SMT

Resource

Center

 

Coming Soon

Security Management Technology Center Develop Elearning, FAQ , New Center...

SMT BLOG

It's a method of persuading people to reveal sensitive information in order to perform malicious action. With the help of social engineering tricks, attackers can obtain confidential information, authorization details, and access details of people by deceiving and manipulating them.

Attackers can easily breach the security of an organization using social engineering tricks.

Android applications is now the best way for companies to deliver their services cause almost all the people in the world are using mobile applications and the most is using android OS cause it come on mobiles with affordable price . in this article we will prepare an android penetration lab so we can try to penetrate an app to see if it can hold against hackers which they may target a banking applications to steal customer credential or using the app to reveal high confidential info about the bank .

 

There are many factors that make companies vulnerable to attacks. A few factors are mentioned as follows:

Android applications is now the best way for companies to deliver their services cause almost all the people in the world are using mobile applications and the most is using android OS cause it come on mobiles with affordable price . in this article we will prepare an android penetration lab so we can try to penetrate an app to see if it can hold against hackers which they may target a banking applications to steal customer credential or using the app to reveal high confidential info about the bank .

chatting softwares always use the application layer to send and recieve messages that include using tcp or udp protocols for deleviery , today we will explain how to send messages using Ping ( ICMP protocol ) which is layer 3 protocol using Scapy .

 

What are the deferences between the penetration test and the vulnerability assessment ?

we have to know that there's a different types/categories of security assessments to assess the level of the security on any network resources in the organization, security assessment divided into three categories:

Today I will show you how to install conky on your linux desktop enviroment.

Conky unix program screen shot

So what is conky ?

is a free software system monitor for the X Window System. It is available for Linux, FreeBSD, and OpenBSD. Conky is highly configurable and is able to monitor many system variables including the status of the CPU, memory, swap space, disk storage, temperatures, , network interfaces, battery power, system messages, e-mail inboxes, Arch Linux updates, many popular music players (MPD, XMMS2, BMPx, Audacious, etc.), weather updates, breaking news, and much more. Unlike system monitors that use high-level widget toolkits to render their information, Conky is drawn directly in an X window. This allows it to consume relatively fewer system resources when configured similarly.

facebook logo

Today I will show you how to create a phishing page for facebook

What is a Phishing ?

Is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a

As a Security Professional you need the power to penetrate into any machine but antivirus softwares always get in your way , in this article we will explain in detail how to obfuscate and embed your malware into a antivirus Software to hide it from antivirus softwares.

Today I wil teach you how to hack into a websites database using sqlmap and dump the data.

So what is sqlmap?

Even if you are not a Linux fan or you have never heared about it, lets imagine how the world might be without Linux ..

Here is some of it's great applications that we will never met them if there is no Linux

** Disclaimer **

Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

This site contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this site, then GO OUT OF HERE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions. Neither the creator is responsible for the comments posted on this website.

Newsletter

Subscribe to our newsletter and stay updated on the latest news and special offers!
Please wait