Wednesday, 2 January 2013


Posted by at 00:03
To make CMS Explorrer do the best work, I recommended to setup the OSVDB Api Key. It's easy, just register on OSVDB site and you will g...

Tuesday, 1 January 2013

How to Fix Metasploit unloaded modules

Posted by at 23:43
Yesterday, After updating Metasploit I got an error that Metasploit could not load some modules. Metasploit Module could not be loaded :...

Wednesday, 14 November 2012

Slax De-ICE v2.100 Solution

Posted by at 07:46
#Information Gathering Scaning using Netdiscover : Scanning with Nmap : result for information gathering : root@bt:~# nmap -sS -A 192.1...

Friday, 9 November 2012

Slax v.110

Posted by at 02:56
# Information Gathering In this part, I will IG the target using Nmap with the command : # nmap -sS -A and return the resul...

Saturday, 3 November 2012

Network Forensic Puzzle #1

Posted by at 07:39
Yesterday I was learn about Network Forensic, and my case is captured paket using Wireshark. You can download the capture file here . Afte...

Memory Forensic

Posted by at 01:10
Today I was learn about Memory Forensic. My target is windows xp, before I have been dump memory from windows xp using AccessData FTK. After...

Monday, 29 October 2012

How to get pwnOS IP Address

Posted by at 17:30
Yesterday, I was learn about pwnOS. The vulnerable operating system for penetration testing lab. Then I trying to run the pwnOS in VMware, a...

Friday, 26 October 2012

Linux Tools for Digital Forensic

Posted by at 20:04
Here is common tools are used for digital forensic in Linux, # DD The DD tool is used for clone the device like hard-drive. DD will clon...

Introduction of Computer Forensic

Posted by at 19:52
# What is Computer Forensic ? Definition of Computer Forensic is a proccess to finding, searching, analysis dam collecting the evidence fr...

Monday, 22 October 2012

Hacking DVWA and got the ROOT

Posted by at 16:18
Hello All, today I was learn about DVWA . And I want to hack DVWA until got the root. I'm using fitur upload with high security level. ...

Friday, 19 October 2012

Social Engineering + BeEF + Metasploit, finally pwned

Posted by at 11:58
Heiyo, today we will learn about pwned victim from browser. My scenario is : Make user visit our page, with SocialEngineering Setup BeEF...

Wednesday, 17 October 2012

Metasploitable 2 has been pWned - Part 2

Posted by at 01:00
After posting about pentest on Metasploitable v.2 ( here ),  I will continue to attack again on machine target using result from Nmap scanni...

Metasploitable 2 has been PWNED with Metasploit

Posted by at 00:09
Hi All, today I want to share about how to pwned Metasploitable v2. You can download metasploitable v2 here

Friday, 12 October 2012


Posted by at 06:52
When learning about bypass SafeSEH protection, often meet with command POP POP RETN. whether is POP POP RETN ? based my knowledge, this co...

Qualcom WorldMail3 Buffer Overflow

Posted by at 06:41
Today I want to learn about buffer overflow on Qualcom Worldmail3. First, I make fuzzer using vulnerable character and command : a001 LIS...

Monday, 8 October 2012

Buffer Overflow CoolPlayer+ Portable 2.19.2

Posted by at 12:54
Today I learn buffer overflow CoolPlayer+ Portable 2.19.2. This is a Audio Player for windows. I need to prepare some tools for exploitation...
©2012 SECURITY is powered by Blogger - Template designed by Stramaxon - Best SEO Template