Monday, June 30, 2014

Linux Shell Scripting Cookbook, 2nd Edition

The shell remains one of the most powerful tools on a computer system - yet a large number of users are unaware of how much one can accomplish with it. Using a combination of simple commands, we will see how to solve complex problems in day to day computer usage.

Linux Shell Scripting Cookbook, 2nd Edition will take you through useful real-world recipes designed to make your daily life easy when working with the shell. The book shows the reader how to effectively use the shell to accomplish complex tasks with ease.

The book discusses basics of using the shell, general commands and proceeds to show the reader how to use them to perform complex tasks with ease.

Publisher: Packt Publishing
By: Shantanu Tushar, Sarath Lakshman
ISBN: 978-1-78216-274-2
Year: 2013
Pages: 384
Language: English
File size: 4 MB
File format: PDF


Read more »

Sunday, June 29, 2014

Kali Linux Cookbook

Over 70 recipes to help you master Kali Linux for effective penetration security testing

Recipes designed to educate you extensively on the penetration testing principles and Kali Linux tools
Learning to use Kali Linux tools, such as Metasploit, Wire Shark, and many more through in-depth and structured instructions
Teaching you in an easy-to-follow style, full of examples, illustrations, and tips that will suit experts and novices alike

In Detail:

In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to break into your system or network helps you plug the loopholes before it's too late and can save you countless hours and money. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution.

Discover a variety of popular tools of penetration testing, such as information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks.

Packed with practical recipes, this useful guide begins by covering the installation of Kali Linux and setting up a virtual environment to perform your tests. You will then learn how to eavesdrop and intercept traffic on wireless networks, bypass intrusion detection systems, and attack web applications, as well as checking for open ports, performing data forensics, and much more. The book follows the logical approach of a penetration test from start to finish with many screenshots and illustrations that help to explain each tool in detail. The Kali Linux Cookbook will serve as an excellent source of information for the security professional and novice alike!

What you will learn from this book
Install and setup Kali Linux on multiple platforms
Customize Kali Linux to your individual needs
Locate vulnerabilities with Nessus and OpenVAS
Exploit vulnerabilities you've found with Metasploit
Learn multiple solutions to escalate privileges on a compromised machine
Understand how to use Kali Linux in all phases of a penetration test
Crack WEP/WPA/WPA2 encryption
Simulate an actual penetration test using Kali Linux


A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.

Who this book is written for

This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.

Read more »

Saturday, June 28, 2014

Web Penetration Testing with Kali Linux

Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities.

Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications.

Publisher:Packt Publishing
By:Joseph Muniz, Aamir Lakhani
File size:21.2 MB
File format:PDF             

Read more »

Sunday, January 12, 2014

PHP 5.5.8 Officially Released

PHP, an HTML-embedded scripting language with syntax borrowed from C, Java, and Perl, with a couple of unique PHP-specific features thrown in, has been updated to version 5.5.8.

PHP 5.x includes a new OOP model based on the Zend Engine 2.0, a new extension for improved MySQL support, built-in native support for SQLite, and much more.

According to the changelog, the validation of class names has been added in the autoload process, invalid C code has been fixed in zend_strtod.c, and passing DOMDocumentFragment to DOMDocument::saveHTML() no longer produces invalid markup.

Also, an integer overflow in exif_read_data() has been fixed, freetype-config is now used for determining freetype2 dir(s), and the stack smashing protection no longer kills the PDO/ODBC queries.

You can check out the official changelog in the readme file incorporated in the source package for more details about this release. Download PHP 5.5.8 right now from Softpedia.
Read more »

Tuesday, January 7, 2014

Ubuntu Touch Can Now Be Installed from Mac OS X

A way to install Ubuntu Touch from Mac OS X has been revealed by Canonical, in an effort to reach out to more users.

It seems that there are a lot of people out there with Nexus 4 devices and Mac OS X operating systems, so something had to be done. Canonical published a comprehensive tutorial which should be more than sufficient.

“Ubuntu has long provided tools that made it easy to install the new Ubuntu phone images to your device, taking care of finding the right images and latest versions for you. While this worked great, it was only available to current users of the Ubuntu desktop. But now Ubuntu engineer Alex Chiang has provided a set of instructions for getting the same easy installation options on Mac OSX,” reads the announcement.

Currently, the installation of Ubuntu Touch on Ubuntu systems is pretty straightforward, but we’re waiting for our Mac OS X friends to join the party.
Read more »

Wednesday, December 25, 2013

Linux vs. Windows Explained with Robocop, Iron Man, and Justin Bieber Makes Perfect Sense

Linux versus Windows will continue to be an ongoing conflict, so it's easy to understand why users will try to resort to these funny comparisons when talking about the two working philosophies.

The funniest thing about this image is not that it parodies the Windows operating system by attributing the “fame” of Justin Bieber to the Windows platform. It's actually the fact that it remained true over the years, no matter the person that could have been used in the last image.

The Linux and Windows platforms will always be at war, at least over the ideas and concepts they are using, but it's nice to see that Linux users haven't lost their touch when it comes to mocking Microsoft’s products.

If you have any similar images, please share them in the comments below.

Read more »

Friday, December 20, 2013

Web Application Obfuscation

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.

Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assets
Evaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilities
Teaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more

Read more »