securitykitten.github.io securitykitten.github.io

securitykitten.github.io

Adventures in Security

Adventures in Security

http://securitykitten.github.io/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR SECURITYKITTEN.GITHUB.IO

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

December

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Friday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.6 out of 5 with 10 reviews
5 star
6
4 star
4
3 star
0
2 star
0
1 star
0

Hey there! Start your review of securitykitten.github.io

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.8 seconds

FAVICON PREVIEW

  • securitykitten.github.io

    16x16

CONTACTS AT SECURITYKITTEN.GITHUB.IO

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Adventures in Security | securitykitten.github.io Reviews
<META>
DESCRIPTION
Adventures in Security
<META>
KEYWORDS
1 reverse engineering
2 blog
3 malware
4
5 coupons
6 reviews
7 scam
8 fraud
9 hoax
10 genuine
CONTENT
Page content here
KEYWORDS ON
PAGE
adventures in security,posts,nick hoffman,reverse engineer,twitter,github,recent posts,theme
SERVER
GitHub.com
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Adventures in Security | securitykitten.github.io Reviews

https://securitykitten.github.io

Adventures in Security

INTERNAL PAGES

securitykitten.github.io securitykitten.github.io
1

Finding Beacons With Bro – Adventures in Security

http://securitykitten.github.io/finding-beacons-with-bro

Finding Beacons With Bro. I’ll keep this one short. I’ve recently been spending more time with the Bro framework and discovering the power of its scripting language. I had written a PoC script. Around using entropy to find beacons in network traffic. The script grew and matured over the years, but there eventually became a need to run this against live network traffic and not just logs. Finding Beacons With Bro. July 02, 2015. You might also enjoy ( View all posts. The Little Dumper That Could.

2

An Evening With N3utrino – Adventures in Security

http://securitykitten.github.io/an-evening-with-n3utrino

An Evening With N3utrino. In my previous post I showed off some tricks that malware authors use to check to see if they are being executed inside of a virtual machine. While it was nothing new or groundbreaking, I consider it an interesting behavior to pivot off. In some cases, depending on how the author searches for sandbox-like qualities, yara signatures can be generated looking for those techniques. In this malware, a simple string is built with repeated 4 byte mov’s. With a simple conversion. When N...

3

Getmypass Point of Sale Malware Update – Adventures in Security

http://securitykitten.github.io/getmypass-point-of-sale-malware-update

Getmypass Point of Sale Malware Update. I previously wrote about a new piece of malware called getmypass that was scoring 0/55 on Virustotal. The malware had an active digital signature and was able to successfully dump track data from a given process. The first change in the malware is evident in the start function. In the older version of getmypass, it would look for the 1.ini file and check for the following options:. A screenshot of the old function:. Support for Multiple Exfil Files. The newer versi...

4

The Little Dumper That Could – Adventures in Security

http://securitykitten.github.io/the-little-dumper-that-could

The Little Dumper That Could. I’ve recently been doing a lot of work around credit card dumpers at CBTS. While casually browsing through totalhash I found the following binary (http:/ totalhash.com/analysis/1c8bae904340f9a8cf17d90a2de726a226ad6dba) that contained some interesting strings. The one thing that stood out to me was its size and detection ratio. This binary clocked in at only 4k and scored a rough 7/51 on Virustotal. The function that is searching for track 1 data simply looks for a B (leading...

5

All Posts – Adventures in Security

http://securitykitten.github.io/posts

Finding Beacons With Bro. The Little Dumper That Could. A 4k Credit Card Dumper. The Mozart RAM Scraper. The Elusive POS Malware. Getmypass Point of Sale Malware Update. Now featuring small improvements! An Evening With N3utrino. A bot with credit card grabbing features. VM Checking and Detecting. A look at checks in a modern piece of malware. A Blending of Dexter and Chewbacca. Getmypass Point of Sale Malware. Aka, the bisonal backdoor. 2015 Nick Hoffman. Powered by Jekyll. Using the Minimal Mistakes.

UPGRADE TO PREMIUM TO VIEW 1 MORE

TOTAL PAGES IN THIS WEBSITE

6

LINKS TO THIS WEBSITE

cyintanalysis.com cyintanalysis.com

malware – CYINT Analysis

http://www.cyintanalysis.com/tag/malware

A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. September 25, 2016. September 30, 2016. TekDefense PCAP Challenge Write-Up. Earlier this week TekDefense. Posted a cool network challenge. I’ve done a couple of PCAP exercises from Brad Duncan here. Any feedback or tips are welcome : ). The malware ...

cyintanalysis.com cyintanalysis.com

PCAP – CYINT Analysis

http://www.cyintanalysis.com/tag/pcap

A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. September 25, 2016. September 30, 2016. TekDefense PCAP Challenge Write-Up. Earlier this week TekDefense. Posted a cool network challenge. I’ve done a couple of PCAP exercises from Brad Duncan here. Any feedback or tips are welcome : ). May 10, 2015.

cyintanalysis.com cyintanalysis.com

Analysis – CYINT Analysis

http://www.cyintanalysis.com/tag/analysis

A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. September 25, 2016. September 30, 2016. TekDefense PCAP Challenge Write-Up. Earlier this week TekDefense. Posted a cool network challenge. I’ve done a couple of PCAP exercises from Brad Duncan here. Any feedback or tips are welcome : ). April 9, 2016.

cyintanalysis.com cyintanalysis.com

analytic methods – CYINT Analysis

http://www.cyintanalysis.com/tag/analytic-methods

A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. Tag / analytic methods. December 26, 2016. December 27, 2016. My Favorite Threat Intel Tweets of 2016. Last year I put together My Favorite Threat Intel Tweets of 2015. And now it’s time for another round-up of threat intel tweets! Counter-intuitive...

cyintanalysis.com cyintanalysis.com

More PCAP Analysis Practice – CYINT Analysis

http://www.cyintanalysis.com/more-pcap-analysis-practice

A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. February 28, 2016. July 30, 2016. More PCAP Analysis Practice. It’s time to tackle another PCAP analysis exercise from Brad Duncan. I’ve only done a couple of these (I posted one of my write ups here. So here we go! On December 8, 2014 at 18:18 UTC,...

cyintanalysis.com cyintanalysis.com

intel workflow – CYINT Analysis

http://www.cyintanalysis.com/tag/intel-workflow

A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. Tag / intel workflow. September 11, 2016. September 11, 2016. A Simple, Free, and Fast Open Source Workflow For Processing Indicators. Fortunately, the availability and quality of open source threat intelligence tools have grown in-kind with the qua...

cyintanalysis.com cyintanalysis.com

intelprogram – CYINT Analysis

http://www.cyintanalysis.com/tag/intelprogram

A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. December 26, 2016. December 27, 2016. My Favorite Threat Intel Tweets of 2016. Last year I put together My Favorite Threat Intel Tweets of 2015. And now it’s time for another round-up of threat intel tweets! Great stuff in the #CTIJam. Counter-intui...

cyintanalysis.com cyintanalysis.com

Christian – CYINT Analysis

http://www.cyintanalysis.com/author/cyint-dude

A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. Cyber threat intelligence analyst. December 26, 2016. December 27, 2016. My Favorite Threat Intel Tweets of 2016. Last year I put together My Favorite Threat Intel Tweets of 2015. And now it’s time for another round-up of threat intel tweets! Counte...

cyintanalysis.com cyintanalysis.com

Threat Intel program – CYINT Analysis

http://www.cyintanalysis.com/category/threat-intel-program

A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. Category / Threat Intel program. December 26, 2016. December 27, 2016. My Favorite Threat Intel Tweets of 2016. Last year I put together My Favorite Threat Intel Tweets of 2015. And now it’s time for another round-up of threat intel tweets! Counter-...

UPGRADE TO PREMIUM TO VIEW 13 MORE

TOTAL LINKS TO THIS WEBSITE

22

SOCIAL ENGAGEMENT



OTHER SITES

securitykit.co.za securitykit.co.za

Security Kit - One Step Ahead In Kitting Your Company

Tel: 021 534 3500. Fax: 021 534 4104. Link to Active Wear. For all your security uniform and accessory needs. Is a Cape Town based company and has been in the. Industry since 1995. We are committed to kitting the security industry with. At competitive prices, and with efficient, friendly service. This is why our reputation is widely acknowledged by leading security companies and government departments. For ease of choice, we carry large stocks of all popular security outfits.

securitykit.com securitykit.com

Computer Theft Prevention | Hardware | Software | SecurityKit.com

Mac PhoneHome Recovery Software. Securitykit.com manufactures and distributes computer theft prevention and security products to protect individuals, businesses, institutions and government clients against both computer theft and the loss of valuable data. Computer theft prevention solutions include PC security cable kits. Mac security cable kits. And laptop security cable kits. And security hardware and accessories. And for Macs the Mac security plate. Theft Protection Parts and Equipment. SecurityKit&#...

securitykit.info securitykit.info

Security KitSecurity Kit

Security Kit By Professionals 4 Professionals. Thanks for your interest in Security Kit. Your support for our company is always appreciated, however please. Has moved; for full list of our. Products and latest offers please visit our new site at:. Avatars by Sterling Adventures.

securitykit.it securitykit.it

Home - SICURITY KIT Vendita Installazione e assistenza tecnica Antintrusione, Videosorvelgianza, Elettronica, Audio Video

SS-969B Stazione di rilavorazione SMD 220V AC 700W. MT-1210 Compact multimetro digitale. MT-1630 Multimetro a penna. Alla Scoperta Di Arduino. Arduino Uno REV3 con Atmega328. Raspberry Pi B con SD card. Raspberry Pi Tipo B. Security Kit raccoglie l’esperienza di Kit House e si propone di proseguire con identica professionalità e cura del cliente, elementi distintivi che per quarant’anni hanno caratterizzato la precedente attività di Romeo e Loredana. Benvenuti nel nostro sito. Ne puoi aggiungere un conte...

securitykitstore.com securitykitstore.com

Smart Home Social Networking Community

SmartHome helps you connect and share with the people in your life. It's free and always will be. MySmartHome 2009-2015 All Copy Right Reserved · English (US).

securitykitten.github.io securitykitten.github.io

Adventures in Security

Finding Beacons With Bro. The Little Dumper That Could. A 4k Credit Card Dumper. The Mozart RAM Scraper. The Elusive POS Malware. Getmypass Point of Sale Malware Update. Now featuring small improvements! An Evening With N3utrino. A bot with credit card grabbing features. 2015 Nick Hoffman. Powered by Jekyll. Using the Minimal Mistakes.

securityknights.com securityknights.com

securityknights.com

securityknow-how.com securityknow-how.com

Tyco

This web site is under construction.

securityknow.com securityknow.com

Security Know – Consultoria en seguridad informatica

Consultoria en seguridad informatica. Somos un equipo de profesionales dedicados a ofrecer servicios. Nuestro objetivo es la integridad, confidencialidad y aseguramiento de datos e información sensible del negocio. Ransomware codificado enteramente en JavaScript. Crea un blog o un sitio web gratuitos con WordPress.com.

securityknowledgebase.com securityknowledgebase.com

securityknowledgebase.com

Inquire about securityknowledgebase.com.

securityknowledgeframework.org securityknowledgeframework.org

Security Knowledge Framework

Training developers in writing secure code. SKF is a fully open-source Python-Flask web-application that uses the OWASP Application Security Verification Standard to train you and your team in writing secure code, by design. 2015 Open Source Rookies of the Year. We are honored to receive a honorable mention. For the Black Duck Open Source Rookies of the Year awards. Article on blackducksoftware.com. Presentation about skf on the OWASP BeNeLux Days. You can donate to the project on our OWASP Wiki page.