The best way to detect a RAM scraper is via regular traffic and critical file monitoring and log analysis, experts say. Following are eight tips for protecting against RAM scraping, gleaned from the Verizon report: * Strong firewall and antivirus presence and maintenance, logging, review. Keep the RAM scrapers (and other malware) out. * Regularly […]
Category Archives: Security
The report identifies and ranks by frequency the following top 15 types of attacks: 1. Keylogging and spyware: Malware specifically designed to covertly collect, monitor, and log the actions of a system user. 2. Backdoor or command/control: Tools that provide remote access to or control of infected systems, or both, and are designed to run […]
One of the most frustrating moments as a network administrator is when you desperately want to log on to a Cisco Kartook-R1-LAB and you try all possible passwords you have with no success. Fortunately there is a Cisco password recovery procedure for IOS Kartook-R1-LABs which you can follow and bypass password control in order to […]
nUbuntu is a collection of network and server security testing tools, piled on top of the existing Ubuntu system. While aimed to be mainly a security testing platform, nUbuntu also operates as a desktop environment for the advanced Linux user. Advantages : You can install in you HDD Using as like ubuntu Desktop Instal […]
Two developers have created “Detect and Eliminate Computer Assisted Forensics” (DECAF). The tool tries to stop Microsoft’s Computer Online Forensic Evidence Extractor (COFEE), which helps law enforcement officials grab data from password-protected or encrypted sources. In response to Microsoft’s Computer Online Forensic Evidence Extractor (COFEE), which helps law enforcement officials grab data from password-protected or […]
On Backtrack 4 Box i need to access through ssh also need to enable .so here you go how to enable SSH on BT-4 root@Kartook:~# sshd-generate Generating public/private rsa1 key pair. Your identification has been saved in /etc/ssh/ssh_host_key. Your public key has been saved in /etc/ssh/ssh_host_key.pub. The key fingerprint is: 34:ea:36:7f:12:c8:01:a7:ea:e0:fb:d5:cd:75:ee:a5 root@bt The key’s randomart […]
Today i tried to install some applications on Backtrack 4 .It was not conencted on to internet .i was just wondering then just i enable this command it was amazing working good also i can access the internet . After that i was ping G-dns ( Google DNS ) waallaa !! root@Kartook:~# ifconfig eth0 […]
If you think that when you logon to a system there’s only one active logon session, this utility will surprise you. It lists the currently active logon sessions and, if you specify the -p option, the processes running in each session. Download Result Below : C:Documents and SettingsAdministratorDesktop>logonsessions.exe Logonsesions v1.1 Copyright (C) 2004 Bryce Cogswell […]
Disabling User Account Control (UAC) in Windows 7 Warning! This document contains instructions for editing the registry. If you make any error while editing the registry, you can potentially cause Windows to fail or be unable to boot, requiring you to reinstall Windows. Edit the registry at your own risk. Always back up the registry […]