Hello, In this small post, I will explain how to install and setup OpenVAS on a Kali Linux. First, be sure to have your system up to date.
# sudo apt-get update && sudo apt-get upgrade --yes
After that, you can install openVAS.
# sudo apt-get install openvas
Once done, just run the setup to perform an initial configuration
This step takes a lot of time […]
October 29th, 2015, Tor announce a Beta release of Tor Messenger, an new instant messaging client that anonymize your conversation. This new tool is based on InstantBird, a messaging client of Mozilla community. Tor Messenger is available for free download for Windows, OSX and Linux plateform. The main objective is to provide an higher level of […]
NTP (Network Time Protocol) is the widely used protocol used by computers to ensure that their internal clocks are accurate. Surprisingly, connections between computers and NTP servers are rarely encrypted, making it possible for hackers to perform man-in-the-middle attacks that reset clocks to times that are months or even years in the past. Recently, in a paper […]
Hi everybody. Today I will explain you how to use LUKS to encrypt a disk partition. LUKS stands for Linux Unified Key Setup that means that you can forget to mount as such LUKS partition on a Windows operating system. LUKS uses cryptsetup user-space tool to configure dmcrypt, a kernel-space module that made all cryptography stuffs. Because LUKS is the standard for Linux […]
I write a little article about rp_filter because I recently had a problem that bothered me for several days. In principle, the main functionality of a router is to route packets from one interface to another one. Linux can be used as router that will route amount of traffic without any issues, if configured correctly. The […]
Hello, everybody ! Hacker’s world starts new year with a cool gift from an hacker named “Pr0x13″ with the tool iDict which permits to bruteforce iCloud account. This tool is available to download on GitHub. This tool uses an exploit a security flaw of Apple iCloud security infrastructure to bypass restrictions and two-factor authentication security that […]
Hi all ! In this new post I will explain how to generate secure random number on *nix system. In many case, often in cryptographic system, the application needs to have sources of random number. The lack of randomness can be hard to diagnose. For example, I’m sure you have heard of the Debian random […]
A newly discovered security issue in the widely used Linux software, Bash. Some cyber experts have said that this vulnerability may be a bigger threat than famous Heartbleed flaw surfaced in April 14. For those who don’t know, Bash is the software used to control the command prompt on many *nix computer. With this new […]
Speaking at the Black Hat cyber security conference, the analyst Ruben Santamarta of IOActive presented a paper showing that communications devices from Harris, Hughes, Cobham, Thuraya, JRC, and Iridium are all highly vulnerable to attack. Soldiers on the front lines use satellite communications systems, called SATCOMS to call in back up, lead their comrades away from […]
Today, an important news about the IT security is issued. A group of Russian hackers has seized about 1.2 billion internet passwords on U.S. and foreign companies around the world. Hackers have put their hands on user names and access codes of some 420,000 websites. This information comes from researchers at security company Security Hold. […]