1785 shaares
80 results
tagged
security
a lire
We are the Parrot Project
Parrot is a worldwide community of developers and security specialists that work together to build a shared framework of tools to make their job easier, standardized and more reliable and secure.
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes a full portable laboratory for all kinds of cyber security operations, from pentesting to digital forensics and reverse engineering, but it also includes everything needed to develop your own software or keep your data secure.
Parrot is a worldwide community of developers and security specialists that work together to build a shared framework of tools to make their job easier, standardized and more reliable and secure.
Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes a full portable laboratory for all kinds of cyber security operations, from pentesting to digital forensics and reverse engineering, but it also includes everything needed to develop your own software or keep your data secure.
tuto securite wordpress
Parrot security has announced the release of Parrot Security OS 4.10, which makes the distribution more reliable and more secure.
The Parrot Security Operating System is a Penetration Testing & Forensics Distro dedicated to Ethical Hackers & Cyber Security Professionals. It was initially released in June 2013, developed by FrozenBox.
The Parrot Security Operating System is a Penetration Testing & Forensics Distro dedicated to Ethical Hackers & Cyber Security Professionals. It was initially released in June 2013, developed by FrozenBox.
When you visit a website, online trackers and the site itself may be able to identify you – even if you’ve installed software to protect yourself. It’s possible to configure your browser to thwart tracking, but many people don’t know how.
Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.
Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.
a lire
In a penetration test, ethical hackers imitate what real attackers would do. This term is often shortened to "pentest," while the hackers in question are called "pentesters." During a pentest, these pros search for vulnerabilities in the systems of a specific company and attempt to bypass security as part of an attack.
Les statistiques sont parfois plus éloquentes que des mots, notamment en matière de cybersécurité. La société Positive Technologie a mené une étude originale sur ses projets de pentest pour des entreprises et en a tiré quelques enseignements. Le plus frappant est la facilité avec laquelle les pentesteurs peuvent entrer dans le réseau local de l’entreprise ciblée. En moyenne, il faut 4 jours pour y pénétrer, mais dans un cas, seulement 30 minutes ont suffi. La durée maximum s’établit à 10 jours.
blog a lire sur le metier
blog avec tuto pas recent
Toute intrusion ne se fait pas à distance
Rappelons tout d’abord que près de 30 % des infections proviennent de supports USB. Derrière ce simple périphérique de stockage apparemment sans risque peuvent en fait se cacher de grandes menaces. Ces clés peuvent en effet contenir des programmes malveillants qui infecteront le SI de l’organisation et auront des conséquences fâcheuses : usurpation d’identité, espionnage industriel, diffusion de malwares, vol des mots de passe, blocage de systèmes critiques, etc.
Rappelons tout d’abord que près de 30 % des infections proviennent de supports USB. Derrière ce simple périphérique de stockage apparemment sans risque peuvent en fait se cacher de grandes menaces. Ces clés peuvent en effet contenir des programmes malveillants qui infecteront le SI de l’organisation et auront des conséquences fâcheuses : usurpation d’identité, espionnage industriel, diffusion de malwares, vol des mots de passe, blocage de systèmes critiques, etc.
C'est un sombre constat qui bout intérieurement depuis des mois, devenu un énervement depuis 15 jours, et une obsession ce week-end. Attention aux âmes sensibles qui croient que mon hacktivisme est celui d'un bisounours, je vais être une fois de plus clivant et choquant.
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
To learn more about Tsunami, visit our documentation.
Tsunami relies heavily on its plugin system to provide basic scanning capabilities. All publicly available Tsunami plugins are hosted in a separate google/tsunami-security-scanner-plugins repository.
https://github.com/google/tsunami-security-scanner
To learn more about Tsunami, visit our documentation.
Tsunami relies heavily on its plugin system to provide basic scanning capabilities. All publicly available Tsunami plugins are hosted in a separate google/tsunami-security-scanner-plugins repository.
https://github.com/google/tsunami-security-scanner
Je vous présente dans cet article l'outil searchsploit, qui permet d'effectuer des recherches dans la base de données exploit-db en ligne de commande.
De mon côté je fais partie de plusieurs communautés ou groupes sur diverses applications (Slack, Discord, etc.). Les sujets peuvent être divers et variés comme l’OSINT avec la communauté très active OSINT-FR que je vous invite à rejoindre si ça vous intéresse : lien ici.
Site d'information sur la cybersecurite
Flux RSS exploits