
blog.opensecurityresearch.com
Open Security ResearchSponsored by <a href="http://www.foundstone.com">Foundstone</a>
http://blog.opensecurityresearch.com/
Sponsored by <a href="http://www.foundstone.com">Foundstone</a>
http://blog.opensecurityresearch.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Wednesday
LOAD TIME
2.2 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
19
SSL
EXTERNAL LINKS
137
SITE IP
172.217.6.83
LOAD TIME
2.234 sec
SCORE
6.2
Open Security Research | blog.opensecurityresearch.com Reviews
https://blog.opensecurityresearch.com
Sponsored by <a href="http://www.foundstone.com">Foundstone</a>
Open Security Research: Windows DLL Injection Basics
http://blog.opensecurityresearch.com/2013/01/windows-dll-injection-basics.html
Tuesday, January 8, 2013. Windows DLL Injection Basics. DLL Injection is one of those things I've always sort of knew about but never actually implemented. Probably because I never *really* needed to. I'm not a big gamer and not really into the malware side of security. Actually, the only times I ever need to inject into a running process is during exploitation/post exploitation and Metasploit has spoiled me too much :). The Windows API actually offers a number of functions that allow us to attach and ma...
Open Security Research: Writing Slack Space on Windows
http://blog.opensecurityresearch.com/2014/07/writing-slack-space-on-windows.html
Tuesday, July 8, 2014. Writing Slack Space on Windows. I’m a Foundstone intern in NYC office and for a project I decided to write a tool to remove file slack space. In this post I’ll introduce the methods I took in writing the tool then provide the tool itself. Hope you enjoy it! File Slack Space is the amount of unused space at the end of a file’s last cluster. File systems organize file data through an allocation unit called clusters. Clusters. Download my tool here:. Moving the File Pointer. 0) return...
Open Security Research: September 2014
http://blog.opensecurityresearch.com/2014_09_01_archive.html
Tuesday, September 16, 2014. Hostapd-wpe: Now with More Pwnage! A major component of hacking IEEE 802.11. Wireless networks is targeting the client's system. This is because of the trusting nature of wireless and corporate systems can be tricky to configure correctly. But don't forget that the same client-side attacks against 802.11 wireless networks can be used on wired networks with port security when the attacker has physical access to a workstation or access switch. hostapd-wpe. An opportunity to att...
Open Security Research: My Cousin VIMmy: A Journey Into the Power of VIM
http://blog.opensecurityresearch.com/2014/08/my-cousin-vimmy-journey-into-power-of.html
Tuesday, August 26, 2014. My Cousin VIMmy: A Journey Into the Power of VIM. By Melissa Augustine Goldsmith. I was cleaning up some YARA rules we have in the office. I am, if anything, a bit. OCD about tabs and spacing. I came across this rule from Contagio Exploit pack. So I thought. could vim do the heavy lifting for me. Oh but it is so much more! To the linux machine! There are a ton of awesome commands with VIM, but I am going to focus on the ones I used to solve my issues. Run the substitute command ...
Open Security Research: Deconstructing a Credit Card's Data
http://blog.opensecurityresearch.com/2012/02/deconstructing-credit-cards-data.html
Tuesday, February 21, 2012. Deconstructing a Credit Card's Data. Modern credit cards in the United States have three interfaces:. This obviously varies from bank to bank and card manufacturer to card manufacturer. The purpose of this post is to evaluate all three interfaces of the card and see how they differ. Note that some data has been changed to protect the card holder's (my) information. From a physical perspective, your card should have four main attributes:. That verifies that the card number was ...
TOTAL PAGES IN THIS WEBSITE
19
Forensics | | Ismael Valenzuela - Passionate about Information Security
http://blog.ismaelvalenzuela.com/tag/forensics
Passionate about Information Security. Papers & Presentations. Welcome to my site. Thanks for stopping by! My name is Ismael Valenzuela, a passionate Infosec professional at day, and an IT Security geek at night. When I am not doing consultancy, security research, presenting, teaching or writing reports, I try to find some time to post my thoughts on security, computer science and technology on this blog site. I collaborate regularly with other popular blogs like the Open Security Research. Page A link t...
Windows Incident Response: Books
http://windowsir.blogspot.com/p/books.html
The Windows Incident Response Blog is dedicated to the myriad information surrounding and inherent to the topics of IR and digital analysis of Windows systems. This blog provides information in support of my books; "Windows Forensic Analysis" (1st thru 4th editions), "Windows Registry Forensics", as well as the book I co-authored with Cory Altheide, "Digital Forensics with Open Source Tools". Windows Forensics and Incident Recovery. Windows Forensic Analysis ( 1/e. Perl Scripting for Windows Security.
Android | Ismael Valenzuela - Passionate about Information Security
http://blog.ismaelvalenzuela.com/category/android
Passionate about Information Security. Papers & Presentations. Welcome to my site. Thanks for stopping by! My name is Ismael Valenzuela, a passionate Infosec professional at day, and an IT Security geek at night. When I am not doing consultancy, security research, presenting, teaching or writing reports, I try to find some time to post my thoughts on security, computer science and technology on this blog site. I collaborate regularly with other popular blogs like the Open Security Research. If you spot a...
Papers & Presentations | Ismael Valenzuela - Passionate about Information Security
http://blog.ismaelvalenzuela.com/papers-presentations
Passionate about Information Security. Papers & Presentations. Welcome to my site. Thanks for stopping by! My name is Ismael Valenzuela, a passionate Infosec professional at day, and an IT Security geek at night. When I am not doing consultancy, security research, presenting, teaching or writing reports, I try to find some time to post my thoughts on security, computer science and technology on this blog site. I collaborate regularly with other popular blogs like the Open Security Research. I can’t...
Deva [ Me , Myself & InfoSec]: GiTS CTF 2014 Quals writeups collection
http://devpsc.blogspot.com/2014/01/gits-ctf-2014-quals-writeups-collection.html
Deva [ Me , Myself and InfoSec]. A place of my own for sharing my thoughts! Monday, January 27, 2014. GiTS CTF 2014 Quals writeups collection. Http:/ commandlinewani.blogspot.in/2014/01/ghostintheshellcode-write-up-lugkist.html. Http:/ digitaloperatives.blogspot.in/2014/01/ghost-in-shellcode-2014-trivia-150.html. Http:/ digitaloperatives.blogspot.in/2014/01/ghost-in-shellcode-2014-crypto-75.html. Http:/ commandlinewani.blogspot.in/2014/01/ghostintheshellcode-write-up-dogecrypt.html. Long live the queen.
Papers & Presentations | Ismael Valenzuela - Passionate about Information Security
http://blog.ismaelvalenzuela.com/category/papers-presentations
Passionate about Information Security. Papers & Presentations. Welcome to my site. Thanks for stopping by! My name is Ismael Valenzuela, a passionate Infosec professional at day, and an IT Security geek at night. When I am not doing consultancy, security research, presenting, teaching or writing reports, I try to find some time to post my thoughts on security, computer science and technology on this blog site. I collaborate regularly with other popular blogs like the Open Security Research. Presented at ...
Malware | Ismael Valenzuela - Passionate about Information Security
http://blog.ismaelvalenzuela.com/category/malware
Passionate about Information Security. Papers & Presentations. Welcome to my site. Thanks for stopping by! My name is Ismael Valenzuela, a passionate Infosec professional at day, and an IT Security geek at night. When I am not doing consultancy, security research, presenting, teaching or writing reports, I try to find some time to post my thoughts on security, computer science and technology on this blog site. I collaborate regularly with other popular blogs like the Open Security Research. Page A link t...
SANS | Ismael Valenzuela - Passionate about Information Security
http://blog.ismaelvalenzuela.com/category/sans
Passionate about Information Security. Papers & Presentations. Welcome to my site. Thanks for stopping by! My name is Ismael Valenzuela, a passionate Infosec professional at day, and an IT Security geek at night. When I am not doing consultancy, security research, presenting, teaching or writing reports, I try to find some time to post my thoughts on security, computer science and technology on this blog site. I collaborate regularly with other popular blogs like the Open Security Research. Page A link t...
Network Security Monitoring | Ismael Valenzuela - Passionate about Information Security
http://blog.ismaelvalenzuela.com/category/network-security-monitoring
Passionate about Information Security. Papers & Presentations. Welcome to my site. Thanks for stopping by! My name is Ismael Valenzuela, a passionate Infosec professional at day, and an IT Security geek at night. When I am not doing consultancy, security research, presenting, teaching or writing reports, I try to find some time to post my thoughts on security, computer science and technology on this blog site. I collaborate regularly with other popular blogs like the Open Security Research. Presented at ...
TOTAL LINKS TO THIS WEBSITE
137
OpenROV
Driving an OpenROV from a Submarine with Sylvia Earle! ROV finds gun in lake. Giant Purple Sea Slugs Spotted in Oakland. ROS Integration with OpenROV. The Future of Underwater Drones.
馬渡松子オフィシャルブログ - 私的、限りある日常
第6回アニコネ グランプリ受賞の 桑 さんの. 責める ではなく Follow しながら. Posted by 馬渡松子 at 21:42 Comment 1. Posted by 馬渡松子 at 20:36 Comment 0. 7/28 地場night 都城 道の駅. Posted by 馬渡松子 at 17:37 Comment 1. ネクタイ on the beat. Break a theory 縁. 7/28 地場night 都城 道の駅. By しれん 2018.03.16. By 大阪ys 2018.01.06. 7/28 地場night 都城 道の駅. By 川野あゆみ 2017.09.25. By じゅんきん28歳 2017.07.27. By ミラ 2017.07.13. By 羊飼い 2017.07.04. By ジュディー 2017.06.27. By ミラ 2017.06.26. By 大阪YS 2017.06.25. By kodan 2017.06.24.
Open San Diego Blog
We make data about San Diego freely available for anyone to use. This is our blog. Follow us on Twitter. Join our Google group. Wanted: Chief Data Officer for America’s Finest City. Apply here: ow.ly/yXJOU. July 10, 2014 at 10:34 am. In support of the city of San Diego’s progress towards implementing an open data policy. Http:/ opensandiego.org/docs/Open-Data-Policy-Support-Letter.pdf. June 28, 2014 at 5:00 am. What I think is special about this particular treemap is the labeling. Maybe people insert...
Latest Posts – Open Science Info Blog
Open Science Info Blog. Visualize PLoS ALM with Google Charts and Fusion Tables. December 08, 2014. Learn to filter, sort, and visualize Article Level Metrics with Google Fusion Tables and Google Charts. All scientific journal articles published by the Public Library of Science (PLoS) have Article Level Metrics (ALM) collected about them. These metrics include citation counts, web views, online bookmarks, and more. The metrics are available through a variety of sources. Including a bulk CSV file. Visuali...
OpenSDE
The Open System Development Environment. Sunday, 4 March 2007. Version WordPress 2.1.1 is dangerous! For those in blogosphere who use Wordpress, read further and please upgrade! Mood: RCHP and Snow/ Hey Oooohhhhhh (:. Nicola Conte - Time for Spring. Posted by Girl Talks. Friday, 2 March 2007. GNU/Linux and free software event and UBUNTU INSTALL SHOW. This weekend, Sunday - March 4th, in Belgrade is great event - Ubuntu Intall show with following programme you can find on this web site. Did you noticed th...
Open Security Research
Tuesday, November 4, 2014. A Brief Overview of the Google Authenticator. Many application providers are considering implementing a more robust login mechanism to their applications as single layer authentication is no longer considered a secure approach. The trend is to add an additional authentication layer after main login surface. It could be anything like OTP based (text message), secondary authentication questions, voice calls etc. Google Authenticator uses two type of algorithm for generating OTPs&...
A2ZServer
Opensewer
Something banal this way comes. Monday, September 15. Imagine two astronauts go to the moon, and while they're there, there's an accident and their ship can't take them back to Earth. They have only enough oxygen for two days. There is no hope of someone coming from Earth to rescue them. They have only two days to live. If you were to ask them at that moment, "What is your deepest wish? Posted by Jason Carroll. Thursday, July 10. Do what you will, but speak out always. Posted by Jason Carroll. I stand in...
OpenSheffield | News and information from the data community in Sheffield city region. Produced by The Better With Data Society / ODI Sheffield.
Open Data Sheffield 16 February 2015. February 11, 2015. At this month’s Open Data Sheffield meetup. We’ll be focusing on the question of whether we have the right educational pathways for better data literacy and science? We will look at the plans for the new vocational college in Sheffield (UTC2) focusing on Human Sciences and Applied Computing, and discuss the opportunities and issues this presents around open data and data science. Or keep us guessing and just turn up). February 11, 2015. In March 20...
Technology Blogger - Be free to share your experience, Make our own way to new comers...
Be free to share your experience, Make our own way to new comers…. How to Install Cassandra on Ubuntu. Steps to install cassandra on Ubuntu: 1) First check which version of Java is installed by running the following command in a terminal (Oracle JRE is recommended), java -version 2) Install curl using the following command sudo apt-get install curl 3) Add the DataStax Community repository to the aptitude repository source list file (/etc/apt/sources.list). sudo …. YII Command tool not working. Step1: Dow...
OpenShift Blog
Learn about Red Hat's next-generation cloud application platform. Our Customers Discover what companies are using OpenShift to deliver a flexible, scalable cloud applicaiton environtment. Awards Industry recognition and awards. OpenShift Blog Keep your finger on the pulse of all things OpenShift. Events OpenShift sponsors and attends a variety of in-person events around the globe. In the Press The latest OpenShift news and press releases. Sign up for Free. Try it for Free. Application Gallery Our showcas...
SOCIAL ENGAGEMENT