Android is now the most used operating system around the world , as you read this article more than million users just downloaded an android app , majority of app downloads come from google play store ( official store for android apps ) but users may go for external sources to get the paid apps free , which create a great dangerous cause these apps usually modified with embedded malware or adware scripts .
how hackers can get the source of an app ? how they can modified it and sign it ? in this article we will give all information you need to know about this subject .
Why should I be a Certified Ethical Hacker ?
Here you succes begins , its the first step to start your career in cyber security.
The Certified Ethical Hacker (CEH) is an intermediate-level credential offered by the International Council of Electronic Commerce Consultants (EC-Council). Also registerd to be one of the top 15 paying certfication on the world for many years .
In CEH you will learn possess skills and knowledge on hacking practices in areas such as footprinting and reconnaissance, scanning networks, enumeration, system hacking, Trojans, worms and viruses, sniffers, denial of service attacks, social engineering, session hijacking, hacking web servers, wireless networks and web applications, SQL injection, cryptography, penetration testing, evading IDS, firewalls and honeypots and more.
Where to be certified ?
SMT-center an Authorized Training Center , the award of best instrutor for 2015 -2012 was given fo Sami AbuTahoun the CEO of SMT-Center .
And you can attend the exam on SMT also.
it's start with a vision, take all the valuable machine data generated by technology and put it in a hands of everyone! so they can run, secure and audit IT better, so they can understand and responed to the behavior of customers, devices, services and users in real time, but this is a way too complicated, so here's the good news..
If you are an IT Manager then you know how much it's struggling to take responsibility for the entire IT infrastructure including: 1- flawless IT Operations 2- Network Security 3- prove IT Compliance, So what you need here is a visibility into what is going on in your environment, audit data about critical changes, access Management and privileged user activity. So how to make sure that you have all the data you need. A Lot of Administrators is the classic solution but they just can't provide you the right data at the right time, What you need at this point is an auditing tool.
Today I will show you how to own a windows operating system using a technique called browser explotition, to carry out this technique you need a pentration testing distro for example Kali with beef framework and metasploit.
First thing we need to fireup our linux distro and run beef framework plus we need to integrate metasploit with beef-xss framework to do so follow the following commands:
When you want to do a penetration test for a wifi network you need a password list that reflect the user habits , private information such as his name , family name , his child's name , his mobile number and combination with these info . as these info is private and not shared with other users you will not find them in pre-made password list from websites , you must make them with you own hand and this is very hard thing to do and not practical !
Kali is popular linux distribution for information security professional , it has many tools that help you accomplish your job .
if you tried the new release of this distribution ( kali sana 2.0 ) you may have noticed the system freeze ( high cpu usage sometimes ) that happen frequently which is bad thing for someone installed it as his main OS .
So you are using a VPN service or other anonymity services like tor , I2P, proxy servers etc. etc. But still your ISP could track your online activity pretty easily. How ? If your DNS quarries are leaking or VPN connection is not properly configured.
In this tutorial we are going test DNS leak and fix DNS leak problem. Before going further, lets talk about the basic things.
Hello there, today I will show you how to code a simple script to get the remote IP address of your victim.
This script will be coded in PHP " Hypertext Preprocessor ".
PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language. Originally created by Rasmus Lerdorf in 1994
SMT & SMT-CENTER, ou engineers use technology to setup IT and Training Environments using Linux KVM solution (Proxmox), optimize cluster solution to connect and manage 3 main servers, setup multi guests operating system,