop bots etc. Well this tool also delivers a lot of information. It is basically a python script which runs through various user-agents on a specified site. It also tries various options like setting cookie, redirection, URL-stability(whether the URL expires or not) an a lot more.



Whatweb - Kali Linux - Hacking OS - Tutorial

Effective Web Discovery & Web Vulnerability Analysis tool.

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify all sorts of information about a live website, like:

Platform
CMS platform
Type of Script
Webserver Platform
IP address, Country
900+ Plugins & their libraries used
Server Headers, Cookies and a lot more.

Whatweb offers both passive scanning and aggressive testing. Passive scanning, just extracts data from http headers simulating a normal visit. Aggressive options get more deeper with recursion & various types of queries & identifies all technologies just like a vulnerability scanner. So a pentester can use this tool as both a recon tool & vulnerability scanner. There are a various other features like proxy support, scan tuning, scanning a range of IPs, spidering etc.



Nmap - Network Mapper - Kali Linux - Hacking OS - Tutorial

Network Mapper is an open source and a very versatile tool for Linux system/network administrators. Nmap is used for exploring networks, perform security scans, network audit and finding open ports on remote machine. It scans for Live hosts, Operating systems, packet filters and open ports running on remote hosts.



Metasploit Framework - Exploitation Tools - Kali Linux - Hacking OS - Tutorial

"Gather publicly available email-ids from search engines."


Metasploit is a framework of exploits, shellcodes, fuzzing tools, payloads,encoders etc. More over we can regard it as a collection of exploitation tools bundled into a single framework. It is avaliable in all major Linux, Windows, OS X platforms. It’s main objective is to test your/company’s/organization’s defences by attacking them. Something like “Offense for Defense”. This is actually where a penetration tester/Security Analyst begins attacking the victim after a huge recon. Metasploit has a wide range of tools & utilities to perform attacks agianst all operating systems including Android & iOS.


Lynis -Vulnerability Analysis - Kali Linux

Lynis is a security tool for audit and hardening Linux / Unix systems.


OWASP-ZAP - Web Application Analysis - Kali Linux- Hacking OS - Tutorial

OWASP ZAP is a web application penetration testing tool that has some great features. It is a very easy to use scanner that allows you to do manual or automatic website security checks. In this tutorial we will learn how to use the automatic attack feature.


Dmitry :Deepmagic - Kali Linux - Information Gathering Tool - Hacking OS - Tutorial

DMitry is a UNIX/(GNU)Linux Command Line Application coded in C. DMitry has the ability to gather as much information as possible about a host. Base functionality is able to gather possible subdomains, email addresses, uptime information, tcp port scan, whois lookups, and more.



Kali Linux 2.0 Installation Steps in Virtual Box - Hacking OS - Tutorial

Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.


Download Kali Linux : http://docs.kali.org/introduction/download-official-kali-linux-images (official sources)
https://www.offensive-security.com/kali-linux-vmware-arm-image-download/



Sunday, 3 January 2016

Unit 1: Introduction and Mathematical Foundations

Why there is a need of Information Security ?


  1. Information Security... What you need to know
  2. Physical & Information Security Awareness

        Click For Video Reference Link

Friday, 1 January 2016

IT306.02 Cryptography & Network Security

Course Objectives:


  • To introduce cryptography theories, algorithms and systems. Necessary approaches and techniques to build protection mechanisms in order to secure computer networks
  • To explain the basics of modern cryptography including symmetric key cryptography, public key cryptography, secure hash and digital signature. 
  • To explore issues surrounding secure key management, random number generation, and the incorporation of cryptography into legacy applications.
  • To analyze performance of various cryptographic and cryptanalytic algorithms.


Course Topics: 


  1. Introduction and Mathematical Foundations
  2. Symmetric Key Ciphers 
  3. Public Key Cryptography 
  4. Message Authentication and Hash Function 
  5. Network Security
  6. System Security 

Detail Syllabus : Click Here