Hello, In this small post, I will explain how to install and setup OpenVAS on a Kali Linux. First, be sure to have your system up to date.
# sudo apt-get update && sudo apt-get upgrade --yes
After that, you can install openVAS.
# sudo apt-get install openvas
Once done, just run the setup to perform an initial configuration
This step… Continue reading
NTP (Network Time Protocol) is the widely used protocol used by computers to ensure that their internal clocks are accurate. Surprisingly, connections between computers and NTP servers are rarely encrypted, making it possible for hackers to perform man-in-the-middle attacks that reset clocks to times that are months or even years in… Continue reading
Hello, everybody ! Hacker’s world starts new year with a cool gift from an hacker named “Pr0x13″ with the tool iDict which permits to bruteforce iCloud account. This tool is available to download on GitHub. This tool uses an exploit a security flaw of Apple iCloud security infrastructure to bypass restrictions… Continue reading
Hello ! In this new post, I will explain how to retrieve current pattern of an Android device. For you information, this problem has been proposed on a web-based CTF (Capture the Flag) in a computer security competition. I always tried on a rooted device but if someone can try… Continue reading
A newly discovered security issue in the widely used Linux software, Bash. Some cyber experts have said that this vulnerability may be a bigger threat than famous Heartbleed flaw surfaced in April 14. For those who don’t know, Bash is the software used to control the command prompt on many… Continue reading