Tag Archives: attack

[v1.1.3c] dSploit – Most popular penetration testing suite for Android

With the development of mobile devices and network, intelligent mobile phone has become a new paradise for hackers. Imagine, under this environment of everybody holds a smart phone nowadays, nothing is more active than the mobile phone viruses and the vulnerabilities' exploits of software and mobile network. Therefore, to understand and master some practical security tools seems necessary and meaningful.

Google Hacking for Penetration Testers Volume 1 & 2 HD PDF

Google Hacking for Penetration Testers Volume 1 & 2 HD PDF

First of all, about the author of this book "Johnny Long", he has begun to research using Google to test the potential safety hazards of websites and computers as early as in 1995. What he does has developed and formed today's Google Hacking Techniques - the Google Hacking Database (GHDB) set up by him has been hosted by Exploits-DB now.

Kali Linux Wireless Penetration Testing: Beginner’s Guide HD PDF, EPUB

Today, wireless network has got very extensive application because of its convenient use and structure, and will eventually cover every corner on the earth, I believe. But due to its broadcast form of data transmission in a wireless network environment, that will inevitably lead to security issues. Of course we can ensure data security by setting different encryption methods in a wireless router, but some loopholes of Wi-Fi network or the router itself can often make every trained hacker be able to crack/hack it.

[v5.9.359] Elcomsoft Wireless Security Auditor – One-stop wireless network passwords cracker

If someone says you want to use this kind of tool to verify the security of passwords or recover them, that would be a joke, I think. After all, a rule for secure enough password is very simple - Uppercase + Lowercase + Number+ Symbol (and > 8 characters), there is no need of any tool to validate it at all. The same for wireless network password, restoring it is meaningless - just reset the router to default, which is the most efficient way. So, obviously they are designed for passwords cracking only.