Tag Archives: Pen Testing

Brute Force Username and Passwords with Ncrack – Security / Educational

Disclaimer: You must own or have permission to run Ncrack on any network or device.  This post is used for educational purposes. IT admin personnel can test different devices and their setups with ncrack.  If devices are set up in … Continue reading

Rate this:

Posted in Computer Security, Education, Free Software, Hacking, Information Technology, IoT, Technology | Tagged , , , , , | Leave a comment

BackBox – What is it and how do I update it?

BackBox is more than an operating system, it is a Free Open Source Community Project with the aim to promote the culture of security in IT environment and give its contribute to make it better and safer. BackBox Linux is … Continue reading

Rate this:

Posted in Computer Security, Computer Software, higher ed, higher education, Information Technology, Linux, Software, Technology | Tagged , , , | Leave a comment

Top Pen Testing ISOs 2017

What’s the top Pen Testing ISOs for 2017?  Here’s my ranking and download links. Kali Linux – https://www.kali.org/downloads/ Backbox – http://www.backbox.org/downloads Cyborg Hawk – http://sourceforge.net/projects/cyborghawk1/files/latest/download Parrot Sec – http://www.parrotsec.org/download/ Deft – http://www.deftlinux.net/download/ Live Hacking OS – http://www.livehacking.com/live-hacking-cd/d Samurai – http://sourceforge.net/projects/samurai/files/ Network Security Toolkit – http://sourceforge.net/projects/nst/ PenToo – http://www.pentoo.ch/download/ Knoppix … Continue reading

Rate this:

Posted in Computer Security, Computer Software, computer troubleshooting, Computers, Education, Free Software, Hacking, higher ed, higher education, Information Technology, Internet of Things, Linux, Mac, Networking, Software, Technology, Windows, Windows 10, Windows Security | Tagged , , , , , , , , , , , | Leave a comment

Go Hack Yourself – Dark Reading

“Penetration testing is only the first step of self-inspection— ask internal auditors to scrutinize IT practices beyond compliance to take risk management to the next level – Read More  

Rate this:

Posted in Apple, Business, Computers, Education, Hacking, Information Technology, Law, Linux, Mobile Computing, network, Networking, Windows | Tagged , , , | Leave a comment