This document provides an overview of network security penetration testing. It defines hackers and their motivations, outlines the objectives of penetration testing which is to test vulnerabilities rather than malicious hacking. It then lists some common tools used like Metasploit, Aircrack and their purposes. It provides examples of how these tools could be used together in a flow to hack systems like wireless networks or ATM machines. It encourages learning terminology like exploits and payloads to better understand hacking. Finally, it emphasizes the importance of reading, learning and testing to become a skilled hacker rather than just asking how to hack specific sites or systems.
Ultimate Guide to Setup DarkComet with NoIPPich Pra Tna
Simply Step by Step tutorial on how to setup DarkComet RAT the free and popular Remote Administration Tool.
This software is an efficient type of software, especially created to remote control any Microsoft
Windows machine.
Ultimate Guide to Setup DarkComet with NoIPPich Pra Tna
Simply Step by Step tutorial on how to setup DarkComet RAT the free and popular Remote Administration Tool.
This software is an efficient type of software, especially created to remote control any Microsoft
Windows machine.
The field of Offensive Cyber and Penetration Testing is one of the most fascinating fields in the world of information security. This talk will go through all the steps of cyber attacking, from Information gathering to penetration techniques and actual demonstrations. The talk will cover the following topics: Introduction to cyber, Reconnaissance, Network Attacks and Penetration, Privilege Escalation, Wireless and radio attacking, Web application penetration ,Exploitation and Reverse Engineering.
Deja vu Security CEO Adam Cecchetti was invited to present the keynote speech at this year's (sold-out!) Hushcon in Seattle. Rich in humorous anecdotes and practical analysis, Test For Echo explores the relationship between time, ken, and the future of computer security.
In this slides i have mentioned some hacking tricks which are interesting to know.. You will able to know how the sites are blocked, how to get rid of them.You will also able to crack the passwords...And some useful tricks related to facebook and mobile hacking.. i hope,You will like it...But one thing ,the tricks are old...But what i think is Old is Gold. :p
B-sides Las Vegas - social network securityDamon Cortesi
A presentation I gave at the first b-sides Las Vegas security conference showing the security challenges we face going forward in the era of open-by-default social networking.
How to bypass email gateways using common payloads... Bsides Manchester 2017Neil Lines
Presented at Bsides Manchester 2017
Demo of overlooked built in functionality that can be used to bypass Cisco Ironport, Symantec email security cloud, McAfee email gateway and Clearswift email gateways
#CSA #Dehradun
XSS Video POC in Yahoo :
https://www.youtube.com/watch?v=I2WKUJn8P7I
Tapjacking bug poc in Android 6.0 Video :
https://www.youtube.com/watch?v=8BcP3Q4ZWXQ
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts: The Underrated Web-Danger
Testing and Exploiting Backup-File Artifacts with BFAC
BFAC Homepage: https://github.com/mazen160
Blog Post: http://blog.mazinahmed.net/2016/08/backup-file-artifacts.html
Pentesting? What is Pentesting? Why Pentesting?
Millions of dollars have been invested in security programs to protect critical infrastructure to prevent data breaches
The field of Offensive Cyber and Penetration Testing is one of the most fascinating fields in the world of information security. This talk will go through all the steps of cyber attacking, from Information gathering to penetration techniques and actual demonstrations. The talk will cover the following topics: Introduction to cyber, Reconnaissance, Network Attacks and Penetration, Privilege Escalation, Wireless and radio attacking, Web application penetration ,Exploitation and Reverse Engineering.
Deja vu Security CEO Adam Cecchetti was invited to present the keynote speech at this year's (sold-out!) Hushcon in Seattle. Rich in humorous anecdotes and practical analysis, Test For Echo explores the relationship between time, ken, and the future of computer security.
In this slides i have mentioned some hacking tricks which are interesting to know.. You will able to know how the sites are blocked, how to get rid of them.You will also able to crack the passwords...And some useful tricks related to facebook and mobile hacking.. i hope,You will like it...But one thing ,the tricks are old...But what i think is Old is Gold. :p
B-sides Las Vegas - social network securityDamon Cortesi
A presentation I gave at the first b-sides Las Vegas security conference showing the security challenges we face going forward in the era of open-by-default social networking.
How to bypass email gateways using common payloads... Bsides Manchester 2017Neil Lines
Presented at Bsides Manchester 2017
Demo of overlooked built in functionality that can be used to bypass Cisco Ironport, Symantec email security cloud, McAfee email gateway and Clearswift email gateways
#CSA #Dehradun
XSS Video POC in Yahoo :
https://www.youtube.com/watch?v=I2WKUJn8P7I
Tapjacking bug poc in Android 6.0 Video :
https://www.youtube.com/watch?v=8BcP3Q4ZWXQ
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts: The Underrated Web-Danger
Testing and Exploiting Backup-File Artifacts with BFAC
BFAC Homepage: https://github.com/mazen160
Blog Post: http://blog.mazinahmed.net/2016/08/backup-file-artifacts.html
Pentesting? What is Pentesting? Why Pentesting?
Millions of dollars have been invested in security programs to protect critical infrastructure to prevent data breaches
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications and a hundred identical safes with their combinations so that the world’s best safecrackers can study it and you still can’t open the safe, that’s security.
Step by Step on How to Setup DarkCometPich Pra Tna
This is a guide on how setup DarkComet RAT the free and popular Remote Administration Tool.
This software is an efficient type of software, especially created to remote control any Microsoft
Windows machine.
This is a Seminar Report on a computer security mechanism named Honeypot. In this I've included Honeypot Basics, Types, Value, Implementation, Merits & Demerits, Legal issues and Future of Honeypots.
Sistem HITeCOB - Suruhanjaya Bangunan COBKhairi Aiman
Saya Mr Hery (Khairi Aiman), Ketua Pegawai Operasi Jazman Resources. Kami menyediakan sistem pengurusan data bangunan yang digunakan oleh COB. Sistem HIT eCOB ini boleh diakses melalui pelbagai platform samada komputer atau telefon pintar. Sistem ini dibina khas untuk memenuhi keperluan pengurusan COB seperti pengurusan data bangunan, JawatanKuasa bangunan, mesyuarat, laporan tahunan, "Star Rating", notifikasi pengurusan, aduan dan lain lagi.
Overview to Data Transaction ManagementKhairi Aiman
A knowledge to manage data transaction between devices or platform and understanding needs & purposes of data transaction.
Fulfilling safeness & effectiveness of data transaction.
Xamarin.Form : Basic to Mobile DevelopmentKhairi Aiman
Xamarin is a framework that enable developers to develop multi-platfrom application. Xamarin support Native development and Form UI Renderer (PCL & Shared).
In this chapter, participants will be more approach on Xamarin.Forms (not Native Development). Xamarin.Forms make developers wokr more easier and fast. It's enable developers write in a project and automatically Android, iOS and Windows Phone app can be generated.
Overview to Xamarin : Understanding Xamarin ArchitectureKhairi Aiman
Xamarin is a framework that enable developers to develop multi-platfrom application. Xamarin support Native development and Form UI Renderer (PCL & Shared).
In this chapter, participants will be more approach on Xamarin.Forms (not Native Development). Xamarin.Forms make developers work more easier and fast. It's enable developers write in a project and automatically Android, iOS and Windows Phone app can be generated.
Xamarin.Forms enable developer to develop cross-platform application (Android, iOS and Windows Phone) in a single UI XAML Definition, a single type of C# Programming.
In other words, Xamarin.Forms enbale developer to write a project to create Android, iOS and Windows Phone App.
This chapter will be more approach in Understanding the UI Flows, Definition and Features.
C# Programing is an Object Oriented programming and it's multi-paradigm feature enable developers to develop various application project from small to large scale.
C# Programing support .NET Library and it's originally invented by Microsoft. Support in .NET Library make C# developer develop software easier.
This chapter covers Basic C#, Decision Making and Program Structure.
Meterpreter, short for The Meta-Interpreter is an advanced payload
that is included in the Metasploit Framework. Its purpose is to provide complex
and advanced features that would otherwise be tedious to implement purely
in assembly. The way that it accomplishes this is by allowing developers to
write their own extensions in the form of shared object (DLL) files that can
be uploaded and injected into a running process on a target computer after
exploitation has occurred. Meterpreter and all of the extensions that it loads
are executed entirely from memory and never touch the disk, thus allowing them
to execute under the radar of standard Anti-Virus detection.
RC4 is the most popular stream cipher in the world. It is used to protect as many as 30 percent of SSL traffic today, probably
summing up to billions of TLS connections every day.
In this paper, we revisit the Invariance Weakness – a 13-year-old vulnerability of RC4 that is based on huge classes of RC4 weak
keys, which was first published in the FMS paper in 2001. We show how this vulnerability can be used to mount several partial
plaintext recovery attacks on SSL-protected data when RC4 is the cipher of choice, recovering part of secrets such as session
cookies, passwords, and credit card numbers. This paper will describe the Invariance Weakness in detail, explain its impacts, and
recommend some mitigating actions.
by Imperva
CIA Stratergic Communication - September 2004Khairi Aiman
This report is a product of the Defense Science Board (DSB). The DSB is a Federal
Advisory Committee established to provide independent advice to the Secretary of
Defense. Statements, opinions, conclusions, and recommendations in this report do
not necessarily represent the official position of the Department of Defense.
Pengaturcaraan C++ - Permarkahan (C++ Programming - Scores)Khairi Aiman
Buku ini dibuat bagi menunjukkan penggunaan dan pengaturcaraan C++ bagi aplikasi pembahagian markah. Kertas ini juga dibuat bagi menjawab soalan pelajar Open University Malaysia (OUM) dalam bidang IT.
Pengaturcaraan C++ - Kalukulator Bulatan (C++ Programming - Circle Calculator)Khairi Aiman
Buku ini adalah manual pengaturcaraan C++ bagi membuat kalkulator Bulatan. Buku ini juga dibuat bagi memuaskan soalan daripada Open University Malaysia (OUM).
Buku ini menerangkan sebahagian kecil daripada subjek Kejuruteraan Sosial (Social Engineering) bagi bidang Godam (Hacking). Buku ini bukanlah asas SE, tetapi hanya pengetahuan am. Sebagai simulasi, situasi temat kerja dipilih bagi membantu penerangan.
This book is an example of programming code for making a shop order form in Microsoft Visual Basic (VB). If you need the compiled program, please PM me. Thank you.
Kiosk teknologi masa kini - Kajian SoalanKhairi Aiman
Dokumen ini adalah dokumen kajian mengenai mesin KIOSK. Berdasarakan dokumen, fakta kajian pemasaran dan kepentingan pemasaran telah diselitkan bagi merungkai sebuah idea mesin KIOSK yang baru,.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GridMate - End to end testing is a critical piece to ensure quality and avoid...
Hack the book Mini
1. Hery Intelligent Technology
IT Solution Center
Network Security Penetrating Testing
IT Community Malaysia (ITCom)
http://www.itcom.activeboard.com/
2. DEFINITION
In the computer security context, a hacker is someone who seeks and exploits
weaknesses in a computer system or computer network. Hackers may be
motivated by a multitude of reasons, such as profit, protest, or challenge. –
Wikipedia.
In other words, hacker is someone that able to make a hole at a security wall. The
hole is any vulnerable of a host/server/computer. From the hole, hacker could
inject a script to exploit the victim.
3. OBJECTIVES
The main objectives of this slide is not going to tell you the very basic of hacking. In
this slide I am not talking abut, What is Black Hat, White Hat, Blue Hat, Grey Hat
or white hack of any hat of hacker. This is because, for me, if you know perfectly
about the “hat”, you are still not a hacker.
In a simple word, to be a hacker, you need knowledge about what script do, how the
exploit work, why must use the payloads, what is the best OS to hack and the next
hack of hack.
Actually, this book is not show you “How to be a hacker”, because this slide I made it
is not for the “Very Stupid Newbies” and also not for the “The Best Fuc*king Shit
Master of Hacker”. The aim reader of this slides is for the intermediate, newbies,
researcher, network security,, computer company, network developer, and more.
This is because, this slides will touch a bit about basic hacking to support definition of
hack, this slide will discuss about ideas of hacking and bit about social
engineering.
4. TOOL’S LIST
When the process of hacking take place, then the thing that very important is OS.
What is OS? OS is Operating System. Example of OS is Windows XP, Vista, 7.
Windows is provided by Microsoft. There is another OS that provided by different
company such as Linux. In Linux, there is OS Ubuntu, Red Hat, Opera and more.
In this case of hacking, we will differentiate Apple OS. Because Apple OS we will
go thru accurately for the next slides. (Also for Android OS/Phone OS).
The most popular OS in hacking world is Backtrack from Linux and Windows XP from
Microsoft. Backtrack OS, there is many version. There is Backtrack 2,3,4,5. The
latest is Backtrack 5 R3. But, nowadays, Backtrack is new OS of hacking in Linux,
because the newest is Kali Linux 1.0.6 like that. The Kali Linux (KL) or Backtrack
(BT) is different with the Windows XP. Windows XP is not built-to-hack like BT and
KL. Hence, the KL and BT is a free OS that everyone can download from their
website, but Windows XP is not a free OS. Windows XP is built-to-use. It is mean,
or the Documentation work, graphic or anything else. It is very flexible to use
compare to BT and KL is not to flexible.
5. TOOL’S LIST
But, these two OS, there is the most very important thing that they are the same, it is
these two OS is VULNERABLE. In other words, it could be hacked. That’s why
these two OS can be use to hack.
The tools most popular to use is on the list:
Tools
Uses
OS
Metasploit / armitage (Graphical)
General Hacking Tools
BT/Win
Havij / SQLMap
Website Hacking
BT/Win
Aircrack
Wifi Hacking
BT/Win
Cisco Firewall
Firewall PenTest
BT
Ettercap / Wireshark / Cain&Abel
Sniffing
BT/Win
6. TOOL’S LIST
The list is not complete. But that is the most best tools. Besides that, to support that
tools, there is some tools are need to let the tools above running well.
The tools are:
Tools
Uses
OS
Zenmap / Netcat
Scanner
BT/Win
MD5 HASH
Decrypter
BT/Win/Webs
These tools are free tools and can get from the any hacker’s website.
7. TOOL’S LIST
This is the flow how’s the tools work up:
Aircrack
The Aircrack will crack Wifi,
then Zenmap scan IP,
use firewall shutter to
penetrate firewall,
Metasploit try to
penetrate, send exploit
to collect data and
crash system, use
ettercap to collect
cookies password.
Web Browser
Success
Hacked!
Metasploit
Firewall
(Cannot
Defeated)
Exploit &
Payload
Firewall Down
Ettercap
Hack
Data
Receive
Password
Receive
Zenmap
Remote
Control
Havij/
SQLMap
Uploading
Shell
Finding URL, test vulnerability, vulnerable
detected, decrypt hash, login to webs,
upload a shell and access the data.
Vulnerable
Decrypt Hash
Logged In
Password
Found
8. WHY SHOULD…?
We must know about the terminology. It is because, when we know the actual
definition of the term in hacking, then we can adapt something to be something
uses. The example I will count it after this.
The word that are important to know is ”Exploit”. Exploit is a “specialized” small
programs that could that advantages and deliver a payload, which will grant
attacker the control. Metasploit is a great tool that has a vast number of exploits.
Payload is delivered by exploit and is used to control the remote system. Think of it
this way.
“Exploit is like terrorist that is carrying a bomb in his backpack. He enters the
system and leaves his backpack there. Most popular and widely known payload is
“meterpreter”, that has a lot of features. With it you can browse remote files,
download them, upload your own, capture keystrokes and more. Through
meterpreter, you can pivot and attack machines in networks that are not your
own”
9. SOMETHING TO BE SOMETHING
I will give you two options. If you are a newbie, maybe you feel like you want to try. If
you are a intermediate hacker, you will see how we can adapt the Thins to be
Something more good.
#First: Hacking ATM Bank.
When you are understand the flow above, then you will how is this work.
“At the evening, you and your friends do to McDonald to buy something to eat.
Then you bring your laptop. Behind the McD, there is a Bank. When you turn on
your laptop, the Bank’s Wifi signal is detected. Then you crack the wifi, try to
penetrate the firewall the you re being a remote control of the computer. Then you
are using Zenmap to find the IP of the ATM machines, you found it, then you crack
the Firewall and you re successfully. Upload the payload and exploit. Now, you are
controlling the ATM Machines” – Actually, ATM machine are using Windows 2000
and oldest. This is mean, the OS of the ATM machine is easy to hack.
10. SOMETHING TO BE SOMETHING
#Second: Hacking as a work.
If you re noticed, when you re running BT, the sniffer is not work to the external
network. The sniffer just work on your internal network. Social-Engineering-Toolkit
(SET) also the same. Do you ever think that XAMPP and WAMP server is not work
for external network but just work for internal network? So, how to make XAMPP
and WAMP server work for external network (Globally)? The answer is registered
your computer as a domain. Then people can connect to you.
This is the same way:
“You register your network as a Linux domain server, then running BT or KL. Then,
your sniffer will work people globally. Then, promote your self to social network as
a hired hacker. If someone need to hack, they must pay you. When they paying
you, then you have to sniff the victim, get their password and sell it to “Needers”. The same thing for using Msf and SET.
11. SOMETHING TO BE SOMETHING
The conclusion for this section is, you must be creative. You have to think what you
need to do. What you need something to do the do. If you keep trying and trying
and trying, you can make the hack with your own way.
The computer is following you command, we made it, it is mean we can crack it! This
note is note for bad purpose, even it is, but I just make it for researcher network
security.
12. LAST WORDS
These note are very important. I made these slide with to many words because I want
to let all people know, to be a hacker is not only asking people with the stupid
question ; “How to hack facebook?” , “please tell me how to hack”. This stupid
question will not help you. You must READ, LEARN, TEST, BE BRAVE, then you will
have it.
These note have been created by the Moderator Of Network in IT Community
Malaysia. – Http://www.itcom.activeboard.com/ . This website forum is
vulnerable, but, please do not hack it. Because there is nothing important to
hack. If you need something, just need to register and ask as many question you
want.
Lastly, I’ve made mistakes. I am a normal human, human will make mistakes. So, if
you feel I am wrong, then just ask me, I will change it and discuss about it. I also
beg apologize for my bad English Spelling, Grammar, Grandpa, Grander and so
what the Hack Grand so on.
Thank you,
Call Me If You In Trouble,
I am Sharper.
Hery Intelligent Technology
IT Solution Center
Network Security Penetrating Testing
IT Community Malaysia (ITCom)
http://www.itcom.activeboard.com/