"exploits" tag

Secure Your PHP Application

In the open source world, PHP programming is always given first preference due to its availability and flexibility. It is a powerful server side scripting language and provides a robust framework to create…

uhh, not the rootkits again

Chkrootkit — Eliminate the Enemy Within

Last month, we learnt about the technical components that form rootkits. We also discussed why and how rootkits are dangerous, and briefly explored a few detection options. This article continues on the same…

VNCInjection with courtesy shell enabled, by default

Metasploit 101 with Meterpreter Payload

The Metasploit framework is well known in the realm of exploit development. It is a standalone tool for security researchers, penetration testers and IDS/IPS developers. As of now, it has 640 exploit definitions…

Wi-Fi penetration testing

Aircrack-ng: Wi-Fi Troubleshooting, Auditing and Cracking Made Easy

Wi-Fi technology has today become almost ubiquitous for wireless local area networks at offices, restaurants, homes, airports, hotels, etc. However, with increased Wi-Fi usage and awareness, hackers (or, rather, crackers) are exploiting the…

The user interface of msfconsole

Metasploit: The Exploit Framework for Penetration Testers

Today, the Metasploit Framework is considered the single most useful auditing tool that is freely available to security professionals and penetration testers. It has a wide array of commercial-grade exploits, an extensive exploit-development…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.