Audit de Securitate IT cu Buscador OS

Autor: John Cohen

Buscador OS este o mașină virtuală creata in Linux si preconfigurată pentru anchetatori online. A fost dezvoltat de David Westcott și Michael Bazzell, iar distribuțiile sunt menținute pe această pagină. Construcția actuală este de 3,5 GB și include următoarele resurse: 1. Custom Firefox Install and Add-Ons 2. Custom Chrome Install and Extensions 3. Tor Browser 4. Custom Video Manipulation Utilities 5. Custom Video Download Utility 6. Recon-NG 7. Maltego 8. Creepy 9. Metagoofil 10. MediaInfo 11. ExifTool 12. Spiderfoot 13. Google Earth Pro 14. Metadata Anylisation Toolkit 15. EyeWitness 16. EmailHarvester 17. theHarvester 18. HTTrack Cloner 19. Aquatone 20. Knock Pages 21. Sublist3r 22. Twitter Exporter 23. Tinfoleak 24. InstaLooter 25. BleachBit 26. VeraCrypt 27. KeePassXC 28. LibreOffice 29. VLC 30. PDF Viewer Buscador OS este un tool foarte bun pentru munca de investigare online, fiindca te ajuta sa ramai anonim in timpul investigatiei. Addon-urile instalate in fiecare tool, te ajuta astfel incat sa nu fii usor de gasit. Feicare browser de exemplu salveaza o parte din datele tale precum MAC ID, IP si alte detalii, iar acest sistem de operare a fost creat tocmai pentru a impiedica acest lucru si a ramane evident anonim. In exemplul meu am folosit doua tool-uri Metagofil si EyeWitness pentru a face un mic audit IT site-ului nostru si pentru a vedea daca sunt scurgeri de informatii in exterior. <br><br> <h4 class="text-center">Metagoofil</h4> <br><br> Metagoofil este un instrument de colectare a informațiilor conceput pentru extragerea metadatelor documentelor publice (pdf, doc, xls, ppt, docx, pptx, xlsx) aparținând unei companii vizate. Metagoofil va efectua o căutare în Google pentru a identifica și descărca documentele pe discul local și apoi va extrage metadatele cu diferite biblioteci cum ar fi Hachoir, PdfMiner? si altii. Cu rezultatele obtinute va genera un raport cu nume de utilizator, versiuni software și servere sau nume de mașini care vor ajuta testerele de penetrare în faza de colectare a informațiilor. In cazul meu nu a gasit niciun document, ceea ce ne arata ca site-ul nostru e sigur. Sursă: Metagoofil Pagina de start | Kali Metagoofil Repo Autor: Christian Martorella Licență: GPLv2 <br><br> <h4 class="text-center"> EyeWitness</h4> <br><br> EyeWitness este conceput pentru a captura imagini de pe site-uri web, servicii RDP și servere VNC deschise, astfel incat să furnizeze informații despre antetul serverului și să identifice acreditările implicite, dacă este posibil. EyeWitness este conceput pentru a rula pe Kali Linux. Acesta va detecta automat fișierul pe care-l dați cu `-f` fie ca fiind un fișier text cu adrese URL pe fiecare linie nouă, ieșire `nmap xml` sau `nessus xml`. Optiunea `-timeout` este complet opționala și vă oferă posibilitatea de a aștepta maxim până când încercați să redați și să capturați o pagină web. Un ghid complet de utilizare care documentează caracteristicile EyeWitness și cazurile tipice de utilizare este disponibil aici - Cele doua tooluri sunt foarte importante, deoarece te ajuta sa evaluezi un status quo asupra site-ului de interes si eventual sa gasesti anumite brese de securitate. <br><br> <div class="embed-responsive embed-responsive-16by9"> <iframe class="embed-responsive-item" src="" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>> </div>

Ilfov, Romania
Telefon: 0771.060.860.    
Email: [email protected]

#detectivparticular #pi #romania #bucuresti #investigatii #it #cybersecurity #detectiv #detectivi #politia #police #inselaciuni #verificari #siguranta #incredere #iubit #iubita #iubire #security #homeprotection #protection #tscm #facialrecognition #recunoasterefaciala #soft #phishing #scams #chatboot #pi #robot #malitious #html #car #carrecognition #bucharest #bucuresti #nato #wearenato #heroku #development #nato #security #cybersecurity #wireless #pentestings #penetrationtesting #personrecognition #indivizi #recunoasterepersoane #video #searex #privatesearch #internet

Pictures Copyright Pozele acestui articol au fost luate de pe site-ul, site care ofera gratis spre uz personal si comercial aceste poze. --- [All photos on Pexels can be used for free for commercial and noncommercial use](


Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and Our Company will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

This site contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this site, then GO OUT OF HERE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only! Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions. Neither the creator nor Our Company is responsible for the comments posted on this website.

Any linked sites are not under the control of author or Our Company and the author or Our Company is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. We are providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by us.

In any site as large as ours that deals with so many controversial topics and skills, it has become necessary to address a few incidents and implement a user terms and services agreement. We want to provide a free, safe and legal training environment to the users of this site.

Our Aim

Our Company : This website will help you gain entry into the minds of seasoned computer criminals, so that you can forestall their attempts and you will be hence well equipped to detect the ways in which hackers can infiltrate your system.

Your usage of this website constitutes your agreement to the following terms.

  1. All the information provided on this site are for educational purposes only. The site is no way responsible for any misuse of the information.
  2. Our Company is a site related to Private Investigation and not a site that promotes hacking /cracking / software piracy.
  3. This site is totally meant for providing information on "Private Investigation", “Computer Security”, “Computer Programming” and other related topics and is no way related towards the terms “CRACKING” or“HACKING” (Unethical).
  4. Few articles (posts) on this site may contain the information related to “Hacking Passwords” or“Hacking Email Accounts” (Or Similar terms). These are not the GUIDES of Hacking. They only provide information about the legal ways of retrieving the passwords. You shall not misuse the information to gain unauthorised access. However you may try out these hacks on your own computer at your own risk. Performing these attempts (without permission) on computers that you do not own is illegal.
  5. The virus creation section on this site provides demonstration on coding simple viruses using high level programming languages. These viruses are simple ones and cause no serious damage to the computer. However we strongly insist that these information shall only be used to expand programming knowledge and not for causing malicious attacks.
  6. All the information on this site are meant for developing Defense attitude among the users and help preventing the hack attacks. Our Company insists that these information shall not be used for causing any kind of damage directly or indirectly. However you may try these codes on your own computer at your own risk.
  7. The word “Hack” or “Hacking” that is used on this site shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively.
  8. We believe only in White Hat Hacking. On the other hand we condemn Black Hat Hacking.
  9. Some of the tricks provided by us may no longer work due to fixture in the bugs that enabled the exploits. We are not responsible for any direct or indirect damage caused due to the usage of the hacks provided on this site.
  10. We reserve the right to modify the Disclaimer at any time without notice.
  11. We are not the vendors of any products (software, books etc.) that we recommend on our website in the PRODUCTS section and other selected posts/articles. Hence we do not have any liability related to the products recommend by us. It is the responsibility of the buyers to contact the respective vendors for any queries related to the products.