Archive | Linux Hacking


19 February 2008 | 124,784 views

Russix – LiveCD Linux Distro for Wireless Penetration Testing & WEP Cracking

It looks like it might be time to update our very well received list of the 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) since we have Russix now and Backtrack new version is on the way out. Russix is a Slax based Wireless Live Linux. It has been designed to be light [...]

Continue Reading


29 January 2008 | 45,667 views

Metasploit Framework v3.1 Released for Download

Ah Metasploit development cycle seems to be picking up, I guess with greater community support the bugs get ironed out and the new features introduced faster. Good to see an update so soon after Metasploit Framework v3.0 was released. I keep closely up to date with Metasploit as it’s pretty much the best free tool [...]

Continue Reading


22 January 2008 | 89,532 views

BackTrack Live Hacking CD BETA 3 Released

The guys at BackTrack e-mailed me to let me know their Version 3 BETA has been released recently, and perhaps our readers would like to know about it. For those that don’t know BackTrack evolved from the merging of two wide spread security related distributions – Whax and Auditor Security Collection. By joining forces and [...]

Continue Reading


03 December 2007 | 4,587 views

WabiSabiLabi Pimping ClamAV Vulnerability & Exploit

Interesting, a new arena for marketing spin and sales talk – the auctioning of exploits. WabiSabiLabi is pushing hard for a good price for a ClamAV vulnerability and exploit that it has gotten hold of, it’s dosing it up with a good portion of spin to make it seem like the next big thing – [...]

Continue Reading


26 September 2007 | 21,717 views

Gentoo Pulls the Plug after Getting Pwned

Gentoo Pulls the Plug after Getting Pwned Gentoo pulled quite a few of it’s servers recently following the discovery of a fairly severe flaw in it’s systems. Just to show that Linux systems aren’t invulnerable and immune to all security issues. Ubuntu suffered quite heavily recently too, so don’t assume just because you use Linux [...]

Continue Reading


24 July 2007 | 14,581 views

Some Guidelines on How to Secure your Ubuntu Installation

Since Ubuntu is getting so fantastically popular nowadays I thought this might be useful to some of you. I personally think Ubuntu is great, the features, ease of installation, stability and especially the work they have done on things like wireless drivers make it a breeze to get up and running. It is a pretty [...]

Continue Reading


26 June 2007 | 11,619 views

The Kcpentrix Project – Penetration Testing Toolkit LiveDVD

The Kcpentrix Project was founded in May 2005 , KCPentrix 1.0 was liveCD designed to be a standalone Penetration testing toolkit for pentesters, security analysts and System administrators What’s New in KcPentrix 2.0 Now release 2.0 is a liveDVD, It features a lot of new or up to date tools for auditing and testing a [...]

Continue Reading


18 June 2007 | 24,332 views

Trinity Rescue Kit – Free Recovery and Repair for Windows

Trinity Rescue Kit or TRK is a free live Linux distribution that aims specifically at recovery and repair operations on Windows machines, but is equally usable for Linux recovery issues. It is possible to boot TRK in three different ways: As a bootable CD which you can burn yourself from a downloadable isofile From a [...]

Continue Reading


08 June 2007 | 9,828 views

stealth techniques – syn

Or half-open scanning technique is the first of three to come series about stealth scanning… The other two are Xmas/Fin/Null and idle/zombie scan techniques… Intro This is a series of three to come articles about stealth scanning, everything that I am going to present is hping oriented so if you want to learn this techniques [...]

Continue Reading


01 June 2007 | 18,971 views

Sguil – Intuitive GUI for Network Security Monitoring with Snort

Sguil (pronounced sgweel) is probably best described as an aggregation system for network security monitoring tools. It ties your IDS alerts into a database of TCP/IP sessions, full content packet logs and other information. When you’ve identified an alert that needs more investigation, the sguil client provides you with seamless access to the data you [...]

Continue Reading