nullkey.net
September | 2014 |
https://nullkey.net/2014/09
Imaging Partitions from Volume Groups. September 12, 2014. January 6, 2015. To access individual partitions you must use a write-able image, so only use a COPY of the original image, not the actual initial image. Use ‘mmls’ to determine the initial partitions. Losetup /dev/loop0 data001.bin -o 123379200. Now that it’s mounted we perform a pvscan. Hopefully we’ll see that it had scanned our loop device to find a volume. PV /dev/loop0 VG vg00 lvm2 [232.75 GB / 108.75 GB free]. Dcfldd if=/dev/vg00/root of=t...
nullkey.net
OpenNSM is live! |
https://nullkey.net/open-nsm-is-live
September 3, 2014. September 17, 2015. A friend of mine and I recently launched the Open Network Security Monitoring Group (OpenNSM) group at the University of Illinois at Urbana-Champaign. OpenNSM aims to provide a place for network security analysts and those interested in information security to share tricks, solutions, work on projects, and other knowledge about the subject. Check out the website and come join us. Posted in Special Interest Groups. GNU/Linux Users Group (GLUG) →. It’s a trap!
nullkey.net
Special Interest Groups |
https://nullkey.net/category/special-interest-groups
GNU/Linux Users Group (GLUG). September 4, 2014. September 16, 2015. I chair the GNU/Linux Users Group (GLUG) at ACM@UIUC. GLUG aims to provide a place for GNU/Linux users to exchange tips, tricks, solutions, and other knowledge about GNU/Linux. Check out the website and come join us! Posted in Special Interest Groups. September 3, 2014. September 17, 2015. Check out the website and come join us. Posted in Special Interest Groups. It’s a trap! Learning how to trust the admiral when invited to return fire.
taosecurity.blogspot.com
TaoSecurity: 04/01/2015 - 05/01/2015
http://taosecurity.blogspot.com/2015_04_01_archive.html
Richard Bejtlich's blog on digital security, strategic thought, and military history. Thursday, April 30, 2015. The Need for Test Data. Last week at the RSA Conference, I spoke to several vendors about their challenges offering products and services in the security arena. One mentioned a problem I had not heard before, but which made sense to me. The same topic will likely resonate with security researchers, academics, and developers. Allan's work at the Department of Commerce seeks "substantive cybersec...
SOCIAL ENGAGEMENT