metasploit

“Metasploit Complete” series Part 2

Welcome back guyzzz to the second part of metasploit tutorial series. Today we are gonna drive deep inside “Information Gathering” part of metasploit and more…. Information Gathering Nmap Nmap uses raw IP packets to determine if host is up or down, if he uses a firewall or not, which ports are open, what services are running on the remote system …

Top Hack – Tech Movie / Documentarie of all time

Here’s a list of Top Tech movies / documentaries (in no particular order) that I’m sure all computer engineers / Hackers  who love their jobs will love. 1.TBP AFK – The Pirate Bay Away from Keyboard https://www.youtube.com/watch?feature=player_embedded&v=eTOKXCEwo_8 2. Anonymous We are Legion: The Story of the Hacktivists https://www.youtube.com/watch?feature=player_embedded&v=3SsLGPaYjvM 3. The Internet’s Own Boy: The Story of Aaron Swartz https://www.youtube.com/watch?feature=player_embedded&v=9vz06QO3UkQ 4. …

IT Security Project Kolkata

Good News! We have launched 1 week IT Security Project Kolkata. Choose any of the given topics and do an one week intensive project on your desired topic . On IT Security Operating System Hardening Networks & Basic Network Offensive Attacks Malware Detection & Prevention Penetration Testing with Search Engines Clouds & Its Security Steganography Overview of Computer Forensics Basic …