Thursday, July 28, 2011

Tech Quote of the Day 7/28/11

"I haven't lost my mind; I have a tape back-up somewhere."  ~Author Unknown

Tech Quote of the Day: 7/28/11

"Yo moma is like HTML: Tiny head, huge body."

Today's Tech Deals 7/28/11

MicroCenter: $249.99 2GB/320GB Desktop...$379.99 Dell 4GB/1TB Desktop...$259.99 Compaq 3GB/320GB Laptops
website: http://tinyurl.com/3zpjrx9


TheNerds: Great Deals on Drobo Data Storage...While Supplies Last!
website: http://tinyurl.com/3gmaltx

SameDayMusic: Sonic Savings Alert: Top Ten Deals 7/27 through 8/10
website: http://tinyurl.com/3ktzs4c

PCConnections: Tip the Scales in Your Favor - Data Center Power & Cooling
website: http://tinyurl.com/3g6upot

Geeks: Dell 10" Convertible Tablet Deal 
website: http://tinyurl.com/3pbuvbm

TigerDirect: Barebone Alerts: Quad 4GB PC Kit $199...Quad 8GB 1.5HD PC Kit $279...HDMI Video $29...1TB Portable Ext HD $89...4GB DDR3 $17
website: http://tinyurl.com/3drwwus

Beauty Of The Baud: iExploder-Web Browser Quality Assurance Tester


source: ehacking.net


There are different ways and method to measure the security of web application and web browsers, there are different tools available to exploit web browser and for browser side attack like Tabnapping and BeEF.


So you must consider both sides threat to make the security of your web server strong and strong. As discussed before different tools to do a penetration testing on web application.


Beside these wonderful tools if you want to fuzz force (fuzzers) to find the vulnerability that can cause a harm, than iExploder is a good choice to find problems and reliability of a web browser.

Read the complete article here.

Beauty Of The Baud: Enhanced Mitigation Experience Toolkit (EMET)


source: ehacking.net
"The common aspect about Windows is that windows is more vulnerable than Linux, well there is deep discussion on it but the point is that you can secure your windows OS too, there has been numerous techniques and tools has been discovered to secure a OS system from different attacks.
Enhanced Mitigation Experience Toolkit is a Microsoft product that is designed to help prevent hackers from gaining access to your system.


Vulnerabilities and exploits are discover everyday means you have to patch your software everyday for maximum security but what about 0-day attack, to counter against 0-day type attack you can use EMET product.The key features that are available on EMET discuss below."

To learn more click here.

Beauty Of The Baud: Best Way to Secure a Facebook Account


Posted: 26 Jul 2011 12:08 AM PDT
source ehacking.net
This is definitely a must read for anyone who uses Facebook.


"Social networking websites specially Facebook is now a common medium for all of us to share to learn to connect and to fun, if you are addict with the Facebook or if you are not addict in both case you want to secure your profile from hackers, you want to protect your online information that can be stolen via Facebook. We have previously discussed the risk and the tips to secure your Facebook account.

In my views that the previous tips is not enough to protect your Facebook account, in this article i will tell you the single and the best way to secure your Facebook account."


To see this article in its entirety please click here.

August Developer Events

This month's lineup for Developers
Take advantage of one or all of the educational seminars and workshops this month for developers. Discover all the latest tricks, tips and techniques to boost your productivity with Adobe products. Join us for seminars and workshops, where you'll be able to meet other developers at a live session in a city near you or learn when and what you want on your own time with online learning from your office or home.



BlackHat
August 2-4, 2011
Las Vegas, NV
The Black Hat Briefings have become the most important security conference series in the world by sticking to our core value: serving the information security community by delivering timely, actionable security information in a friendly, vendor-neutral environment.
Register now

RIACON
August 6-7, 2011
Rockville, MD
Where architects and developers of all levels come to gather, share and learn about creating the next generation of web based applications.
Register now

Dreamweaver: Design &
Create Your Website

August 18: Minneapolis, MN
October 20: Chicago, IL
November 17: Dallas, TX
December 15: Philadelphia, PA
Learn everything you need to know about building compelling websites using Adobe® Dreamweaver® CS5!
Learn more

Adobe MAX 2011
October 1-5, 2011
Los Angeles, CA
The best and brightest speakers are coming to MAX to share their knowledge about the fast-changing landscape of digital content creation and application development across screens. See who's speaking, then register early to secure your spot in popular sessions and labs.
Learn more



Working with Documents
made easy in ColdFusion 9

August 3, 2011
10:00 A.M. PT
Learn how to easily generate office documents for reporting, decision making, and presentations. Read, create, and update spreadsheets using the new CFSPREADSHEET tag.
Register now

Building an Elegant
Front-End for SAP Data

August 16, 2011
10:00 A.M. PT
Join Enterprise Platform Evangelist: Anne Katherine Petteroe and discover the elegant and user-friendly front-end that you can build for SAP data using Adobe Digital Enterprise Platform.
Learn more

Roundtripping Adobe Captivate Content with Adobe Flash
August 25, 2011
8:00 A.M. PT
Join Vish and Dr. Pooja Jaisingh to learn how to instantly update Flash® applications used in Adobe Captivate projects, invoke Flash from within Adobe Captivate, and synchronize the files in Adobe Captivate and Flash with a single click.
Register now

Tips for Setting Up an ADEP Trial
August 30, 2011
10:00 A.M. PT
The best way to see the ground-breaking improvements in the new Adobe Digital Enterprise Platform is to try it for yourself. Join us for tips and tricks in setting up a trial.
Learn more

Building rich internet applications quickly using ColdFusion 9
August 30, 2011
10:00 A.M. PT
Learn how ColdFusion® enables developers to rapidly build enterprise-ready Internet applications by condensing complex business logic into fewer lines of code.
Register now



Easily Build Mobile Apps for iOS and Android with Adobe
Join Christophe as he demonstrates how to build mobile apps for iOS and Android devices more easily using Adobe Flash Builder, Flex® & LiveCycle®. Learn how to minimize development time and reuse components across device platforms. Duration: 60 minutes.
Watch now

Next Generation Application Development: Announcing: the Adobe Digital Enterprise Platform
Get a demo and an in-depth look at the Adobe Digital Enterprise Platform. Will show the new architecture based on OSGI, JCR and Sling which can run directly in a Java virtual machine.
Watch now

Wednesday, July 27, 2011

Randi Zuckerber Wants Online Anonymity To End


What is it with the Zuckerbergs? It seems they are so against privacy it's beginning to become disturbing. In regards to cyber-crimes and cyber-bullying I can understand their point, but a one size fits all method to stopping those problems is not the way to go about it.

Anytime a person's real information is put online it can be misused in the hands of those with malicious intent. For instance, knowing a person's name, age, city of residence, and a few searches can yield vital information including their current address. Access to them via a social network can yield realtime information such as their current whereabouts. Depending on the intent, we can see the switch from a cyber crime to a real-world crime; whether it be stalking, robbing the person's home, etc.

Will ending online anonymity stop cyber crimes? No. Will it curve cyber crime? Perhaps. Keep in mind everyday real-world crimes are committed by people who aren't hiding behind an online identity, yet still commit crimes. Food for thought.

Click here to read the article.

Tech Quote of the Day: 7/27/11

"Why do we want intelligent terminals when there are so many stupid users?"

Friday, July 22, 2011

Hacker Joseph Bernard Campbell Pleads Guilty


Cyberstalking and unauthorized access to a computer are two federal charges Joseph Bernard Campbell plead guilty to for stealing nude/semi-nude pictures of 19 women and posting those pictures on the women's Facebook page. He didn't stop there he posted those same pictures on porn sites and a forum. Read more about this story here.

Netflix Price Increase

Beauty Of The Baud: Chrome Extensions for Security Researcher


source: ehacking.net:
"The importance of browser is not a hidden truth in the process of penetration testing or ethical hacking, security researcher probably prefer Firefox as browser because it has a wide range of add ons that will help to make the test easier, however we have seen the rapid increase in the usage of google chrome, you can count chrome among the best browsers. On previous article we have discussed about the security extension that are available on Firefox.On this article I will discuss the best extensions (add ons) that are available for chrome browser and plays an important role for security researcher, web developers and ethical hacker."



To read the complete article click here.

Beauty Of The Baud: Backtrack 5- DNSenum Information Gathering Tool


source: ehacking.net


"Information gathering is generally a first step of ethical hacking/penetration testing, you need to get the maximum information about the victim because information is a key of success. As discussed before about information gathering in detail with different tools and technique like maltego and for DNS information gathering we have discussed DNSmap.
Information is weapon so in this article i will explain you how to get a information from DNS.

For this purpose i will use DNSenum, it is available on backtrack5 if you are using some other distribution and version than you can install it because it need only a perl, this may be a active perl or strawberry perl, you can run dnsenum on windows too. You can get the following information by using DNSenum."


Click here to read the article in its entirety. 

HP TouchPad vs iPad 2

WilsonTech1 videos



Thursday, July 21, 2011

World Tech Update, July 21, 2011

Today's Tech Deals 7/21/2011


Geeks: WiFi Night Vision Color Camera Blow-out
website: http://tinyurl.com/3petm9j

Amazon: Top Bargains
website: http://tinyurl.com/2ylfjd

NewEgg: July Storage Specials! $18.99 LG 24X DVD Burner, $129.99 WD 2TB 7200 RPM HDD...
website: http://tinyurl.com/3n7e5x5

TigerDirect: FIRST EVER 55" 1080p HDTV $699...46" 1080p HDTV $479...25" 1080p HDTV $179...Lockout or Not, These Deals are Hot
website: http://tinyurl.com/3jvrlb9

PCConnection: BlackBerry PlayBook Tablet - Only $599!
website: http://tinyurl.com/3ldl3xs

PSSL: Free Scratch Upgrade With Kontrol-S4 Purchase Before July 31st!
website: http://tinyurl.com/4xpbsun

Tech Quote of the Day: 7/21/11

"If at first you don't succeed; call it version 1.0"

Tuesday, July 19, 2011

Monday, July 18, 2011

Beauty Of The Baud: Virtualbox- Setup Windows On Linux Backtrack 5


source ehacking.net


"Virtual machines allow to run different operating system on a single box, A virtual machine is a program that run in an isolated partition on real computer(machine). As the name suggest virtual means it is not real, operating system install on VM do not run on real hardware. There are different software's available for visualization, i will discuss virtualbox for this article. 
If you are using Linux or windows and want to create another virtual environment for another operating system, for Linux like Ubuntu based follow the tutorial below."



Read the entire article here.

Beauty Of The Baud: Radware Web Application Firewall-AppWall

source: ehacking.net
"Web application(s) are not secure any more, new web vulnerability and the way of attack discover everyday. By doing a penetration testing with different tools does not means that your web application secure, there are different vulnerability may find on the web application. For a manual security you need a fast team to update the operating system and application software's.
There are different firewalls or IDS/IPS available to secure a web application.Radware’s AppWall is a Web Application Firewall (WAF) appliance that secures Web applications and enables PCI compliance by mitigating web application security threats and vulnerabilities. It prevents data theft and manipulation of sensitive corporate and customer information."


Read the entire article here.

Facebookers Beware!

Survey scammers are at it again. In a nutshell the scam hijacks the viewer's clicks and likes the page or shares the link with the viewers facebook friends. To find out more click here!

Beauty Of The Baud: Post of The Month-Computer Conferences For July 2011


Source: ehacking.net


From this article I have decided to write on the current conferences for the month this is called post of the month (PTM). The main aim of sharing this is to encourage the readers to understand the importance of conferences, you must go the computer related conference if you can, it will help you to understand the latest trend about computing, it will help you to learn about the latest research in the field of computer science.
Well there are so many conferences that is going on around your local premisses, so it very difficult for me to cover all of the conferences that is going to be held but i will try my best to get more and more information about conferences. Remember this article covers only the International conferences there are many conferences that is only for the locals, so I am not going to cover it.
July 18-21, 2011
There are two international conferences that is going to be held at 18-21 July, both are at Munich, GERMANY. First one is SAINT2011 the 11th IEEE/IPSJ International Symposium on Applications and the Internet, and the second one is COMPSAC 2011 35th IEEE International Computer Software and Applications Conference.
July 25-27, 2011
There are three international conferences available among these date, ARITH 2011, 20th IEEE Symposium on Computer Arithmetic will be held at Tübingen, Germany. ASONAM 2011, International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung City, Taiwan. MASCOTS 2011, 19th Annual IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Singapore, Singapore.



To learn more read the entire article here.

Goodbye Desktop Phone...Hello Cisco Cius!

Cisco's Cius enterprise tablet will definitely replace desktop phones, but it's much more than a phone replacement. Check out the video:

How To Root a Nook Color 1.2

Jake Ludington demonstrates how to root the Nook Color 1.2 to be able to use it as an Android Tablet.

Rode Videomic Pro: Review

Chris Pirillo discusses the Rode Videomic Pro:

Tech Quote of the Day: 7/18/11

"To err is human... to really foul up requires the root password."

Thursday, July 14, 2011

Tech Quote of the Day

"Back up my hard drive?  How do I put it in reverse?"  ~Author Unknown

Today's Tech Deals 7/14/2011



DivX: Summer Sale! Half off all software
website: http://tinyurl.com/6jmc9t8

PcConnection: Stay Mobile with the HP TouchPad or the Mini 3105!
website: http://tinyurl.com/6c4nsyv

MusiciansFriend: Final Days To Save Up To 85% On Essentials & Accessories!
website: http://tinyurl.com/64mxxx9

Geeks: Digital Cordless Phone Set Liquidation
website: http://tinyurl.com/644ewsh

NewEgg: Mid-Year Electronics Update! $429.99 YAMAHA Receiver, $159.99 Sony Ericsson Unlocked...
website: http://tinyurl.com/6hm85on

Amazon: Our Best Deals on Camera Products
website: http://tinyurl.com/63z96dz

TigerDirect: Only @ Tiger: 3 Dual-Core Laptops under $300...42" 120Hz TV $399...FLip Camcorder $39...N Router $19...7" GPS $99...8GB MP3 $49...Sound Bar $49
website: http://tinyurl.com/6ejjvwg

SameDayMusic: Check Out These Accessories From Same Day Music!
website: http://tinyurl.com/3ktzs4c

Reminder: Hear how to get proactive about managing application performance

LIVE WEBINAR

Your path to Application Performance Management

email_banner_image_arch14

Did you know that most errors in application performance go unreported?  So you end up operating in a vacuum, unaware that end-user productivity — and satisfaction — have been impacted until after the fact. Find out how to get more visibility into application performance, and avoid the loss of customers and revenue.
Get proactive about managing application performanceJoin us for a complimentary webinar with Enterprise Management Associates (EMA), and learn how to consistently provide reliable end-user performance within your most critical applications. Discover the steps for proactively managing application performance across your entire global organization — from the data center to the cloud, Internet, and beyond.
Register for the webinar now.
 How to Achieve Proactive Application Performance Management

When: Thursday, July 21, 2011
11:00 a.m. CDT

Featured Speakers:

Julie Craig, EMA
Leslie Minnix-Wolfe, BMC Software

logo_ema

Virtual Computing & Captain America Special Event

EXCLUSIVE MOVIE EVENT! More Wow. And Even More How!
Learn the “how” of end-to-end virtual computing —
from desktop delivery to networking and the Cloud!
“From Wow to How” is back with a new feature movie that shows you how to make end-to-end virtual computing a reality — from the datacenter to any device. Register for this 2 hour event and
you’ll learn:
HOW to harness the full power of virtual desktops — beyond “just VDI.” Specific use cases show how you can tailor this amazing technology to your exact business needs

HOW to build an infrastructure that ensures your virtual desktops are delivered with 100% availability, iron-clad security, and high performance for branch offices
HOW to provide a single point of authentication for users to securely access ALL applications — including those on
hosted IaaS or private cloud platforms
Register and you could win an iPad 2!

From Wow to How 2:
Virtual Desktops,
Networking and the Cloud
REGISTER
Please join us for this live movie event on July 21, 2011 at 8am in one of more than 50 cities.
ADVANCED SCREENING! CAPTAIN AMERICA: THE FIRST AVENGER.
For some extra “wow” be our
guest afterwards for a special
advanced screening event
featuring Captain America:
The First Avenger
.

500 Things Every IT Manager Needs To Know

Limited Time Offer - *Save $10.00
500 Things Every IT Manager Needs To Know: Volume 1
 
500 Things Every IT Manager Needs To Know: Volume 1
Productivity
Development
Infrastructure
Cost Control
Analyze
*Save $10.00
Add to Cart - 500 Things Every IT Manager Needs To Know: Volume 1
 
Improve your team's productivity, manage your budget and develop your career!
TechRepublic's 500 Things Every IT Manager Needs to Know: Volume 1 breaks down some of the most important facets of IT management into easily digestible lists. Built with content from our popular 10 Things and Five Tips blogs, it covers these areas:
-  Staff Management
-  Project Management
-  Infrastructure Planning
-  Migration and Upgrades
-  Purchase Decisions
-  Budgeting and Cost Control
-  Security
-  Career Development
Both IT novices and seasoned pros will benefit from the concise but comprehensive tidbits found in TechRepublic's 500 Things Every IT Manager Needs To Know: Volume 1.
Read Full Description
*Use Coupon Code: CPN62261010160 during checkout to receive your discount.
Add to Cart

(DISCLAIMER: Coupon valid on select item only. Sales tax, GST, VAT, shipping and handling are not included in the total purchase calculation. Coupon not valid for cash or toward previously purchased items. Coupon is non-transferable. To receive discount, you MUST enter the coupon code provided above exactly as written (coupon code is case sensitive) at the time of checkout, or you will NOT receive the discount. Customer Support will not be able to apply savings to orders once submitted on-line. Order must be placed on-line, with coupon code; can not be placed over the phone. Discount will be reflected during checkout; check your order before you submit it. All sales final - no price corrections, credit, refunds or exchanges. Coupon good only until 11:59pm ET, July 18th, 2011 or once redeemed, which ever occurs first. Void where prohibited or restricted by law.)  

Beauty Of The Baud: WebSurgery- Web Application Security Tool


 Source: ehacking.net
"Web application security is one of the key point to measure the security of a company profile. Website is very important, if the website is personal or if you are responsible for the website of your client, in both cases you must be careful about the security of the website. It is a good practice to be update to secure from exploitation but what about application layer security.
You must do a penetration testing on web application to find the vulnerabilities like, SQL-injection, XSS and others.

There are so many tools that has been discussed before but there is another good tool called WebSurgery, WebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with the web application planning and exploitation. Currently, it uses an efficient, fast and stable Web Crawler, File/Dir Bruteforcer and Fuzzer for advanced exploitation of known and unusual vulnerabilities such as SQL Injections, Cross site scripting (XSS), brute-force for login forms, identification of firewall-filtered rules etc."




To read to complete article click here.

Beauty Of The Baud: 7 Best Linux Server Security Tips


Linux seems to be the most secure and powerful server, but remember nothing is secure in the world you have to make the thing secure, if you are running Linux server and not patched it than it may be compromise so the point is that an administrator should make the box secure from hackers (crackers). There are different level of security like application layer security means web application security like SQL-Injection, XSS.

Application layer security is not the point of this article, in this article I will discuss Linux server hardening security tips.

Use Strong Passwords
I consider that you have an idea about the importance of passwords and password based attack, so use strong password that has upper and lower case alphabet, numbers and special characters, try to make the password policy strict.

Use Cryptography  
Cryptography the art of secrete communication, all the data that goes through network may be sniffed so use encryption technique to secure your data. Use OpenVPN is a cost-effective, lightweight SSL VPN. Use scp, ssh, rsync, or sftp for file transfer.

Avoid Remote Log Ins  
As mentioned on the previous tip that data goes on the network may be captured, services like FTP, Telnet, and different file transfer protocols may be compromised so avoid using these services by a remote location if you need to use these services than you must use secure channel like use OpenSSH, FTPS etc.

Patched Management 


There are different exploits available for different software(s) and services, so make sure to follow the patch management strategy to keep update your Linux kernel and all the software's and services running on that server. Keep up to date your OS to secure the Linux, if you have a question like why patch management and about patch management policies than follow the link to learn.
 
Use Intrusion Detection Systems
Firewalls has different limitation so use intrusion detection systems (IDS), you must be configure both network IDS (NIDS) and host IDS (HIDS) to protect the attacks like DOS,port scanning etc. We have discussed about IDS in different articles with detail click here to learn.

Use Linux Security Extensions
To secure the Linux kernel is the key point to secure the Linux server, there are various security packages available to provide the additional security to Linux kernel, try to use the software's like SELinux, AppArmor or GRSecurity.

Use Log Management
Use a strong log management policy to keep an eye on the changes and errors, beside Linux built in log management files there are different software's that provides auditing and log management policies.

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.

Beauty Of The Baud: How to Protect Online Content


Content is king, you have heard this sentence so many times before, you spend much time on researching and writing a unique article for your blog and the other the theft try to steal your article.
Plagiarism is now the rising and a biggest threat for content writer, if you are running your own blog and if someone copying your articles than it will give you a pain.
In this article I will discuss how protect your blog content for being copying, there are various steps involve to stop these activities.

Content Detection

The first step is to detect your content on the Internet, Internet is not a small network so it seems that it is difficult to detect some content on the Internet, while there are some tools that have an ability to find your work effectively.
  • Copyscape: It is one my favorite and one of the best web service to find plagiarism on the Internet, enter the URL of your content than copyscape will tell you about the theft content in percentage and by word. It is a good way to prove that content is your.
  • Plagiarisma: Just like copyscape, plagiarisma is the same service that provides the same feature.
  • Google Alerts: Google is a friend yes google is a best friend, if you dont want to check the plagiarism by yourself than google do this for you.
Work License 
Do you have a license, yes license for your content. It is a best practice to show your license with your work so that copier think before copying your work because you have a legal rights. 

You must have an idea about the copyright act for your country, while on cyber world you can get the Creative Commons (CC) License from Creative Commons Organization for your work. This organisation has categorized the license like to share or to protect your work. 
  • Click here to choose the license.
  • Fill out the form by your appropriate need.
  • Get the HTML code to put on your blog.
  • Put the code on the best place so that every visitor will see this notification.
Take Action Against The Copier


I suggest that first you should contact the copier via contact us form or you can get the contact information by using whois, if you want to take some legal action against the copier than you can do this, below is the some tips to take action.
  • blogger.com: There are different blogs that are hosted on blogger, so if the copier blog hosted on blogger you must report to blogger against the copier activities.
  • Report to DMCA: Another good way to take action, if you want to remove your content from copier website, than report DMCA to this activity.
  • Scribd: If someone copying your work on scribd than you can take action against him via Scribd copyright act.
  • Report to Adsense: Click here to report. 
  • Below are some more way to take action. 

Beauty Of The Baud: Computer Forensic Framework-PTK



"Computer forensic is a branch of digital forensic science and an act to investigate, analyze, identify and collect evidence or information which is encoded or store.
Computer forensic science is a growing field and different colleges offers variety of degree in this field, however there are different tools and tricks available to do the job done. In backtrack 5 there is a separate section for forensic tools.

Beside tools and tricks there are numerous training available on Internet.
PTK forensics is a computer forensic framework for the command line tools in the SleuthKit plus much more software modules. This makes it usable and easy to investigate a system.

PTK forensics is more than just a new graphic and highly professional interface based on Ajax and other advanced technologies; it offers numerous features such as analysis, search and management of complex digital investigation cases." source: ehacking.net

For more information click here!

Tuesday, July 12, 2011

Free Phone Calls With Your Smartphone

Tech Quote of the Day: 7/12/11

"Artificial Intelligence usually beats natural stupidity."

Beauty Of The Baud: Fast Track Hacking-Backtrack5 Tutorial


Backtrack 5 contains different tools for exploitation, as discussed before about metasploit and armitage for this article i will discuss about fast track, however I have received different request to write more tutorial for armitage, i will write for armitage too later. Fast Track is a compilation of custom developed tools that allowpenetration testers the ease of advanced penetration techniques in a relatively easy manner.

Some of these tools utilize the Metasploit framework in order to successfully create payloads, exploit systems, or interface within compromised systems.

If you are beginner and dont have any idea about vulnerability, payload and shell code than first read the article " Introduction to metasploit". 

For this tutorial i will use backtrack 5, however you can use some other version(s). 
How To Use Fast-Track For Payload Generation


There are three interface available for fast track on backtrack 5, i will show you how to generate payload by using fast track, you can use fast track web interface too for different purposes like auto-pwn. Follow the procedure.
  • Click on Applications-->Backtrack-->Exploitation tools-->Network exploitation tools-->Fast-Track-->fasttrack-interactive
  • You will get the first window that is menu windows, enter number 8 that is payload generator number.
  • On the next window will ask you about payload enter number 2 that is "Reverse_TCP Meterpreter".
  • Now we need to encode our payload so that it can easily bypass antivirus software's and IDS. I enter number 2 you can enter of your choice.
  • On the next we have to enter IP address of the victim than port number, I have scanned my local network using nmap, you can do this click here to learn nmap. Then select the type of payload either EXE or shell code.
  • Now a file name payload.exe has been created, you can get the file by going on filesystem-->pentest>exploit-->fasttrack-->payload.exe.


  • Use some social engineering technique to run this payload on the victim box than on the fast-track window start listing your payload to get the hack done. When everything is fine you will get the command window of the victim.
  • For more backtrack5 tutorial click here.