Dotexe

48 Flips | 1 Magazine | 4 Followers | @Dotexe2015 | Keep up with Dotexe on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Dotexe”

Cobalt Strike Penetration Testing Labs (Download)

My primary conference give away is a DVD with a self-contained penetration testing lab. This DVD covers the Metasploit Framework‘s capability to …

Cobalt

How many PlayStation 2s would make a Galaxy S6?

A fun new visualization compares old tech with new and finds that computing power has increased a trillionfold since 1956.<p>Did you know that two Nintendo Entertainment Systems combined have the same computing power as the Apollo Guidance Computer that sent men to the moon? Or that the Samsung Galaxy …

Apple Watch

Court keeps cellphone network ‘kill switch’ a secret

It only took one sentence for the United States Court of Appeals to keep the federal government’s emergency plan to disable cellular service a secret. It was a very long sentence, but it got the job done.<p>This ruling reinforces the Department of Homeland Security’s attempts to block Freedom of …

U.S. Dept. of Homeland Security

The Top Five Hacker Tools of 2015

Almost every profession and job requires that you understand how to use industry-specific tools, often referred to as ‘tools of the trade’, and this …

Forensics

Scripting Metasploit for a Real-Life Pentest

During a recent internal penetration test, we got to the point where we had to search a lot of Windows machines for Domain Admin tokens. Of course, …

BlackArch Linux Offers Wealth of Security Research Tools

1 of 14<p>by Sean Michael Kerner<p>2 of 14<p>BlackArch Has Sever Desktop Choices<p>Users can choose from multiple Linux desktops for BlackArch, with Fluxbox …

Information Security

Some of the Best Things in Security Are Free

Software tools are available from our consultants free of charge.<p>When our Foundstone consultants are working at customer sites, they sometimes …

Information Security

SPARTA v1.0.2 Beta Network Infrastructure Pen Test Tool Released

SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and …

Forensics

Booting Kali Linux Live over HTTP

Here at Offensive Security, we tend to use Kali Linux in unconventional ways – often making use of some really amazing features that Kali Linux has …

Linux

Online Cyber Security Training, Free, Forever

Navigating a Security Wasteland: Vulnerability Management Vol. 2 is a comprehensive paper featuring thoughts from Amit Yoran, Chairman and Chief …

ZMap: Open-Source Network Scanner

Ethical Hacking<p>11:00 PM EH Tools, Nmap, Open Source<p>Network scanning is the most important part of the information gathering process that a hacker …

Maligno v2.0 - Metasploit Payload Server

Maligno is an open source penetration testing tool written in Python that serves Metasploit payloads. It generates shellcode with msfvenom and …

iP-Box iPhone Password Unlock Tool

<b>IP-BOX iPhone Password Unlock Tool</b><p>(New Version 2 is now Cased and Updateable)<p>Use the IP-BOX to crack the forgotten password on iPhone<p>Simply attach …

Rooted Android SSH Tunneling and Arduino Cylons! Hak5 1724

Hak5 - Building a high performance home router

Identifying Open Ports in Wireshark, HakTip 137

Nexpose Configuration in Kali Linux Tutorial

Nexposeis the only vulnerability management solution to analyze vulnerabilities, controls, and configurations to find the who, what, and where of IT …

Linux

Uber Waits Months To Admit Data Breach, 50,000 Drivers Exposed

With more and more of our information online, it seems that data breaches are becoming more and more common. There is almost a standard protocol, …

Identity Theft

Open Source Privacy Tools that Keeps you Safe from NSA

After the Gemalto security breach it is clear that Spy agencies like NSA use their Hackers to gain access to servers. Snowden documents showed that …

Privacy

Lenovo installs adware on its computers that could let hackers steal private data

A vulnerability has been discovered in a piece of software that ships pre-loaded onto Lenovo computers that could grant hackers access to a user's secure browser data, allowing third parties to potentially collect passwords, bank details, and other sensitive information.<p>Superfish, an adware program …

Cybersecurity

Automate Security Audit

Netool is a toolkit written in bash, python and ruby and provides easy automation for frameworks like Nmap, Driftnet, Sslstrip, Metasploit and …

Forensics

It's now possible to map your home's WiFi signal in 3D

We already know that it's possible to map your home's WiFi signal in 2D, but that doesn't help if you're holding your phone above your head to get connected. Step forward YouTuber CNLohr, who appears to have developed a reasonably low-tech way to analyze the WiFi strength of any 3D space. Using …

Unpacking Ashton Kutcher's philosophies on technology and innovation

Unpacking Ashton Kutcher’s philosophies on technology and innovation<p>Over the past decade, Ashton Kutcher has demonstrated his versatility as an …

Startups (Australia)

How to Pitch Your Business to Customers, Investors or Anyone Else

Credit: EDHAR/Shutterstock<p>A great elevator pitch — the 30-second speech that tells someone about your business in a nutshell — is one of the most …

York University

The world's first drone circus is coming to Amsterdam

An airshow consisting entirely of drones will make its world premiere at the Amsterdam Arena sometime in the near future.<p>With a spectacular trailer that looks like something straight out of Final Fantasy, an air show using nothing but drones fitted with the equipage for a spectacular dance of light …

Air Shows

Control a Remote Phone via Webserver - Android Security

An app that can record phones, sms, track location changes, silently take pictures etc. and watch all the fun beeing uploaded to a webconsole from …

Web Servers

Six Essential (Free) Tools For Security Teams

Information security is a big topic with a lot of disciplines, and hardly anyone is an expert in all of them. The good news is that there are some …