Rig Exploit Kit Used in Recent Website Compromise
Reviewed by 0x000216
on
Wednesday, July 02, 2014
Rating: 5
What?s trending at ISTE 2014?
Technology’s influence on education is growing by the day. And nowhere was that more apparent than at ISTE 2014. The three-day conference, held at the Mobile World Congress Center in Atlanta, GA, serves to provide attendees with a place to learn and interact with other peers and vendors in the education technology industry. More than […]]> http://bit.ly/1qka2JI 0 VMware partners to resell AirWatch Enterprise Mobility Management platform http://bit.ly/1mJ4nXO http://bit.ly/1mJ4nXP Tue, 01 Jul 2014 15:01:48 +0000
Lanier Norville
via VMware Blogs http://bit.ly/1qka2JQ
Lanier Norville
via VMware Blogs http://bit.ly/1qka2JQ
What?s trending at ISTE 2014?
Reviewed by 0x000216
on
Wednesday, July 02, 2014
Rating: 5
Encryption - Crypters ebook
The crypter Handbook
This ebook can be read directly via your browser.
If you have difficulty reading the book, go to this page to get a full screen view or download the ebook for offline reading. https://docs.google.com/file/d/0B5UZaaEGmAw7SkEydGE1UTlPTUk/
See the last few pages of the book for licensing and bibliography. (info about original author and his website)
Encryption - Crypters ebook
Reviewed by 0x000216
on
Wednesday, July 02, 2014
Rating: 5
What?s trending at ISTE 2014?
Technology’s influence on education is growing by the day. And nowhere was that more apparent than at ISTE 2014. The three-day conference, held at the Mobile World Congress Center in Atlanta, GA, serves to provide attendees with a place to learn and interact with other peers and vendors in the education technology industry. More than […]]> http://bit.ly/1qka2JI 0 VMware partners to resell AirWatch Enterprise Mobility Management platform http://bit.ly/1mJ4nXO http://bit.ly/1mJ4nXP Tue, 01 Jul 2014 15:01:48 +0000
What?s trending at ISTE 2014?
Reviewed by 0x000216
on
Wednesday, July 02, 2014
Rating: 5
Use Harvester For Information Gathering And Penetration Testing
Use Harvester For Information Gathering And Penetration Testing. The Harvester is a tool for information gathering of e-mail accounts, sub domain names, virtual hosts, open ports/ banners, and employee names from different public sources (search engines, PGP key servers).
Is a really simple tool, but very effective for the early stages of a penetration test or just to know the visibility of your company in the Internet.
Important Addons built inside:
-> PGP: pgp key server - www.rediris.es/keyserver/
-> Linkedin: google search engine, specific search for Linkedin users
-> Shodan: Shodan Computer search engine, will search for ports and banner of the discovered hosts (http://www.shodanhq.com/).
SHODAN is a search engine that lets you find specific computers (routers, servers, etc.) using a variety of filters. Some have also described it as a public port scan directory or a search engine of banners.
-> vhost: Bing virtual hosts search
New Features:
> Time delays between request
> All sources search
> Virtual host verifies
> Active enumeration (DNS enumeration, Reverse lookups, TLD expansion)
> Integration with SHODAN computer database, to get the open ports and banners
> Save to XML and HTML
> Basic graph with stats
Use Harvester For Information Gathering And Penetration Testing
Reviewed by 0x000216
on
Wednesday, July 02, 2014
Rating: 5
AP will use robots to write some business stories
Reviewed by 0x000216
on
Wednesday, July 02, 2014
Rating: 5
BugJuggler: plans for a 21 m tall robot that juggles cars
Reviewed by 0x000216
on
Wednesday, July 02, 2014
Rating: 5
Discover a startup every time you open a new tab
Reviewed by 0x000216
on
Wednesday, July 02, 2014
Rating: 5