Live Chat

Live Traffic

BackTrack 5 R3 Linux Penetration Testing

BackTrack is a linux penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack you Install BackTrack, boot it from a Live DVD or thumbdrive, the penetration distribution has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to date. BackTrack community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.
BackTrack 5 R3 has been released. BackTrack 5 R3 Linux Penetration Testing focuses on bug fixes as well as the addition of over 60 new tools, several of which were released in BlackHat and Defcon 2012. A whole new tool category was populated “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.
4:01 PM | 0 comments | Read More

Fiddler Web Debug Proxy

Fiddler is a Web Debugging Proxy which logs all HTTP ( HTTPS ) traffic between your computer and the Internet. Fiddler allows you to inspect traffic, set breakpoints, and "fiddle" with incoming or outgoing data. Fiddler includes a powerful event-based scripting subsystem, and can be extended using any .NET language. Fiddler can debug traffic from virtually any application that supports a proxy, including Internet Explorer, Google Chrome, Apple Safari, Mozilla Firefox, Opera, and thousands more. You can also debug traffic from popular devices like Windows Phone, iPod/iPad, and others. Fiddler2 includes the ability to decrypt, view, and modify HTTPS secured traffic for debugging purposes. The decryption feature is disabled by default. Enable the traffic decryption option by clicking Tools > Fiddler Options > HTTPS and ticking the Decrypt HTTPS Traffic box.
Fiddler 2.4.0.3 [8/3/2012] bug fix :
Improved composer
Improved Performance
Add Files > Recent menu
Updated sounds for script load
Add fiddler.Lint.HTTP feature
Various bugfixes
Fiddler Web Debug Proxy
9:36 AM | 0 comments | Read More

Firestarter Linux Firewall Program

Firestarter is an Open Source visual Linux firewall program. Firestarter aims to combine ease of use with powerful features, therefore serving both Linux desktop users and system administrators. 
Firestarter Linux Firewall Program Features :
Open Source software, available free of charge
User friendly, easy to use, graphical interface
A wizard walks you through setting up your firewall on your first time
Suitable for use on desktops, servers and gateways
Real-time firewall event monitor shows intrusion attempts as they happen
Enables Internet connection sharing, optionally with DHCP service for the clients
Allows you to define both inbound and outbound access policy
Open or stealth ports, shaping your firewalling with just a few mouse clicks
Enable port forwarding for your local network in just seconds
Option to whitelist or blacklist traffic
Real time firewall events view
View active network connections, including any traffic routed through the firewall
Advanced Linux kernel tuning features provide protection from flooding, broadcasting and spoofing
Support for tuning ICMP parameters to stop Denial of Service (DoS) attacks
Support for tuning ToS parameters to improve services for connected client computers
Ability to hook up user defined scripts or rulesets before or after firewall activation
Supports Linux Kernels 2.4 and 2.6
Translations available for many languages
4:32 PM | 0 comments | Read More

Gpg4win GNU Privacy Guard for Windows

GNU Privacy Guard for Windows ( Gpg4win ) is encryption software for files and emails. Gpg4win enables users to securely transport emails and files with the help of encryption and digital signatures. Encryption protects the contents against an unwanted party reading it. Digital signatures make sure that it was not modified and comes from a specific sender. Gpg4win supports both relevant cryptography standards, OpenPGP and S/MIME (X.509), and is the official GnuPG distribution for Windows. It is maintained by the developers of GnuPG.
GNU Privacy Guard for Windows Features :
Email : Signing and encrypting, User-friendly Certificate Selection
Security : OpenPGP & S/MIME, High algorithmic strength of GnuPG, SmartCard
Files and Folders : Signing and encrypting, Checksums
Certificate Management with Kleopatra : Manage certificates securely and comfortably, Certificate Server, Certify OpenPGP Certificates
5:14 PM | 0 comments | Read More

TrueCrypt Disk Encryption Software

TrueCrypt is free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X and Linux. In case an attacker forces you to reveal the password, TrueCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by TrueCrypt is real-time (on-the-fly), automatic, transparent, and does not involve temporary unencrypted files.
TrueCrypt is software for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.x  file names, folder names, contents of every file, free space, meta data, etc). 
TrueCrypt Disk Encryption Features:
Creates a virtual encrypted disk within a file and mounts it as a real disk.
Encrypts an entire partition or storage device such as USB flash drive or hard drive.
Encrypts a partition or drive where Windows is installed (pre-boot authentication).
Encryption is automatic, real-time (on-the-fly) and transparent.
Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
Encryption can be hardware-accelerated on modern processors.
Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system.
2:45 PM | 0 comments | Read More