Saturday, July 6, 2013

REMOTE SHELL - Penetration Testing



Introduction: SSH secure shell is used to establish a remote connection to a Linux box where SSH service is running. SSH runs on port 22 and applications like Open SSH v2.0 provide SSH utilities.  SSH can protect a network from attacks like IP spoofing, IP source routing etc,. However, we will study some vulnerabilities associated with SSH and provide necessary counter measures.

Monday, July 1, 2013

MITM ATTACK - Configuration To Exploitation

DO YOU KNOW WHAT IS THE ADVANCE WEB ATTACK NOW A DAYS?
Can I ask you something?
Is there anyone who refuses to accept that you have used or you are using a public WI-FI for internet access in your mobile, laptop or an IPAD. I am sure, no one will refuse to accept this. Let me ask you another question.
Do you know your ID and Password are open to all ? Do you know anyone can see your ID password?

Yes, this is true, you might not aware of this but it is fact. When we use public or open Wi-Fi and we login into our Facebook, Twitter or email account, our credentials can be hijacked by an attacker via MITM attack which stands for Man-in-the-Middle attack.

How I fixed Metasploit Database Connectivity Problem

While working on windows exploit last night when I tried to run metasploit it was not able to connect with the database. But metasploit was running fine. When I searching for particular exploit, it wasn't able to give me the result and was giving me below error.