The Hacker News — Most Popular Cyber Security, Hacking News Site: Metasploit

Update : Backtrack Kali Linux 1.0.3 released with built-in accessibility features

Update : Backtrack Kali Linux 1.0.3 released with built-in accessibility features

April 26, 2013Mohit Kumar
BackTrack Linux, a specialized distribution of penetration testing tools, has long been a favorite of security specialists and IT pros....
Distributed Red Team Operations with Cobalt Strike

Distributed Red Team Operations with Cobalt Strike

February 12, 2013Mohit Kumar
What if you could easily host malicious websites, send phishing emails, and manage compromised hosts across diverse internet addresses? This...
Exploit Packs updated with New Java Zero-Day vulnerability

Exploit Packs updated with New Java Zero-Day vulnerability

January 10, 2013Mohit Kumar
A new Java 0-day vulnerability has been discovered, already wind in use by an exploit pack, taking advantage of a fresh zero-day vulnera...
Review : Hacking S3crets - beginners guide to practical hacking

Review : Hacking S3crets - beginners guide to practical hacking

December 08, 2012Mohit Kumar
Most of People are curious to become Hackers, but they do not know where to start, If you are in the same situation, then " Hacking...
CTF365 – Capture The Flag – Next Generation

CTF365 – Capture The Flag – Next Generation

November 19, 2012Mohit Kumar
Prepare your tools, build your team, defend your country and conquer the World. It is well known that the best way to learn security is ...
Zero-Day Exploit released for Vulnerability in Novell ZENworks

Zero-Day Exploit released for Vulnerability in Novell ZENworks

October 19, 2012Mohit Kumar
Rapid7 researcher Juan Vazquez recently uncovered a zero-day security flaw in Novell ZENworks Asset Management 7.5. This Vulnerability (...
New Internet Explorer zero-day, Can trigger malware automatically

New Internet Explorer zero-day, Can trigger malware automatically

October 15, 2012Mohit Kumar
The new zero day exploit has been discovered and being exploited in the wild. This can be used to load malicious application on victim m...