• Subscribe to the low volume list for updates.

Blog

PandaLabs 2010 Annual Report

It appears 2010 has been a cracking year for malware developers. Customised malware is a significant threat to any environment, given the fact that controls that can effectively protect against these attacks are limited and difficult to implement. Anti-virus certainly does not provide much protection against a trojan that has been customised to attack a […]
Read More

Security Onion LiveCD

Security based LiveCD distributions are a great way to quickly get your hands on some powerful security tools. Security Onion is no exception, if you are interested in playing with IDS or getting some intrusion detection tools up and running in a hurry you should definitely take a look at this. What is Security Onion? […]
Read More

Hack your org in 60 minutes

Often times the users of HackerTarget.com are not experts in the realm of vulnerability assessments. In fact, many are not sure where to start and are confronted with a bunch of free tools available online for immediate use. The tools have a variety of different uses leaving beginners unsure of where to begin. Below is […]
Read More

Armitage – Cyber Attack Management for Metasploit

Metasploit development continues in leaps and bounds both from within Rapid7 and from the community. This is newly released tool puts the power of the Metasploit Framework into the hands of those who prefer point and clicky interfaces. Why does Armitage exist? "I've met too many security professionals who don't know how to use Metasploit. […]
Read More

Google builds lessons for Web Application Security

Google Gruyere The codelab is organized by types of vulnerabilities. In each section, you'll find a brief description of a vulnerability and a task to find an instance of that vulnerability in Gruyere. Your job is to play the role of a malicious hacker and find and exploit the security bugs. In this codelab, you'll […]
Read More

TechCrunch Europe hacked

Drive by downloads, adobe exploits and a zeus variant trojan that is only detected by 2 of 43 Anti-virus products. This is a good example of current threats that website operators as well as end users should all be aware of, a high profile site gets hacked and poses a signifcant threat to the end […]
Read More

Metasploit Express Review

Metasploit Express with Ubuntu Announcement: End of life for Metasploit Express Jun 4th 2019 - Read Notice here The purchase of Metasploit by Rapid7 last year and the recent release of Metasploit Express has been big news in the security community. I have finally gotten around to giving it a spin. So what is Metasploit […]
Read More

Metasploit vs Snort as Snorby

Recently I stumbled acorss Snorby, an excellent easy to use implementation of Snort. It is a new web interface for Snort that is very pretty, but also simple. An excellent introduction to Intrusion Detection Systems, that is not going to scare anyone away. Now how to I get hold of this I hear you cry.... […]
Read More

Metasploit 3.4.0 on Ubuntu 10.04 a quick introduction

Perhaps you have heard of metasploit. It is a very powerful exploitation framework developed by HD Moore. Solid growth has seen an early version that was a few exploits in a perl based wrapper turn into a ruby coded framework that is competing with Core Impact and Canvas in the pen-testing community. Here is a […]
Read More

SET Social Engineering Toolkit

This tool, and guide to using the tool, is an example of how easy client based exploitation has become. When it comes down to it, attacking the client is fast becoming the easiest method to perform a targeted attack against an organisation or company. For our readers who are not familiar with Metasploit this maybe […]
Read More