
netsecuritystuff.wordpress.com
netsecuritystuff | comp stuff, mostly – Charles Watathicomp stuff, mostly - Charles Watathi
http://netsecuritystuff.wordpress.com/
comp stuff, mostly - Charles Watathi
http://netsecuritystuff.wordpress.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Tuesday
LOAD TIME
0.2 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
19
SSL
EXTERNAL LINKS
26
SITE IP
192.0.78.12
LOAD TIME
0.234 sec
SCORE
6.2
netsecuritystuff | comp stuff, mostly – Charles Watathi | netsecuritystuff.wordpress.com Reviews
https://netsecuritystuff.wordpress.com
comp stuff, mostly - Charles Watathi
August | 2012 | netsecuritystuff
https://netsecuritystuff.wordpress.com/2012/08
Comp stuff, mostly – Charles Watathi. Monthly Archives: August 2012. Into infinity I go. August 1, 2012. So a buddy of mine, comodo(ty) decided to bring in one of these little cool babies to town. I can only say it is awesome. GSM(openbsc hahaha), RFID, Wireless here I come. Managed to get her to “talk to me”. … Continue reading →. Pentesting on the Samsung Galaxy? Installing Virtualbox on Kali Linux. Into infinity I go. Cool stuff from HFC. Backtrack 5 kernel whoops! Blog at WordPress.com.
March | 2011 | netsecuritystuff
https://netsecuritystuff.wordpress.com/2011/03
Comp stuff, mostly – Charles Watathi. Monthly Archives: March 2011. Creepy……………. March 31, 2011. Last year at Dojocon, Dave Marcus gave a really awesome talk about Using Social Networks To Profile, Find and 0wn Your Victims. During the video, he was able to track a person from twitter geodata a person using loic to … Continue reading →. March 28, 2011. Pentesting on the Samsung Galaxy? Installing Virtualbox on Kali Linux. Into infinity I go. Cool stuff from HFC. Backtrack 5 kernel whoops!
Cool stuff from HFC | netsecuritystuff
https://netsecuritystuff.wordpress.com/2012/07/31/cool-stuff-from-hfc
Comp stuff, mostly – Charles Watathi. Backtrack 5 kernel whoops! Into infinity I go →. Cool stuff from HFC. July 31, 2012. Recently i decided to pass by my friend Johnny to see how he is doing. He always gives me some cool security gear. Thanks Johnny. Jasager; to pwn all the wifi probes around. HFC stickers to spread the word around. Notice the cool shmoocon badge somewhere in there. Try harder from Offsec. This went straight to my laptop. This entry was posted in Uncategorized. Into infinity I go →.
Into infinity I go | netsecuritystuff
https://netsecuritystuff.wordpress.com/2012/08/01/into-infinity-i-go
Comp stuff, mostly – Charles Watathi. Cool stuff from HFC. Installing Virtualbox on Kali Linux →. Into infinity I go. August 1, 2012. So a buddy of mine, comodo(ty) decided to bring in one of these little cool babies to town. I can only say it is awesome. GSM(openbsc hahaha), RFID, Wireless here I come. Managed to get her to “talk to me”. Root@bt:/home/chalo/Desktop/usrp# uhd usrp probe. Linux; GNU C version 4.4.3; Boost 104000; UHD 003.004.002-188-unstable. 8212; Opening a USRP2/N-Series device…. Instal...
netsecuritystuff | comp stuff, mostly – Charles Watathi | Page 2
https://netsecuritystuff.wordpress.com/page/2
Comp stuff, mostly – Charles Watathi. Newer posts →. To pwn with pwnimage or not to on the nokia n900. July 7, 2011. Pwineexpress has just released the pwnimage for the nokian900 to the community. http:/ www.pwnieexpress.com/pwn phone.html. Reasons for the pwnimage. There is a licence agreement that you cannot reverse engineer the software etc which is a little peculiar because most of these software is under gnu or bsd licence. Several projects have come up such as Neopwn which was a little hypped up bu...
TOTAL PAGES IN THIS WEBSITE
19
Infosec Kenya: February 2015
http://infoseckenya.blogspot.com/2015_02_01_archive.html
My take on security, tutorials and research. Monday, February 9, 2015. Subscribe to: Posts (Atom). AUTO - MIGRATE A METERPRETER SESSION. The process used to gain access to a remote system may not always be stable and may crash locking you out of the system. You could always mi. REVERSE ENGINEERING ANDROID APPS. Having covered the security implications of being able to access data directory of android apps as root and what you information you can get. ANDROID HEAP DUMPS – A SECURITY PERSPECTIVE. One of th...
Infosec Kenya: HUAWEI IDEOS (Android OS)
http://infoseckenya.blogspot.com/2011/03/huawei-ideos-android-os.html
My take on security, tutorials and research. Wednesday, March 30, 2011. HUAWEI IDEOS (Android OS). I have been playing around with the Huawei IDEOS android phone, more so in terms of infosec and just like Charles let the pictures do the talking for this Nokia N90 series here. I will also do the same. Overlook fing network scan results. Overlook fing service scan on a particular host on a network. Overlookfing service scan results. Am waiting for an android metasploit. May 15, 2011 at 9:59 PM. The process...
Infosec Kenya: ANDROID HEAP DUMPS – A SECURITY PERSPECTIVE
http://infoseckenya.blogspot.com/2011/05/heap-dumps-security-perspective.html
My take on security, tutorials and research. Tuesday, May 17, 2011. ANDROID HEAP DUMPS – A SECURITY PERSPECTIVE. This blog is kind of a flip of that, can a security researcher find any use for heap dumps? To answer this question, I set out to find out how to generate heap dumps on android and analyze them to find out what interesting information I could find. To generate a dump file on android, you have to be SU i.e. the device has to be rooted. Type the following command on the SU command line:. C: cd p...
Infosec Kenya: SSLSTRIP
http://infoseckenya.blogspot.com/2011/03/sslstrip.html
My take on security, tutorials and research. Tuesday, March 1, 2011. One of the cool attacks that completely evades ssl is sslstrip. Conjured up by a hacker named moxie (http:/ www.thoughtcrime.org/software/sslstrip/) this attack can be used to capture passwords once the perimeter network defenses have been punched through. Linux backtrack distro currently v.4 r.2 (). Ip address of the target. Default router of the target. Which by default in sslstrip.py is 10000. Start arp spoofing using the command.
Infosec Kenya: ANDROID DEVICES VULNERABILITY.
http://infoseckenya.blogspot.com/2011/03/android-devices-vulnerability.html
My take on security, tutorials and research. Monday, March 14, 2011. Thomas cannon discovered a vulnerability in Android devices operating system http:/ thomascannon.net/blog/2010/11/android-data-stealing-vulnerability/. This vulnerability allows an attacker to obtain the contents of a file when a user browses to a web server that has been compromised. He passed on this info as any responsible hacker should and Google who have promised to fix this hole in the upcoming Android 2.3. From the metasploit team.
Infosec Kenya: KIST TECT TALK
http://infoseckenya.blogspot.com/2015/02/kist-tect-talk.html
My take on security, tutorials and research. Monday, February 9, 2015. Subscribe to: Post Comments (Atom). AUTO - MIGRATE A METERPRETER SESSION. The process used to gain access to a remote system may not always be stable and may crash locking you out of the system. You could always mi. REVERSE ENGINEERING ANDROID APPS. Having covered the security implications of being able to access data directory of android apps as root and what you information you can get. PASS THE HASH ATTACK. HUAWEI IDEOS (Android OS).
Infosec Kenya: May 2013
http://infoseckenya.blogspot.com/2013_05_01_archive.html
My take on security, tutorials and research. Wednesday, May 8, 2013. Trip down memory lane). While looking around for qemu images, I came across one for the linux kernel 0.11 and simply had to try it. Http:/ oldlinux.org/Linux.old/qemu-images/Linux-0.00-041217.vfd.gz. To run the qemu image run. Qemu -L pc-bios -hda linux-0.11-devel-060625.qcow2 (Ctrl Alt f) takes you into full screen. Subscribe to: Posts (Atom). AUTO - MIGRATE A METERPRETER SESSION. REVERSE ENGINEERING ANDROID APPS. PASS THE HASH ATTACK.
Infosec Kenya: AUTO - MIGRATE A METERPRETER SESSION
http://infoseckenya.blogspot.com/2011/03/auto-migrate-meterpreter-session.html
My take on security, tutorials and research. Wednesday, March 9, 2011. AUTO - MIGRATE A METERPRETER SESSION. The process used to gain access to a remote system may not always be stable and may crash locking you out of the system. You could always migrate to a new process using the migrate script, but the sometimes you may not be fast enough to migrate manually. In comes the autorun script which allows you to specify a more stable process to migrate to once the system has been exploited. My wireshark adve...
TOTAL LINKS TO THIS WEBSITE
26
My Site
This is my site description. A website created by GoDaddy’s Website Builder.
Price Request - BuyDomains
Url=' escape(document.location.href) , 'Chat367233609785093432', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=640,height=500');return false;". Need a price instantly? Just give us a call. Toll Free in the U.S. We can give you the price over the phone, help you with the purchase process, and answer any questions. Get a price in less than 24 hours. Fill out the form below. One of our domain experts will have a price to you within 24 business hours. United States of America.
Charles Watathi ---- comps stuff, mostly
Charles Watathi - - comps stuff, mostly. Friday, May 27, 2011. The blog has moved to http:/ netsecuritystuff.wordpress.com/. Tuesday, February 15, 2011. I have written a simple seh tutorial on my wordpress blog,. Http:/ netsecuritystuff.wordpress.com/2011/02/15/another-seh-tutorial/. Facebook, so close yet so far. Have https, then have it optional, seriously? Wednesday, February 2, 2011. I had the priviledge of meeting Harald Welte. Tuesday, January 25, 2011. Installing virtualbox on backtrack 4 r2.
netsecuritystuff.wordpress.com
netsecuritystuff | comp stuff, mostly – Charles Watathi
Comp stuff, mostly – Charles Watathi. Pentesting on the Samsung Galaxy? July 9, 2013. Are all those pentest tools running on android? Just went to http:/ neopwn.com. And it seems some interesting stuff is cooking there. Cant wait for August the 1st 🙂. Installing Virtualbox on Kali Linux. July 5, 2013. I have been receiving lots of comments that the below guide is not working the latest Kali 2017. I suggest you do the following:. Ascertain you have the following line in your /etc/sources.list file. Root@...
netsecuritysuite.com
The Sponsored Listings displayed above are served automatically by a third party. Neither the service provider nor the domain owner maintain any relationship with the advertisers. In case of trademark issues please contact the domain owner directly (contact information can be found in whois).
Network Security Services
Darr; Skip to Main Content. ALERT LOGIC NETWORK SCANNING AND MONITORING. NSS IT/EDP SECURITY AUDIT. Ransomware / Malware Remediation. SECURE NETWORK DESIGN AND CONSULTING. Providing network and computer security services. Contact Us to Get Started. NSS provides managed security services including. Alert Logic Network Scanning and Monitoring. Secure Email fro HIPAA, GLBAm and other regulation compliance. Wireless Audit / Security. Secure Network Design and Consulting. Network Security Services, Inc.
Replacing an internal door
Replacing an internal door. Tips on Caring for Your Garage Door. 4 Things to Look For When Choosing a Security Screen Door. Affordable Bathroom Updates When Selling a Home. How to Choose the Right Wood Heater for Your Home. Why Have Roller Shutters Installed Outside Your Homes Windows? Replacing an internal door. Tips on Caring for Your Garage Door. 4 Things to Look For When Choosing a Security Screen Door. Affordable Bathroom Updates When Selling a Home. How to Choose the Right Wood Heater for Your Home.
インターネットセキュリティー対策まるわかりAtoZ
インターネットの世界においては、ウイルス感染や個人情報漏えい 詳しくは、 独立行政法人情報処理推進機構の発表する資料 情報漏えい発生時の対応ポイント集.
インターネットセキュリティー対策エスコートブック
インターネットセキュリティ対策とは、パソコンでインターネットをやる上でウイルスやハッキング 詳しくは、 総務省の公式ページ 国民のための情報セキュリティサイト 用語辞典 は行.
SOCIAL ENGAGEMENT