Coming Soon

Security Management Technology Center Develop Elearning, FAQ , New Center...


chatting softwares always use the application layer to send and recieve messages that include using tcp or udp protocols for deleviery , today we will explain how to send messages using Ping ( ICMP protocol ) which is layer 3 protocol using Scapy .


What are the deferences between the penetration test and the vulnerability assessment ?

we have to know that there's a different types/categories of security assessments to assess the level of the security on any network resources in the organization, security assessment divided into three categories:

Today I will show you how to install conky on your linux desktop enviroment.

Conky unix program screen shot

So what is conky ?

is a free software system monitor for the X Window System. It is available for Linux, FreeBSD, and OpenBSD. Conky is highly configurable and is able to monitor many system variables including the status of the CPU, memory, swap space, disk storage, temperatures, , network interfaces, battery power, system messages, e-mail inboxes, Arch Linux updates, many popular music players (MPD, XMMS2, BMPx, Audacious, etc.), weather updates, breaking news, and much more. Unlike system monitors that use high-level widget toolkits to render their information, Conky is drawn directly in an X window. This allows it to consume relatively fewer system resources when configured similarly.

facebook logo

Today I will show you how to create a phishing page for facebook

What is a Phishing ?

Is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a

As a Security Professional you need the power to penetrate into any machine but antivirus softwares always get in your way , in this article we will explain in detail how to obfuscate and embed your malware into a antivirus Software to hide it from antivirus softwares.

Today I wil teach you how to hack into a websites database using sqlmap and dump the data.

So what is sqlmap?

Even if you are not a Linux fan or you have never heared about it, lets imagine how the world might be without Linux ..

Here is some of it's great applications that we will never met them if there is no Linux

Android is now the most used operating system around the world , as you read this article more than million users just downloaded an android app , majority of app downloads come from google play store ( official store for android apps ) but users may go for external sources to get the paid apps free , which create a great dangerous cause these apps usually modified with embedded malware or adware scripts .

how hackers can get the source of an app ? how they can modified it and sign it ? in this article we will give all information you need to know about this subject .

CEHv9 banner 111

Why should I be a Certified Ethical Hacker ?

Here you succes begins , its the first step to start your career in cyber security.

The Certified Ethical Hacker (CEH) is an intermediate-level credential offered by the International Council of Electronic Commerce Consultants (EC-Council). Also registerd to be one of the top 15 paying certfication on the world for many years .

In CEH you will learn possess skills and knowledge on hacking practices in areas such as footprinting and reconnaissance, scanning networks, enumeration, system hacking, Trojans, worms and viruses, sniffers, denial of service attacks, social engineering, session hijacking, hacking web servers, wireless networks and web applications, SQL injection, cryptography, penetration testing, evading IDS, firewalls and honeypots and more.

Where to be certified ?

SMT-center an Authorized Training Center , the award of best instrutor for 2015 -2012 was given fo Sami AbuTahoun the CEO of SMT-Center .

And you can attend the exam on SMT also.


Click here for more information of CEHv9 outline and next coming courses.

 it's start with a vision, take all the valuable machine data generated by technology and put it in a hands of everyone! so they can run, secure and audit IT better, so they can understand and responed to the behavior of customers, devices, services and users in real time, but this is a way too complicated, so here's the good news..

If you are an IT Manager then you know how much it's struggling to take responsibility for the entire IT infrastructure including: 1- flawless IT Operations 2- Network Security 3- prove IT Compliance, So what you need here is a visibility into what is going on in your environment, audit data about critical changes, access Management and privileged user activity. So how to make sure that you have all the data you need. A Lot of Administrators is the classic solution but they just can't provide you the right data at the right time, What you need at this point is an auditing tool.


** Disclaimer **

Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

This site contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this site, then GO OUT OF HERE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions. Neither the creator is responsible for the comments posted on this website.


Subscribe to our newsletter and stay updated on the latest news and special offers!
Please wait