Search:

Type: Posts; User: Deepak Rathore

Page 1 of 2 1 2

Search: Search took 0.10 seconds.

  1. Replies
    1
    Views
    1,768

    According to statement,It uses windows...

    According to statement,It uses windows vulnerability.
    Does it works with Linux ?
  2. Replies
    13
    Views
    53,649

    Sticky: Amol Sir, 've tested, but they have closed down....

    Amol Sir,
    've tested, but they have closed down.
    When will the next meeting.
  3. Replies
    2
    Views
    5,081

    10. Helix 11. gnacktrack 12. Pentoo 13. OWASP...

    10. Helix
    11. gnacktrack
    12. Pentoo
    13. OWASP Live CD
    14. Arudius
    15. Secmic
    16. NetSecL
    17. VAST
    18. Katana
  4. Replies
    2
    Views
    5,081

    10. Helix 11. gnacktrack 12. Pentoo 13. OWASP...

    10. Helix
    11. gnacktrack
    12. Pentoo
    13. OWASP Live CD
    14. Arudius
    15. Secmic
    16. NetSecL
    17. VAST
    18. Katana
  5. Getting all the backtrack repository, follow...

    Getting all the backtrack repository, follow below steps:

    get the GPG key:
    wget -q http://archive.offensive-security.com/backtrack.gpg -O- | sudo apt-key add -

    Add the main repo:
    sudo echo...
  6. Getting all the backtrack repository, follow...

    Getting all the backtrack repository, follow below steps:

    get the GPG key:
    wget -q http://archive.offensive-security.com/backtrack.gpg -O- | sudo apt-key add -

    Add the main repo:
    sudo echo...
  7. Replies
    3
    Views
    5,167

    Network Security & Pentesting Box (Backtrack)...

    Network Security & Pentesting Box (Backtrack) itself not secure..
    1. Need root privillage
    2. Many unwanted services and ports installed
    3. Old kernel
    .......any many other...

    Instead of...
  8. Replies
    13
    Views
    53,649

    Sticky: I am still confuse with a que.How meta-characters...

    I am still confuse with a que.How meta-characters work with sql injection? How sql injection works?How a single qoute works,what it will do when we put in url or a field,how we receive an error msg?
  9. Original Link-- PortingExploits - Metasploit...

    Original Link--

    PortingExploits - Metasploit Framework - Metasploit Redmine Interface
  10. Replies
    2
    Views
    2,208

    HACKED BY [C7Booter]

    I opened a friend's website today after a long time and then I saw that someone hacked the website.

    [h!!p://www.oviyansinfotech.com]

    I examined the known vulnerabilities, but I did not get any...
  11. Awesome !! I was looking for same..

    Awesome !! I was looking for same..
  12. Replies
    2
    Views
    4,581

    working with same thing.. but also we are using...

    working with same thing.. but also we are using trustwave (commercial)for our SOC system...
  13. badluck for me... tomorrow early morning i have...

    badluck for me...
    tomorrow early morning i have to go to maysor for a project ...:P
  14. Replies
    3
    Views
    3,042

    both are helpfull for me.. but ill make my own...

    both are helpfull for me.. but ill make my own checklist..
    searching some ISACA SAP auditing checklist..
  15. Replies
    2
    Views
    2,596

    Perfect Guidelines from Bond... before 3 months...

    Perfect Guidelines from Bond...
    before 3 months ago i given an interview..selected and worked as sr. security consultant but didn't know the name of company..location of company..anything about the...
  16. Replies
    3
    Views
    3,042

    ERP Auditing

    Request for Share some Experience of SAP Security Auditing or Any ERP System Security Auditing...

    I have google it..found many blogs..posts ..community..
    find out many checklist also..but all are...
  17. Replies
    0
    Views
    2,009

    MS Patch Tuesday Vs Exploit Wednesday

    patch Tuesday leads to exploit Wednesday
  18. good sharing!! You Guys Rock!

    good sharing!!

    You Guys Rock!
  19. not a hard issue sir... BT5 have some update...

    not a hard issue sir...
    BT5 have some update issue..
    i have followed steps as webdevil said...

    1.st apt-get install proxychains
    then..
    configure proxychain.conf
    at the last..sock4...
  20. not a hard issue sir... BT5 have some update...

    not a hard issue sir...
    BT5 have some update issue..
    i have followed steps as webdevil said...

    1.st apt-get install proxychains
    then..
    configure proxychain.conf
    at the last..sock4...
  21. yup..backtrack 5 need some more...

    yup..backtrack 5 need some more configuration...and updates..
    now working properly...
  22. Thread: hi

    by Deepak Rathore
    Replies
    2
    Views
    1,522

    okay Neo....... Name : Deepak Rathore...

    okay Neo.......

    Name : Deepak Rathore
    Qualification : M.Tech (information Security & Ethical Hacking)
    Certifications: CCNA, MCP
    Area of Interest in Info Security: Malware Coding and Analysis...
  23. now built-in BT5.... thanks .....

    now built-in BT5....
    thanks .....
  24. NOTE: The libstdc++5 package has been deprecated...

    NOTE: The libstdc++5 package has been deprecated and is no longer available in Ubuntu repositories. You can download it from the Debian Web site at Debian -- Details of package libstdc++5 in lenny....
  25. thanks for good article....but recently used in...

    thanks for good article....but recently used in BT5 but not working properly..how to configure proxychains.conf please clarify properly...
Results 1 to 25 of 32
Page 1 of 2 1 2