Radical Development

Technical Without the Technicalities

20 Introductory Nmap Command Examples for the Technology Professional

| 0 comments

I’m not going to attempt to cover what Nmap is and what it can do. Rather the author states: Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of … Continue reading

Hacking 103: Attacking Servers And Services With Hydra

| 0 comments

Now that I have covered Hacking 101: Footprinting Using Nothing But A Web Browser and Hacking 102: Active Footprinting With Nmap it is time to move into a physical attack upon the servers and servers that we have found in the course of investigation. There are a number of tools available in Kali Linux which include Medusa and Ncrack, but for the purposes of this article will will be using Hydra which is a very fast network logon cracker which support many different services. In this article we will take a look at the following attacks which are FTP and … Continue reading

Hacking 102: Active Footprinting With Nmap

| 0 comments

This article is a followup of Hacking 101: Footprinting Using Nothing But A Web Browser which served as an introduction to passive footprinting. There are a number of tools that you can use both on a Windows and Linux platform and I prefer to use the Backtrack Linux distro for penetration testers, more specifically I will be using Kali Linux. If Linux is not your cup of tea then you can give the following tools a look and pick and choose what you need. Wireshark which open source multi-platform network protocol analyzer. It allows you to examine data from a … Continue reading

Ways To Protect Your Identity On The Internet

| 0 comments

At the time of this article I have an IP Address of 89.239.207.81 and I would ask you if you have any idea where my Internet Service Provider (ISP) resides? I live in the United States and at this moment my Internet connection is coming from Denmark. As demonstrated from the Google Map, I am clearly sitting  in Havdrup, Denmark however this is not true, well at least physically. My internet connection resides in Denmark why my physical location is within the United States. Here is the detailed information: IP Address: 89.239.207.81* City: Havdrup State: 20 Country: Denmark Latitude: 55.5333 … Continue reading

Website Mirroring Using GNU Wget

| 0 comments

GNU Wget is a free software package for retrieving files using HTTP, HTTPS, and FTP – the most widely-used Internet protocols. It is a non-interactive command-line tool, so it may easily be called from scripts, cron jobs, terminals without X-Windows support, etc. Why would you want to use this application? The fact is the black hats often use this to mirror a given site in order to review the content for anything that may be of value. This concept falls into the area of information gathering. So you may be asking your what possibly could be of value that a … Continue reading

Open Source and Commericial Security Tools

| 0 comments

Whether you’re a network administrator, security professional, or an end user, it’s important that you keep your system clean and secure. There are a variety of high quality open source security tools available. Toolkits Network Security Toolkit: This bootable ISO live CD/DVD (NST Live) is based on Fedora. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in … Continue reading

Data Recovery The Easy Way With TestDisk

| 0 comments

There are many solutions on the market that are free, open source, and commercial. While many may argue that commericial solutions provide both ease of use and work well, I present to you that open source solutions are often a better solution. This being said, I wanted to share my experiences with TestDisk from CGSecurity, which is primarily designed to help recover lost partitions and/or make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting a Partition Table). Partition table recovery using TestDisk is really easy … Continue reading