Coming Soon

Security Management Technology Center Develop Elearning, FAQ , New Center...


Android is now the most used operating system around the world , as you read this article more than million users just downloaded an android app , majority of app downloads come from google play store ( official store for android apps ) but users may go for external sources to get the paid apps free , which create a great dangerous cause these apps usually modified with embedded malware or adware scripts .

how hackers can get the source of an app ? how they can modified it and sign it ? in this article we will give all information you need to know about this subject .

CEHv9 banner 111

Why should I be a Certified Ethical Hacker ?

Here you succes begins , its the first step to start your career in cyber security.

The Certified Ethical Hacker (CEH) is an intermediate-level credential offered by the International Council of Electronic Commerce Consultants (EC-Council). Also registerd to be one of the top 15 paying certfication on the world for many years .

In CEH you will learn possess skills and knowledge on hacking practices in areas such as footprinting and reconnaissance, scanning networks, enumeration, system hacking, Trojans, worms and viruses, sniffers, denial of service attacks, social engineering, session hijacking, hacking web servers, wireless networks and web applications, SQL injection, cryptography, penetration testing, evading IDS, firewalls and honeypots and more.

Where to be certified ?

SMT-center an Authorized Training Center , the award of best instrutor for 2015 -2012 was given fo Sami AbuTahoun the CEO of SMT-Center .

And you can attend the exam on SMT also.


Click here for more information of CEHv9 outline and next coming courses.

 it's start with a vision, take all the valuable machine data generated by technology and put it in a hands of everyone! so they can run, secure and audit IT better, so they can understand and responed to the behavior of customers, devices, services and users in real time, but this is a way too complicated, so here's the good news..

If you are an IT Manager then you know how much it's struggling to take responsibility for the entire IT infrastructure including: 1- flawless IT Operations 2- Network Security 3- prove IT Compliance, So what you need here is a visibility into what is going on in your environment, audit data about critical changes, access Management and privileged user activity. So how to make sure that you have all the data you need. A Lot of Administrators is the classic solution but they just can't provide you the right data at the right time, What you need at this point is an auditing tool.


Today I will show you how to own a windows operating system using a technique called browser explotition, to carry out this technique you need a pentration testing distro for example Kali with beef framework and metasploit.

First thing we need to fireup our linux distro and run beef framework plus we need to integrate metasploit with beef-xss framework to do so follow the following commands:

When you want to do a penetration test for a wifi network you need a password list that reflect the user habits , private information such as his name , family name , his child's name , his mobile number and combination with these info . as these info is private and not shared with other users you will not find them in pre-made password list from websites , you must make them with you own hand and this is very hard thing to do and not practical !

Kali is popular linux distribution for information security professional , it has many tools that help you accomplish your job .

if you tried the new release of this distribution ( kali sana 2.0 ) you may have noticed the system freeze ( high cpu usage sometimes ) that happen frequently which is bad thing for someone installed it as his main OS .

dns leak2

Are you crazy about protecting your online privacy ? Or leaving with a censored internet ? Or want to download some copyrighted material over torrent without informing your ISP ?

So you are using a VPN service or other anonymity services like tor , I2P, proxy servers etc. etc.  But still your ISP could track your online activity pretty easily. How ? If your DNS quarries are leaking or VPN connection is not properly configured.

In this tutorial we are going test DNS leak and fix DNS leak problem. Before going further, lets talk about the basic things.



Cybercrimes and attacks increase day by day , and you might be a victim 

Here is the most important signs that  helps to detect attacks ..

php mvc framework wide

Hello there, today I will show you how to code a simple script to get the remote IP address of your victim.

This script will be coded in PHP " Hypertext Preprocessor ".

PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language. Originally created by Rasmus Lerdorf in 1994

smt training Environment

SMT & SMT-CENTER, ou engineers use technology to setup IT and Training Environments using Linux KVM solution (Proxmox), optimize cluster solution to connect and manage 3 main servers, setup multi guests operating system,

** Disclaimer **

Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

This site contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this site, then GO OUT OF HERE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions. Neither the creator is responsible for the comments posted on this website.


Subscribe to our newsletter and stay updated on the latest news and special offers!
Please wait