
securitykitten.github.io
Adventures in SecurityAdventures in Security
http://securitykitten.github.io/
Adventures in Security
http://securitykitten.github.io/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Friday
LOAD TIME
0.8 seconds
16x16
PAGES IN
THIS WEBSITE
6
SSL
EXTERNAL LINKS
22
SITE IP
151.101.40.133
LOAD TIME
0.766 sec
SCORE
6.2
Adventures in Security | securitykitten.github.io Reviews
https://securitykitten.github.io
Adventures in Security
Finding Beacons With Bro – Adventures in Security
http://securitykitten.github.io/finding-beacons-with-bro
Finding Beacons With Bro. I’ll keep this one short. I’ve recently been spending more time with the Bro framework and discovering the power of its scripting language. I had written a PoC script. Around using entropy to find beacons in network traffic. The script grew and matured over the years, but there eventually became a need to run this against live network traffic and not just logs. Finding Beacons With Bro. July 02, 2015. You might also enjoy ( View all posts. The Little Dumper That Could.
An Evening With N3utrino – Adventures in Security
http://securitykitten.github.io/an-evening-with-n3utrino
An Evening With N3utrino. In my previous post I showed off some tricks that malware authors use to check to see if they are being executed inside of a virtual machine. While it was nothing new or groundbreaking, I consider it an interesting behavior to pivot off. In some cases, depending on how the author searches for sandbox-like qualities, yara signatures can be generated looking for those techniques. In this malware, a simple string is built with repeated 4 byte mov’s. With a simple conversion. When N...
Getmypass Point of Sale Malware Update – Adventures in Security
http://securitykitten.github.io/getmypass-point-of-sale-malware-update
Getmypass Point of Sale Malware Update. I previously wrote about a new piece of malware called getmypass that was scoring 0/55 on Virustotal. The malware had an active digital signature and was able to successfully dump track data from a given process. The first change in the malware is evident in the start function. In the older version of getmypass, it would look for the 1.ini file and check for the following options:. A screenshot of the old function:. Support for Multiple Exfil Files. The newer versi...
The Little Dumper That Could – Adventures in Security
http://securitykitten.github.io/the-little-dumper-that-could
The Little Dumper That Could. I’ve recently been doing a lot of work around credit card dumpers at CBTS. While casually browsing through totalhash I found the following binary (http:/ totalhash.com/analysis/1c8bae904340f9a8cf17d90a2de726a226ad6dba) that contained some interesting strings. The one thing that stood out to me was its size and detection ratio. This binary clocked in at only 4k and scored a rough 7/51 on Virustotal. The function that is searching for track 1 data simply looks for a B (leading...
All Posts – Adventures in Security
http://securitykitten.github.io/posts
Finding Beacons With Bro. The Little Dumper That Could. A 4k Credit Card Dumper. The Mozart RAM Scraper. The Elusive POS Malware. Getmypass Point of Sale Malware Update. Now featuring small improvements! An Evening With N3utrino. A bot with credit card grabbing features. VM Checking and Detecting. A look at checks in a modern piece of malware. A Blending of Dexter and Chewbacca. Getmypass Point of Sale Malware. Aka, the bisonal backdoor. 2015 Nick Hoffman. Powered by Jekyll. Using the Minimal Mistakes.
TOTAL PAGES IN THIS WEBSITE
6
malware – CYINT Analysis
http://www.cyintanalysis.com/tag/malware
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. September 25, 2016. September 30, 2016. TekDefense PCAP Challenge Write-Up. Earlier this week TekDefense. Posted a cool network challenge. I’ve done a couple of PCAP exercises from Brad Duncan here. Any feedback or tips are welcome : ). The malware ...
PCAP – CYINT Analysis
http://www.cyintanalysis.com/tag/pcap
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. September 25, 2016. September 30, 2016. TekDefense PCAP Challenge Write-Up. Earlier this week TekDefense. Posted a cool network challenge. I’ve done a couple of PCAP exercises from Brad Duncan here. Any feedback or tips are welcome : ). May 10, 2015.
Analysis – CYINT Analysis
http://www.cyintanalysis.com/tag/analysis
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. September 25, 2016. September 30, 2016. TekDefense PCAP Challenge Write-Up. Earlier this week TekDefense. Posted a cool network challenge. I’ve done a couple of PCAP exercises from Brad Duncan here. Any feedback or tips are welcome : ). April 9, 2016.
analytic methods – CYINT Analysis
http://www.cyintanalysis.com/tag/analytic-methods
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. Tag / analytic methods. December 26, 2016. December 27, 2016. My Favorite Threat Intel Tweets of 2016. Last year I put together My Favorite Threat Intel Tweets of 2015. And now it’s time for another round-up of threat intel tweets! Counter-intuitive...
More PCAP Analysis Practice – CYINT Analysis
http://www.cyintanalysis.com/more-pcap-analysis-practice
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. February 28, 2016. July 30, 2016. More PCAP Analysis Practice. It’s time to tackle another PCAP analysis exercise from Brad Duncan. I’ve only done a couple of these (I posted one of my write ups here. So here we go! On December 8, 2014 at 18:18 UTC,...
intel workflow – CYINT Analysis
http://www.cyintanalysis.com/tag/intel-workflow
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. Tag / intel workflow. September 11, 2016. September 11, 2016. A Simple, Free, and Fast Open Source Workflow For Processing Indicators. Fortunately, the availability and quality of open source threat intelligence tools have grown in-kind with the qua...
intelprogram – CYINT Analysis
http://www.cyintanalysis.com/tag/intelprogram
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. December 26, 2016. December 27, 2016. My Favorite Threat Intel Tweets of 2016. Last year I put together My Favorite Threat Intel Tweets of 2015. And now it’s time for another round-up of threat intel tweets! Great stuff in the #CTIJam. Counter-intui...
Christian – CYINT Analysis
http://www.cyintanalysis.com/author/cyint-dude
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. Cyber threat intelligence analyst. December 26, 2016. December 27, 2016. My Favorite Threat Intel Tweets of 2016. Last year I put together My Favorite Threat Intel Tweets of 2015. And now it’s time for another round-up of threat intel tweets! Counte...
Threat Intel program – CYINT Analysis
http://www.cyintanalysis.com/category/threat-intel-program
A blog about cyber threat intelligence geared towards the everyday analyst. Aaron Shelmire's Blog. Journey Into Incident Response. Rebekah Brown's Intelligence Blog. Rick Holland's Blog. Robert Lee's Blog. Scott Robers: Advanced Persistent Incident Responder. Category / Threat Intel program. December 26, 2016. December 27, 2016. My Favorite Threat Intel Tweets of 2016. Last year I put together My Favorite Threat Intel Tweets of 2015. And now it’s time for another round-up of threat intel tweets! Counter-...
TOTAL LINKS TO THIS WEBSITE
22
Security Kit - One Step Ahead In Kitting Your Company
Tel: 021 534 3500. Fax: 021 534 4104. Link to Active Wear. For all your security uniform and accessory needs. Is a Cape Town based company and has been in the. Industry since 1995. We are committed to kitting the security industry with. At competitive prices, and with efficient, friendly service. This is why our reputation is widely acknowledged by leading security companies and government departments. For ease of choice, we carry large stocks of all popular security outfits.
Computer Theft Prevention | Hardware | Software | SecurityKit.com
Mac PhoneHome Recovery Software. Securitykit.com manufactures and distributes computer theft prevention and security products to protect individuals, businesses, institutions and government clients against both computer theft and the loss of valuable data. Computer theft prevention solutions include PC security cable kits. Mac security cable kits. And laptop security cable kits. And security hardware and accessories. And for Macs the Mac security plate. Theft Protection Parts and Equipment. SecurityKit&#...
Security KitSecurity Kit
Security Kit By Professionals 4 Professionals. Thanks for your interest in Security Kit. Your support for our company is always appreciated, however please. Has moved; for full list of our. Products and latest offers please visit our new site at:. Avatars by Sterling Adventures.
Home - SICURITY KIT Vendita Installazione e assistenza tecnica Antintrusione, Videosorvelgianza, Elettronica, Audio Video
SS-969B Stazione di rilavorazione SMD 220V AC 700W. MT-1210 Compact multimetro digitale. MT-1630 Multimetro a penna. Alla Scoperta Di Arduino. Arduino Uno REV3 con Atmega328. Raspberry Pi B con SD card. Raspberry Pi Tipo B. Security Kit raccoglie l’esperienza di Kit House e si propone di proseguire con identica professionalità e cura del cliente, elementi distintivi che per quarant’anni hanno caratterizzato la precedente attività di Romeo e Loredana. Benvenuti nel nostro sito. Ne puoi aggiungere un conte...
Smart Home Social Networking Community
SmartHome helps you connect and share with the people in your life. It's free and always will be. MySmartHome 2009-2015 All Copy Right Reserved · English (US).
Adventures in Security
Finding Beacons With Bro. The Little Dumper That Could. A 4k Credit Card Dumper. The Mozart RAM Scraper. The Elusive POS Malware. Getmypass Point of Sale Malware Update. Now featuring small improvements! An Evening With N3utrino. A bot with credit card grabbing features. 2015 Nick Hoffman. Powered by Jekyll. Using the Minimal Mistakes.
securityknights.com
Security Know – Consultoria en seguridad informatica
Consultoria en seguridad informatica. Somos un equipo de profesionales dedicados a ofrecer servicios. Nuestro objetivo es la integridad, confidencialidad y aseguramiento de datos e información sensible del negocio. Ransomware codificado enteramente en JavaScript. Crea un blog o un sitio web gratuitos con WordPress.com.
securityknowledgeframework.org
Security Knowledge Framework
Training developers in writing secure code. SKF is a fully open-source Python-Flask web-application that uses the OWASP Application Security Verification Standard to train you and your team in writing secure code, by design. 2015 Open Source Rookies of the Year. We are honored to receive a honorable mention. For the Black Duck Open Source Rookies of the Year awards. Article on blackducksoftware.com. Presentation about skf on the OWASP BeNeLux Days. You can donate to the project on our OWASP Wiki page.
SOCIAL ENGAGEMENT