Browsing tag

Penetration

BlackArch v2019.09.01 – Penetration Testing Distribution

  BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 2336 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. ChangeLog: added more than 150 new tools added terminus font for all WMs (thanks to psf for i3-wm bugfixes) included […]

Bluebox-ng – Node.js VoIP Penetration Testing Framework

Features Auto VoIP/UC penetration test Report generation Performance RFC compliant SIP TLS and IPv6 support SIP over websockets (and WSS) support (RFC 7118) SHODAN, exploitsearch.net and Google Dorks SIP common security tools (scan, extension/password bruteforce, etc.) Authentication and extension brute-forcing through different types of SIP requests SIP Torture (RFC 4475) partial support SIP SQLi check […]

Kali Linux 1.1.0 Released! Download Now

The developers at Offensive Security are back with yet another great version of Debian-derived Linux distribution Kali Linux version 1.10.  Kali Linux 1.1.0 was released two days ago with additional features with a mix of unprecedented hardware support and rock solid stability. It runs of a 3.18 kernel, specially developed for wireless infection attacks. Here is a complete […]

Syrian Hackers Claim They’ve Compromised US Central Command

Syrian Hackers have stated that they have compromised the central command of the US. Syrian Hackers Claim They’ve Compromised US Central Command The hackers from Syrian Electronic Army, which are hardcore supporters of the President of Syria Bashar Al-Assad have claimed that they have penetrated into the networks and other systems of the central command […]

Secure Phone App Library Highly Vulnerable

People who are using a different telephone apps on their cell phones need to be cautious, as a researcher has indicated vulnerabilities related to ZRTPCCP which is a huge security library. For this reason they need to get their security systems upgraded. Mark Dowd who is a researcher at Azimuth security has gone on to […]