Пропускане към основното съдържание

Публикации

Показват се публикации от Декември, 2015

Nikto web application security scanner

Nikto is sponsored by Netsparker, a false positive free web application security scanner.

sqlmap® Automatic SQL injection and database takeover tool

Social-Engineer Toolkit - TrustedSec

Common Vulnerabilities and Exposures

Using Perl 6 "Christmas present"

Perl for System Administration & Automation System Administration with Perl

NOTE!

List of TCP and UDP port numbers

This is a list of Internet socket port numbers used by protocols of the transport layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) in the ARPANET for which two ports were required for half-duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full-duplex, bidirectional traffic. The even-numbered ports were not used, and this resulted in some even numbers in the well-known port number range being unassigned. The Stream Control Transmission Protocol (SCTP) and the Datagram Congestion Control Protocol (DCCP) also use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses. However, many unoff

GMANE

Offensive Security Exploit Database

Kali Linux 2.0 Released

Still TL; Still DR. How Do I Upgrade to Kali 2.0? Yes, you can upgrade Kali 1.x to Kali 2.0! To do this, you will need to edit your source.list entries, and run a dist-upgrade as shown below. If you have been using incorrect or extraneous Kali repositories or otherwise manually installed or overwritten Kali packages outside of apt, your upgrade to Kali 2.0 may fail. This includes scripts like lazykali.sh, PTF, manual git clones in incorrect directories, etc. – All of these will clobber existing files on the filesystem and result in a failed upgrade. If this is the case for you, you’re better off reinstalling your OS from scratch. Otherwise, feel free to: 1: cat << EOF > /etc/apt/sources.list 2: deb http://http.kali.org/kali sana main non-free contrib 3: deb http://security.kali.org/kali-security/ sana/updates main contrib non-free 4: EOF 5: apt-get update 6: apt-get dist-upgrade # get a coffee, or 10. 7: reboot

SSH: More than secure shell