Remove logs after hack Linux

1.echo “unset MAILCHECK” >> /etc/profile 2.rm -rf /root/.bash_history 3.touch /root/.bash_history 4.history -r /var/log > dmesg /var/log > auth.log /var/log > alternatives.log /var/log > boot.log /var/log > btmp /var/log > cron /var/log > cups /var/log > daemon.log /var/log > dpkg.log /var/log > faillog /var/log > […]

Vulnerability Scanners Review

ou might be looking for the article: Top 5 best Vulnerability Port scanners

I tested the following (trying to only list automated vulnerability scanners):

ISS Internet Security Systems SSS Shadow Security Scanner Retina eEye Nessus GFI Languard Network Security Scanner Qualys Nstealth Security Scanner Nikto Whisker Infiltrator Nscan



Free Trial of The […]

Web Server’s SSL Ciphers

How to Disable Weak SSL Protocols and Ciphers in IIS  March 17th, 2011  Wayne Zimmerman

I recently undertook the process of moving websites to different servers here at work. This required that university networking group scan the new webserver with a tool called Nessus. Unfortunately this turned up several errors, all of them had to do […]

The Web Security Glossary

Description The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to clarify the language used within the community. Complete Document [PDF] size: 140 kilobytes

Project leader: Robert Auger (contact @ webappsec org)

Abuse of Functionality: An attack technique that uses the […]

Web Application Security Scanner List

The following list of products and tools provide web application security scanner functionality. Note that the tools on this list are not being endorsed by the Web Application Security Consortium – any tool that provides web application security scanning functionality will be listed here. If you know of a tool that should be added to […]

Network Attacks

 Network Attacks

Your networks and data are vulnerable to any of the following types of attacks if you do not have a security plan in place.

Eavesdropping In general, the majority of network communications occur in an unsecured or “cleartext” format, which allows an attacker who has gained access to data paths in your network […]

How To do “Man in Middle” Attack using Ettercap

How To do “Man in Middle” Attack using Ettercap


“Man in Middle” Attack is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire […]