Darknet - The Darkside: Ettercap – A Suite For Man-In-The-Middle Attacks
Ettercap is a comprehensive suite for man-in-the-middle attacks (MiTM). It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It also supports active...
View ArticleSANS Internet Storm Center, InfoCON: green: Critical security update:...
Vulnerability: PHPMailer ">Patch...now. This is a very popular application, left unpatched it will be exploited.Finder: Dawid Golunski (@dawid_golunski), https://legalhackers.comPHPMailer Probably...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleInfosec Events: Week 52 In Review – 2016
ResourcesVMware Security Advisories – vmware.com vSphere Data Protection (VDP) updates address SSH key-based authentication issueTechniquesIn Flight Hacking System – blog.ioactive.com What helped a lot...
View ArticleFortinet FortiGuard Blog: Byline: Meeting The Challenge of Securing the Cloud
What if the data and security elements across an organization’s various cloud environments were well integrated, cohesive and coherent, like a seamlessly woven fabric? Such an approach would allow...
View ArticleSANS Internet Storm Center, InfoCON: green: Using daemonlogger as a Software...
A while back, I was in need of tapping the traffic going through my Linux gateway and was looking at doing this on the cheap, meaning to spend as little as possible on a tap to capture everything going...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleMetasploit: 9 Myths About Car Batteries
Car batteries are an essential part of any automobile. But although they are part of our daily life, we still have many misconceptions about them. In this article I want reveal some of these myths and...
View ArticleDidier Stevens: Update: pdf-parser Version 0.6.7
I added option -k to search for keys in dictionaries. A usage example can be found in blog post “PDF Analysis: Back To Basics“.pdf-parser_V0_6_7.zip (https) MD5: D04D7DA42F3263139BC2C7E7B2621C91...
View ArticleArsTechnica: Security Content: In an era of password leaks, Netflix tries...
(credit: Netflix)You can hardly throw a stone at a major Internet company these days without that stone's password and personally identifying data being hacked. Data breaches have becomethenorm, and...
View ArticleFortinet FortiGuard Blog: Byline: Is it Finally Time for Open Security?
One of the distinct advantages of working in the IT industry for over 35 years is all of the direct and indirect experience that brings, as well as the hindsight that comes with that. One of the more...
View ArticleRoom362.com: Start in Infosec
Instead of making yet another post about how to start in information security I have put together a collection of all the ones that people have done before. Right now this is a raw list, but I will go...
View ArticleSANS Internet Storm Center, InfoCON: green: Critical security update:...
UPDATE: 28 DEC 2016 - Critical security update for CVE-2016-10045 please update again ASAP. This is in addition to CVE-2016-10033 as fixed in 5.2.18. You should update to 5.2.20 at a...
View ArticleDarknet - The Darkside: Ending The Year With A 650Gbps DDoS Attack
It seems that 2016 has been the year of immense DDoS attacks, many coming from Mirai. This seems to be a newcomer though ending the year with a 650Gbps DDoS attack. The Dyn DNS DDoS attack that some...
View ArticleArsTechnica: Security Content: Police ask: “Alexa, did you witness a murder?”
Enlarge/ Always listening—but can it solve a murder? (credit: Valentina Paladino)In November of 2015, former Georgia police officer Victor Collins was found dead in a backyard hot tub at the...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleWired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...
Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.
View ArticleRoom362.com: Buying Internal Domain Access
NOTE: I DID NOT ATTEMPT ANYTHING MORE THAN LOGGING AGAINST ANY OF THE DOMAINS I REGISTERED FOR THIS RESEARCHFor anyone who knows me, they know that I’ve been obsessed with DNS for a long time. However,...
View ArticleArsTechnica: Security Content: Op-ed: Five unexpected lessons from the Ashley...
(credit: Ashley Madison)On December 14, 2016, the Federal Trade Commission settled a complaint with the company running the adult finder site Ashley Madison over the 2015 data breach that exposed the...
View ArticleArsTechnica: Security Content: US reportedly plans retaliation against...
Enlarge/ Will Barack Obama order a major cyber-reprisal against Russia for election hacks before he leaves office? A CNN report suggests the response will be a softball. (credit: Photo by Carsten...
View Article