blog.securitywhole.com blog.securitywhole.com

blog.securitywhole.com

Security Whole

Friday, March 25, 2011. Extracting Access Point Names from Packet Captures. Now that I work as a penetration tester I want to correlate those access points, so I can tell exactly how many devices there are and the MAC addressing scheme. That way I can better identify something that is out of place, like a well place rogue. Initially I did this by hand, and by hand means: teh suck! Let's start by looking a packet produced by a beacon. Let's fire up scapy and check it out. X00 x00 x00 x00 x00 x00 x00 x00 x...

http://blog.securitywhole.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR BLOG.SECURITYWHOLE.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

July

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Saturday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.8 out of 5 with 12 reviews
5 star
4
4 star
3
3 star
4
2 star
0
1 star
1

Hey there! Start your review of blog.securitywhole.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

CONTACTS AT BLOG.SECURITYWHOLE.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Security Whole | blog.securitywhole.com Reviews
<META>
DESCRIPTION
Friday, March 25, 2011. Extracting Access Point Names from Packet Captures. Now that I work as a penetration tester I want to correlate those access points, so I can tell exactly how many devices there are and the MAC addressing scheme. That way I can better identify something that is out of place, like a well place rogue. Initially I did this by hand, and by hand means: teh suck! Let's start by looking a packet produced by a beacon. Let's fire up scapy and check it out. X00 x00 x00 x00 x00 x00 x00 x00 x...
<META>
KEYWORDS
1 skip to main
2 skip to sidebar
3 security whole
4 p=pkts 0
5 p = p dot11elt
6 p = ppayload
7 found it ap3
8 apnamefrompcap py
9 correlation ftw
10 code
CONTENT
Page content here
KEYWORDS ON
PAGE
skip to main,skip to sidebar,security whole,p=pkts 0,p = p dot11elt,p = ppayload,found it ap3,apnamefrompcap py,correlation ftw,code,no comments,webresource axd,d=xxxxxxxxxxxxxxxx,messed with it,d=xxxxxxxxxxxxxxxz,recommended by microsoft,finished * *
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Security Whole | blog.securitywhole.com Reviews

https://blog.securitywhole.com

Friday, March 25, 2011. Extracting Access Point Names from Packet Captures. Now that I work as a penetration tester I want to correlate those access points, so I can tell exactly how many devices there are and the MAC addressing scheme. That way I can better identify something that is out of place, like a well place rogue. Initially I did this by hand, and by hand means: teh suck! Let's start by looking a packet produced by a beacon. Let's fire up scapy and check it out. X00 x00 x00 x00 x00 x00 x00 x00 x...

INTERNAL PAGES

blog.securitywhole.com blog.securitywhole.com
1

Security Whole: March 2011

http://blog.securitywhole.com/2011_03_01_archive.html

Friday, March 25, 2011. Extracting Access Point Names from Packet Captures. Now that I work as a penetration tester I want to correlate those access points, so I can tell exactly how many devices there are and the MAC addressing scheme. That way I can better identify something that is out of place, like a well place rogue. Initially I did this by hand, and by hand means: teh suck! Let's start by looking a packet produced by a beacon. Let's fire up scapy and check it out. X00 x00 x00 x00 x00 x00 x00 x00 x...

2

Security Whole: March 2009

http://blog.securitywhole.com/2009_03_01_archive.html

Monday, March 30, 2009. In order to be well prepared for April Fools day I decided to put out a rickroll meterpreter script. It defaults to looking for rickroll.mp3 in the metasploit framework root directory, but you can use another file with the -f option. I don't parse out the name so you will have to copy it into the metasploit directory. Here is the file:. Put it in framework3/meterpreter/scripts. Provided by Tim Medin at timmedin[at]gmail [dot] com. Sure the file is in the framework's root directory.

3

Security Whole: .NET Padding Oracle Attack, padBuster.pl, and the Microsoft RecommendedWorkarounds

http://blog.securitywhole.com/2010/10/net-padding-oracle-attack-padbusterpl_247.html

Wednesday, October 20, 2010. NET Padding Oracle Attack, padBuster.pl, and the Microsoft Recommended Workarounds. For some stupid reason, Whenever GoDaddy sees h t t p s : / / it turns it into a link and removes the scheme. This even happens if you edit the html manually. Because of this sillyness, I've used https: below. Now that we have a bit of the background covered, back to the site. Upon quick inspection we saw that 404 and 500 errors are redirected to the same error page. Bantha Herders! So all err...

4

Security Whole: August 2009

http://blog.securitywhole.com/2009_08_01_archive.html

Wednesday, August 12, 2009. Finding Old or Unused Accounts with Powershell v2. Here is a version that was 200 times faster in my environment. Depending on the number of domain controllers it could be even faster for you. It does one big query for each domain controller and then compiles the results. The original script took 45 minutes, this version took 13 seconds. Dcs = [System.DirectoryServices.ActiveDirectory.Domain]: getcurrentdomain().DomainControllers select name. Foreach ($dc in $dcs) {. Name="Las...

5

Security Whole: March 2010

http://blog.securitywhole.com/2010_03_01_archive.html

Monday, March 29, 2010. Blocking Traffic from Foreign Countries - Creating a block list of Supernets using PowerShell. Here is the script:. Filter for records that aren't in the US or run by ARIN. Records = ([xml]( New-Object System.Net.WebClient).DownloadString("http:/ www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xml") ).registry.record? Designation -notlike "*ARIN*" -and. Create array for holding supernets. Add a property for the Binary representation of the first octet. Records % { $.

UPGRADE TO PREMIUM TO VIEW 11 MORE

TOTAL PAGES IN THIS WEBSITE

16

OTHER SITES

blog.securitystandard.pl blog.securitystandard.pl

AfterMarket.pl

The domain securitystandard.pl. Was registered on AfterMarket.pl, polish largest domain marketplace. Is more than 180000 attractive domains for sale. We are the fastest growing domain registrar in Poland, which is trusted by over 60,000 customers. The lowest price, the simplest procedure, the best deals - that's why you should use our services! Contact the owner of the domain. If you are interested in purchasing this domain, you may use the contact form to send a message to the owner of the domain.

blog.securitytargets.com blog.securitytargets.com

SecurityTargets Blog

Penetration Testing and Security Solutions. Thursday, 14 October 2010. Hardening CentOS kernel with grsecurity. Hardening the server's kernel is one of the most important things we need to consider when speaking about OS hardening. This is mini-howto install and configure grsecurity on CentOS server. Is powerful and easy to use Linux kernel security enhancement. It gives you a lot of security features:. Change root (chroot) hardening. Prevention of arbitrary code execution in the kernel. You can find the...

blog.securityunwrapped.com blog.securityunwrapped.com

Security Unwrapped

Security simplified for day to day life. Thursday, May 6, 2010. FaceBook: It's not just about privacy, it's the principle. Lots of people are annoyed at FaceBook with its deployment of Instant Personalization. And what it has done for privacy, and I'm one of them. So, first, what exactly has FaceBook done? So every time they add a new partner, you have to go opt-out from that new partner. I have no problem with sites that don't give you privacy - I use Twitter. Without problem, the difference is Twitter ...

blog.securitywatch.ie blog.securitywatch.ie

securitywatch.ie |

September 12, 2012. Unless you are prepared to spend your entire life protecting your property by sitting in your hallway with a large stick, you have no option but to consider for yourself the benefits or otherwise of what is available on the market. Best practice suggests that you start with all the simple things a little [.]. Comments { 0 }. Cameras as part of your security needs. September 12, 2012. Comments { 0 }. Security makes sense when insuring your property. September 12, 2012. Comments { 0 }.

blog.securitywatchindia.org.in blog.securitywatchindia.org.in

default.secureserver.net

blog.securitywhole.com blog.securitywhole.com

Security Whole

Friday, March 25, 2011. Extracting Access Point Names from Packet Captures. Now that I work as a penetration tester I want to correlate those access points, so I can tell exactly how many devices there are and the MAC addressing scheme. That way I can better identify something that is out of place, like a well place rogue. Initially I did this by hand, and by hand means: teh suck! Let's start by looking a packet produced by a beacon. Let's fire up scapy and check it out. X00 x00 x00 x00 x00 x00 x00 x00 x...

blog.securitywire.com blog.securitywire.com

Congratulations! You have successfully set up your website!

You have successfully set up your website! This is the default server page. There are a few possible reasons why you see this page instead of your own:. If you have just created this new host, please be patient until the server updates your configuration. It may take up to 10 minutes. If you think this page is an error, please contact our support team via a help desk ticket. If you are not the owner of the website, please access this page later.

blog.securityzealot.com blog.securityzealot.com

security zealot

Keflex used for uti. Rantings of a security pragmatist. Excel Tip – Transform Name Order. I had a spreadsheet of over 300 names in the format “Last, First” and needed to transform them to “First Last”. The following is a self contained formula that does just that:. TRIM(CONCATENATE(RIGHT(A2,LEN(A2)-FIND(“,”,A2) , ” “, LEFT(A2,FIND(“,”,A2)-1) ). When evaluating a formula, I work from the inside out. FIND(“,” , A2) tells us the location of the first comma encountered in cell A2. November 12th, 2013 by admi...

blog.securly.com blog.securly.com

Securly Blog

Securly’s Digital Citizenship Tips for Students. August 11, 2015. August 11, 2015. As the back-to-school season is among us, we wanted to take a moment to share our three tips for being a good digital citizen. Please leave a comment below to share additional tips you may have. Tweet others as you would like to be tweeted. Pretty clever, right? Beware of WMDs (Websites of Mass Distraction). Okay, so you might have to ask your parents about actual WMDs, but that’s another story. Another important...These t...

blog.securmanage.com blog.securmanage.com

SecurManage | The Most Powerful Tool in Community Corrections

The Most Powerful Tool in Community Corrections. Easy navigation through a friendly web interface. Windows 7, Windows XP and Windows Vista compatible. Buildings and Units can be separated and defined by staff so that reports can be run against specific groups. All data is archived indefinitely, and searches can be done to pull up past residents with the click of a button. Digital signature pads and scanners are used for recording signatures and scanning residents and locations. Our resident treatment pla...

blog.securolytics.io blog.securolytics.io

Securolytics | Blog

Security For The Internet of Things (IoT). Georgia Tech lands Cybersecurity Research Grant. Our congrats to Georgia Tech. Last month, Georgia Tech was granted a $17.3 million cybersecurity research contract by the US Department of Defense. Their mandate- to help establish new science that quickly, objectively and positively identifies the virtual actors responsible for cyberattack. The IT Security. In Adviser-Leading Age NY. Modern Health IT Systems. Sanket Patel Interview- S. 2016's Biggest Data Breac.