Skip to main content

Posts

Showing posts from 2020

Software Security Testing Part - II

 Types of Software Security Testing Introduction   Welcome to the second module of software security testing workshop.In this module, we will be exploring different types of evaluating software security. It is recommended that you should first complete the previous module in order to build a knowledge base in this domain, which will help you continue in this workshop with a separate mind set on how to be an expert in software security testing.  Software Security Testing    Different organizations and different security professionals define it differently and mostly all are correct. There are different ways of understanding software security testing. Following are some well known concepts:,    “Security testing which is non-functional in nature, more focused on security aspects”                          OR  “It is a type of testing in which a security professional performs different types of attacks to check the security blueprint of the software in order to find if the software or appl

Software Security Testing Part - I

  The Basics of Software Security Introduction   Welcome to the first module of this workshop. In this workshop, we will be learning about the overall software security testing happening in the field of information security, covering many aspects of security. However, in this module, we will talk about the knowledge base, the basics of software security.  Prerequisites  • Sound knowledge in computer programming  • Sound knowledge of information security and related technologies  • Expert in any one programming language  The Software Industry    The software industry is approximately 50+ years old and it has progressed from a very basic level of software to complex development and now there is a lot of competition among developers and in the mobile software development market.    Most importantly, in today’s software industry, there are threats to the software we normally and generally use, e.g., operating systems, like Windows. However, to overcome this, we use different types of to

Hacking with Security Tools Part - 5

  Kali Linux Comparison with Other security distributions Introduction    Welcome to the last module of this workshop. We have been talking about hacking & exploit development so far in this workshop. Over the Internet, there are many distributions which you can see as security distributions which were build for penetration testing or security testing as a main purpose. But not all of them have the strength that Kali Linux has.   In this module, we will simply present the comparison or the intros of other security related operating systems and Kali Linux.   Known Hacking Distributions (Operating Systems)   1 – Blackbuntu      Blackbuntu is a penetration testing Linux distribution that is specially designed for training security students and information security practitioners. It was built on Ubuntu 10.10 with the Gnome desktop environment. Blackbuntu will also include the KDE desktop in the final release of Blackbuntu Community Edition 0.3.  Download: http://blackbuntu.sourceforge.

Hacking with Security Tools Part - 4

  Top 10 Security Tools in Kali Linux Introduction  Welcome to module 4 of this workshop. So far, you have learned about hacking with Kali Linux and a taste of how you can utilize Kali Linux as a base platform for exploit development. Here we will highlight the top 10 security tools available in Kali Linux and their purpose.   Prerequisites  It is recommended that you should first complete the previous three modules before you start reading this module.   Top Ten Security Tools available in Kali Linux   Use the application tab and expand the top ten security tools as shown in below figure. You can see the list of tools in the most right tab open under the category top 10 security tools. We will expand each tool one by one.   The first tool, which is presented under top ten categories, is air-crack.     From the vendor’s mouth “Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS

Hacking with Security Tools Part - 3

  Kali Linux and Exploit Development Introduction    Welcome to the exploit development module. So far, we have been talking about the ethical hacking aspects of Kali Linux. You can also use this wonderful security distribution in the exploit development. Kali Linux comes with pre-installed tools and accessories, which gives support in the exploit development lifecycle. In this module, we will not be explaining “what is exploit development” but we will be discussing where Kali Linux can be used in the exploit development.  Prerequisites  • Basic concepts of exploits  • Prior knowledge about debugging  • Programming concepts  • TCP/IP understanding  • Understanding the background of exploit development   Kali Linux Exploit Development Support   Covering the real aspects of exploit development lifecycle, Kali Linux basically is not a full fleshed exploit development platform, however, it has pre-installed tools that have exploit development as a native feature. Kali Linux also comes

Hacking with Security Tools Part - 2

  Kali Linux and Ethical Hacking Introduction   Welcome to the second module of this workshop. In the previous module we presented how you can setup a virtual environment on which you can practice ethical hacking skills. Now we will move to the steps where we can further put light on the practical stuff. Let’s explore how you can practice ethical hacking with Kali Linux. Prerequisite     It is recommended that you first create a live virtual environment as explained in Module 1 and with a minimum of the following machines running in the virtual ethical hacking lab.  • Master Box (Kali Linux)   • Windows XP   • Metasploit   • Any other OS as recommended in Module 1 . Knowledge Base    Let’s first talk about a bit on the explanatory bit, which you can memorize before stepping into real hacking.   What is Ethical Hacking?    You must have heard enough on hacking! But what is ethical hacking? Can hacking be ethical? Well, this is a terminology used by the industry where a security prof