Monday, July 5, 2010

Minix- an operating system

This operating system was created by Andrew S. Tanenbaum. Minix greatly influenced the design decisions of Linus Torvalds applied in the creation of Linux kernel. So it has lot of historical importance. This operating system is developed even now and is available for free download from Minix

Minix is a Unix-like computer operating system based on a microkernel architecture.Some of the key features of this operating system are:

-> Extremely small with the kernel within 6000 lines of code.
-> POSIX compliant
-> Parts that run in user mode runs in seperate modules and are insulated from each other. So very efficient in bug handling.
->Very reliable even in the case of a driver crash

And the best part of installing minix is for beginners who want to learn more about an operating system . They can use minix and can easily sperate each of the layers in order to understand each of its features.

Saturday, July 3, 2010

Open source coder's block?

Here is an excellent pdf describing how you can beat the coder's blog:

Also, the catb link mentioned in the pdf is extremely helpful teaching how to be a hacker

Saturday, June 12, 2010

Top 6 Hacking Tools in Linux

1.NMAP

Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.

click here for NMAP tool

2.Nikto

web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers

click here for Nikto tool

3.THC-Amap

Amap is a next-generation tool for assistingnetwork penetration testing.
It performs fast and reliable application protocol detection, independant
on the TCP/UDP port they are being bound to.

click here for THC-Amap

4.Ethereal

Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product. Its open source license allows talented experts in the networking community to add enhancements. It runs on all popular computing platforms, including Unix, Linux, and Windows.

click here for Ethereal

5.THC-Hydra

Number one of the biggest security holes are passwords, as every password security study shows.
Hydra is a parallized login cracker which supports numerous protocols to attack. New modules
are easy to add, beside that, it is flexible and very fast.

click here for THC-Hydra

6.Nessus

Nessus vulnerability scaer, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks.



click here for nessus