holisticinfosec.blogspot.com
HolisticInfoSec: July 2015
http://holisticinfosec.blogspot.com/2015_07_01_archive.html
Wednesday, July 01, 2015. Toolsmith: Malware Analysis with REMnux Docker Containers. Docker, runs on Ubuntu, Mac OS X, and Windows. 8220;Security is easy:. Don't install malicious software. Don't click bad stuff. Only trust pretty women you don't know. Do what Gartner says.”. Wait, now I’m not sure there’s even a reason to continue here. :-). Before proceeding if you aren’t already well informed. Most importantly, read Security Risks and Benefits of Docker Application Containers. Then wait a bit. The...
holisticinfosec.blogspot.com
HolisticInfoSec: September 2014
http://holisticinfosec.blogspot.com/2014_09_01_archive.html
Monday, September 01, 2014. Toolsmith - Jay and Bob Strike Back: Data-Driven Security. Data-Driven Security: Analysis, Visualization and Dashboards. As we’ll only focus on the R side of the discussion. All other dependencies for full interactive use of the book’s content are found in Tools You Will Need in the books Introduction. When last I referred you to a book as a tool we discussed. From Jay Jacobs and Bob Rudis, hereafter referred to a Jay and Bob (no, not these guys). DDSecBook is laid out in such...
holisticinfosec.blogspot.com
HolisticInfoSec: toolsmith: IoT Fruit - Pineapple and Raspberry
http://holisticinfosec.blogspot.com/2015/06/toolsmith-iot-fruit-pineapple-and.html
Monday, June 01, 2015. Toolsmith: IoT Fruit - Pineapple and Raspberry. Was amongst those devices that met the IoT bar before IoT was all the rage. Kudos to that crazy pack o’ hackers for seeing the imminent future of security challenges with smart devices. In 2013 Chris Clearfield wrote Rethinking Security for the Internet ofThings. 8211; WiFi Pineapple. 8220;The WiFi Pineapple. As seen in Figure 2. 8211; Installing Infusions. In the Logs Infusion I followed the /tmp/pineap.log which logs probes for ...
holisticinfosec.blogspot.com
HolisticInfoSec: toolsmith: Memory Analysis with DumpIt and Volatility
http://holisticinfosec.blogspot.com/2011/09/toolsmith-memory-analysis-with-dumpit.html
Sunday, September 04, 2011. Toolsmith: Memory Analysis with DumpIt and Volatility. Sept 11, 2001: “To honor those whose lives were lost, their families, and all who sacrifice that we may live in freedom. We will never forget.“. Reprinted with permission for the author only from the September 2011 ISSA Journal. SIFT 2.1 if you’d like a forensics-focused virtual machine with Volatility ready to go. Python version 2.6 or higher on Window, Linux, or Mac OS X. Some plugins require third party libraries. I thi...
holisticinfosec.blogspot.com
HolisticInfoSec: December 2014
http://holisticinfosec.blogspot.com/2014_12_01_archive.html
Sunday, December 21, 2014. 2014 Toolsmith Tool of the Year. If your browser doesn't support IFRAMEs, you can vote directly here. Links to this post. Tuesday, December 02, 2014. Linux or Windows system with a Python interpreter. Announced version 1.3 on November 11, which further prompted our discussion here. Artillery first surfaced for me as part of the ADHD project I covered during my C3CM discussion in October 2013’s toolsmith. Change directory to the artillery. Then edit to the config. To prevent thi...
holisticinfosec.blogspot.com
HolisticInfoSec: February 2015
http://holisticinfosec.blogspot.com/2015_02_01_archive.html
Thursday, February 05, 2015. Toolsmith: Sysmon 2.0 and EventViz. Congratulations and well done to Josh Sokol for winning 2014 Toolsmith Tool of the Year. With his very popular SimpleRisk. Sysmon 2.0 was welcomed to the world on 19 JAN 2015, warranting immediate attention as part of The State of Cybersecurity. Focus for February’s ISSA Journal. If you want to better understand the state of cybersecurity on your Windows systems, consider System Monitor (Sysmon) a requirement. Sysmon. The change file creati...
isc.sans.edu
InfoSec Handlers Diary Blog - SSHD rootkit in the wild
https://isc.sans.edu/diary/SSHD+rootkit+in+the+wild/15229
Handler on Duty: Rick Wanner. SANS ISC: InfoSec Handlers Diary Blog - SSHD rootkit in the wild. Other SANS Sites Help. InfoSec Handlers Diary Blog. Sign Up for Free! Or Sign Up for Free. SSHD rootkit in the wild. There are a lot of discussions at the moment about a SSHD rootkit hitting mainly RPM based Linux distributions. The trojanized library is very, very nasty. Upon execution it performs a number of actions, as described below. Once that has been done, the library sets up everything needed for it to...
nahya483.blogspot.com
YEMENII DESCENT WRITE: 2011 Okt 23
http://nahya483.blogspot.com/2011_10_23_archive.html
Minggu, 23 Oktober 2011. Password Tracking in Malicious iOS Apps تتبع دائرة الرقابة الداخلية كلمة السر في تطبيقات الخبيثة. كيفية العثور على 4 المفقودة. IPAD أو آي بود تاتش 4 غ مع العثور على هاتف بلادي على IOS 4.2.1. By : Naya Elbash. Password Tracking in Malicious iOS Apps. In this article, John Bielich and Khash Kiani introduce OAuth, and demonstrate one type of approach in which a malicious native client application can compromise sensitive end-user data. OAuth is a user-centric authorization protocol ...
isc.sans.edu
SSLv3 POODLE Vulnerability Official Release - SANS Internet Storm Center
https://isc.sans.edu/forums/diary/SSLv3+POODLE+Vulnerability+Official+Release/18827
Handler on Duty: Rick Wanner. SANS ISC: SSLv3 POODLE Vulnerability Official Release - SANS Internet Storm Center. Other SANS Sites Help. SANS ISC InfoSec Forums. Sign Up for Free! Or Sign Up for Free. Larr; Next Thread. Previous Thread →. SSLv3 POODLE Vulnerability Official Release. Finally we got an official announcement. For all the details, jump straight to the original announcement [1]. Below see the TL;DR; version:. SSLv3 had issues in the past. Remember the BEAST attack? The impact is similar to th...
isc.sans.edu
Exploit cocktail (Struts, Java, Windows) going after 3-month old vulnerabilities - SANS Internet Storm Center
https://isc.sans.edu/forums/diary/Exploit+cocktail+Struts+Java+Windows+going+after+3-month+old+vulnerabilities/16913
Handler on Duty: Rick Wanner. SANS ISC: Exploit cocktail (Struts, Java, Windows) going after 3-month old vulnerabilities - SANS Internet Storm Center. Other SANS Sites Help. SANS ISC InfoSec Forums. Sign Up for Free! Or Sign Up for Free. Larr; Next Thread. Previous Thread →. Exploit cocktail (Struts, Java, Windows) going after 3-month old vulnerabilities. As a result of a successful attack, the bad guys modify the core index.jsp on the affected server, to include a snippet like the following:. Daniel@foo...
SOCIAL ENGAGEMENT