Posts in category Network Security

New Tool FTPPasswordSniffer – U...

New Tool FTPPasswordSniffer – Universal FTP Password Sniffer & Recovery Tool

FTPPasswordSniffer is the universal FTP password recovery tool for any of your favorite FTP application such as FileZilla, SmartFtp etc. It can not only recover the lost FTP account password but also can sniff and catch any of the FTP account passwords passing through your network, thus making it a great tool for Penetration Testers. […]

Launched NetCertScanner – First...

Launched NetCertScanner – First Enterprise Product from

NetCertScanner is a Enterprise version of our recently released free tool, SSLCertScanner which was meant only for personal use or for the needs of smaller organizations. NetCertScanner has all the professional level features  and wide range of support options required for medium/bigger Enterprises who generally has to manage large number of SSL services in their […]

Book of the Month – CISSP All-i...

Book of the Month – CISSP All-in-One Exam Guide

I have been writing review for many technical security books in the recent past, so this time I thought of picking up certification related book. I generally don’t value these security certifications. Though these certifications do not add any greater value to ones technical knowledge but they certainly help anyone in getting ahead in the […]

Unleashing VASTO – A Virtualiza...

Unleashing VASTO – A Virtualization Assesment Toolkit

VASTO is the first of its kind toolkit designed to asses the security of various Virtualization solutions including VMWare and Xen server.  It is implemented as set of modules which can be integrated into Metasploit , the popular penetration testing framework.  This makes it very easy for pen testers to directly integrate VASTO with their […]

Book of the Month: Cloud Security �...

Book of the Month: Cloud Security & Privacy

Other day while I was crawling through the books at the local book mall,  I just ran into this book.  Immediately I popped up amazon site on my cell to check the ratings and found that its rated 4.5 (out of 11 ratings) which is a signal for must buy.  Cloud computing being the hot […]

Delivered Talk on ‘Application ...

Delivered Talk on ‘Application Virtualization’

I just came back after delivering presentation on ‘Application Virtualization’ during ‘Clouding Computing & Virtualization‘ summit at NITK Surathkal, one of the premiere engineering institute in India.  It was great moment for me to deliver the talk at my own college after 6 years of passing out from here. The event was organized as educational […]

Book of the Month – VIRTUAL HON...

Book of the Month – VIRTUAL HONEYPOTS

Honeypots have been the best mechanism to trace the real security threats in the wild whether it may be hacker attacks, worms or botnets. In today’s world, where deploying and setting up physical honeypots are not only complex but also costly in terms of time and money, virtual honeypots helps in great extent by making […]

Book of the Month – Wireshark N...

Book of the Month – Wireshark Network Analysis

“Wireshark Network Analysis” is the latest book on Wireshark, the top notch tool for network analyzer.Wireshark is used in analyzing network traffic, troubleshooting network problems on wired and wireless network. Either you are an network analyst,  administrator,  network security professional this will be the book that you don’t want to miss. The book is well […]

SSLCertScanner: New Tool to Scan for ...

SSLCertScanner: New Tool to Scan for SSL Certificates on Network

SSLCertScanner is the FREE network based SSL certificate scanner software. It can remotely scan SSL certificate on any host which may present  on the intranet or internet. It can also scan single host or multiple hosts at a time. Once the SSL certificate is discovered, SSLCertScanner automatically validates it by checking for expiry date. Here […]

Hackers Exploit Launch Feature of PDF...

Hackers Exploit Launch Feature of PDF to Spread the Botnets

Next time you open that PDF email attachment or PDF document from your friend, it may be the last time you will be owning your system.  Next moment onwards it will no longer be yours because it will become  part of botnet system controlled by attackers out there. Attackers are busy exploiting new launch action […]

Our Company

Follow us on Facebook

Join Mailing List

Get direct access to our expert trainers or mingle with like minded security folks in our mailing list