tag:blogger.com,1999:blog-60271472024-03-07T01:50:28.066-08:00Security musings (reflectorium)Unknownnoreply@blogger.comBlogger288125tag:blogger.com,1999:blog-6027147.post-26914521421218420762010-06-02T00:35:00.000-07:002010-06-02T00:36:09.343-07:00Malware analysisVery nice article<br />links to<br />wepawet<br />malzilla<br />jsunpackUnknownnoreply@blogger.comtag:blogger.com,1999:blog-6027147.post-63174882936158273122010-02-26T05:40:00.000-08:002010-02-26T05:41:35.616-08:00Overcoming problems in BT4 with apt-get install scapy2#cd /var/cache/apt/archives/<br />#dpkg --force-all -i libssh2_1.2.2-bt0_all.deb<br />#dpkg --force-all -i scapy2_2.1-bt1_all.deb<br />(as root)Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-43963233657943255442010-02-25T23:13:00.000-08:002010-02-25T23:14:01.437-08:00Web Security Dojo v1.0 releasehttp://www.webappsec.org/lists/websecurity/archive/2010-02/msg00069.html<br /><br />"For a quick start grab the VM from http://dojo.mavensecurity.com and<br />read the included Readme file and/or watch the intro video at<br />http://www.youtube.com/watch?v=lum6bSsyJ38."Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-35182088110237867142010-02-24T23:55:00.000-08:002010-02-25T23:13:07.218-08:00tweets du jourdragosr <br />Hak5 has DHCP exhaustion and DNS MITM via metasploit module vid http://bit.ly/dpRr9b (>HDMoore)<br /><br />TEDchris<br />Here's what Sergey Brin told me at #TED about Google's cyber-attack in China and "Don't Be Evil" http://on.ted.com/8A6D<br /><br />dragosr<br />good sans passthehash toolkit comparison paper http://bit.ly/cAlhmqUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-45996865604183360222010-01-07T12:55:00.001-08:002010-01-07T12:55:44.963-08:00SED one linersUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-55983901946910701792010-01-06T01:28:00.000-08:002010-01-06T01:29:21.807-08:00Analysis of Java Exploit kitUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-71255651171389457652009-11-24T08:18:00.000-08:002009-11-24T08:19:03.290-08:00Yersinia overviewUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-58452281712909505102009-11-24T08:13:00.001-08:002009-11-24T08:13:51.607-08:00Monitor sidewiki entries on whole domainsUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-65936123795399838572009-09-11T04:12:00.001-07:002009-09-11T04:12:42.706-07:00Google Chart APIUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-59240016803829941562009-09-11T02:41:00.001-07:002009-09-11T02:41:45.954-07:00Modern approaches to data vizUnknownnoreply@blogger.comtag:blogger.com,1999:blog-6027147.post-72267380007108751112009-09-09T23:51:00.001-07:002009-09-09T23:52:21.648-07:00Visualising IP Geolocation in HILBERT spaceUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-88300474856662588022009-09-09T23:50:00.001-07:002009-09-09T23:50:47.942-07:00Free geo database of all IP addressesUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-7393198043415080262009-03-09T07:27:00.000-07:002009-03-09T07:28:00.300-07:00Building Security In Maturity Modelhttp://bsi-mm.com/Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-35802946459413377802008-10-20T11:16:00.001-07:002008-10-20T11:16:34.824-07:00http://dnsbl.abuse.ch/Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-52111704945629450992008-10-17T13:17:00.001-07:002008-10-17T13:17:45.043-07:00Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-33460600509851572742008-09-26T02:26:00.000-07:002008-09-26T02:27:02.306-07:00Breakpoint Clickjacking Speculationshttp://www.breakingpointsystems.com/community/blog/clickjacking<br /><br />and of course<br />http://blogs.zdnet.com/security/?p=1973Unknownnoreply@blogger.comtag:blogger.com,1999:blog-6027147.post-25200339177988629552008-09-18T00:10:00.000-07:002008-09-18T00:13:47.609-07:00Links of the dayhttp://www.sensepost.com/research/squeeza/<br />http://www.sensepost.com/research/reDuh/<br />http://carnal0wnage.blogspot.com/2008/09/passing-hash-with-gsecdump-and-msvctl.html<br />http://carnal0wnage.blogspot.com/2008/08/owning-client-without-and-exploit.htmlUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-39692822776034699142008-09-08T23:12:00.000-07:002008-09-08T23:15:20.728-07:00WASS statisticsWASS Weba Application Security Statistics 2007 gives some really nice insights, e.g. % of type of vulnerabilty on average site *and* how likely they are detected by automated scans vs. penetration testing. Automated scans are good at finding low and medium ones. Penetration test are good at finding high findings.<br />http://packetstormsecurity.org/papers/general/wasc_wass_2007.pdfUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-3569172854473495382008-02-26T05:07:00.000-08:002008-02-26T05:08:59.240-08:00local links<a href="file://c:">file://c:</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-19925798469769393232007-12-18T23:09:00.000-08:002007-12-18T23:10:06.890-08:00Wireless Auditing Live CDRussixUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-3498125290422868452007-11-29T12:18:00.000-08:002007-11-29T12:38:28.554-08:00Automated web testing<a href="http://wwwsearch.sourceforge.net/bits/GeneralFAQ.html">http://wwwsearch.sourceforge.net/bits/GeneralFAQ.html</a><br /><br /><a href="http://www.opensourcetesting.org/functional.php">http://www.opensourcetesting.org/functional.php</a><br /><br /><br /><a href="http://pamie.sourceforge.net/">http://pamie.sourceforge.net/</a><br /><br />http://search.cpan.org/~prashant/Win32-IEAutomation-0.5/lib/Win32/IEAutomation.pm<a href="http://search.cpan.org/~prashant/Win32-IEAutomation-0.5/lib/Win32/IEAutomation.pm"></a><br /><br /><a href="http://search.cpan.org/dist/WWW-Mechanize/lib/WWW/Mechanize/Examples.pod">http://search.cpan.org/dist/WWW-Mechanize/lib/WWW/Mechanize/Examples.pod</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-58899800115135946962007-11-29T12:11:00.000-08:002007-11-29T12:12:11.806-08:00Automated web testingSelenium<br /><a href="http://www.openqa.org/selenium-rc/tutorial.html">http://www.openqa.org/selenium-rc/tutorial.html</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-41593118510335740642007-11-28T02:18:00.000-08:002007-11-28T02:19:06.644-08:00http://www.trustedsource.org/Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-9564382357467760972007-11-14T08:34:00.000-08:002007-11-14T08:35:08.000-08:00When laptop is unlocked..download and wallpaper. ;-)Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6027147.post-46646572326942648532007-10-23T06:27:00.000-07:002007-10-23T06:30:57.795-07:00Unicode Reverse Character .. for the fun of it..The mirroring character is within the braces <br /><pre>(‮‮( </pre><br /> Just copy it somewhereUnknownnoreply@blogger.com0