Geekiest Techno News

A simple neat trick to find out someones GEO location by using its MAC address. Backtrack > Exploitation Tools > Wireless Exploitation Tools >WLAN Exploitation >fern-wifi-cracker Now open ToolBox . Now open the geolocatory Tracker. Select the Option Insert Mac Address and insert the Mac Address in the box . Now , after inserting Mac  [ Read More ]

How To Configure Snort on Backtrack 5

About Snort Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. HOW To Start SNORT ON BACKTRACK 5-rc3 Backtrack > Services > Snort Services > snort start SNORT STARTED How To  [ Read More ]

Saudi Arabia Banning Skype In Few Weeks

According to Reuters, Government of Saudi Arabia is in full mood to Ban one of the TWO most popular free Voice and Text apps, Skype and whatsapp. After Viber getting the axe, the kingdom is keen to control the communications of the expacts with the outside world. Says the article: “Conventional international calls and texts  [ Read More ]

Raspberry Pi + Onion = Onion Pi

Geek Girl (a rare thing ) from MIT (well that explains)  Limor “Ladyada” Fried has created a superb desert with the perfect Ingredients. She has added TOR (The Onion Router ) on Raspberry Pi. According to her “Using it is easy-as-pie. First, plug the Ethernet cable into any Internet provider in your home, work, hotel  [ Read More ]

How the Raspberry Pi USB Malware Scanner Works

This article by “Icarus Cyber Labs” Explains the technical working of their newly created USB Malware Scanner. The core aspect of the malware scanner is a python script that continuously polls for USB devices. The polling is done by continuously checking the output of the “blkid” command in Linux. This can also be accomplished by using the  [ Read More ]

OWASP Top 10 for 2013 is now officially released

According to the new OWASP TOP 10 XSS is still one of the top 3 Vulnerabilities found on websites. The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety  [ Read More ]

Advance Wifi Network Pentesting Notes

Advanced Wireless Network Pentesting Notes First of all make sure to randomize your MAC address and clean your ARP tables, Use an ALPA usb wirless adapter device or whatever 🙂 I- airdump-ng To Sniff The Traffic : All people whom they do pentesting know this part i will not say all how packets works and  [ Read More ]

Let me give you a lil bit of intro about Lahan which  ctrl + C and ctrl + v from its /dev’s website What is Lahana? Lahana is a set of scripts that will take a fresh Ubuntu EC2 Instance and turn it into a brassic, censorship busting beast of beauty. It does this by  [ Read More ]

Linkedin has decided to join the bandwagon of the likes to Google, FB, Dropbox, Twitter(recently) and many other top sites in the two step verification protocol. Though its implementation is in its simpler format like twitter, it would be best for a site with a growing global demand to advance its security . None the  [ Read More ]

MSIE 10 aka Microsoft Internet Explorer 10 has upgraded its security measures and beat out popular browsers such as Google chrome, Mozilla Firefox, Safari, & Opera. Post running several tests on the latest versions of the five top browsers, against 754 malware-infected URLs over a month; IE10 running windows hands down achieve a whopping 99.9% ahead  [ Read More ]