blog.fox-it.com
ydklijnsma | Fox-IT International blog
https://blog.fox-it.com/author/ydklijnsma
News and opinions from Fox-IT. Back to fox-it.com. Mofang: A politically motivated information stealing adversary. June 15, 2016. The following countries have, in the above named sectors, been affected, although Fox-IT suspects there to be more: India, Germany, United States, Canada, Singapore, South Korea. Compromise for reconnaissance, aiming to extract key information about the target infrastructure. Faux infrastructure setup, designed to avoid attracting attention. April 11, 2016. On Sunday April 10t...
mbrownnyc.wordpress.com
List of MIBs included in Windows Server SNMP service | mbrownnyc
https://mbrownnyc.wordpress.com/misc/list-of-mibs-included-in-windows-server-snmp-service
If you need help. Comment on the article. I will get back to you quickly. This will help improve the article for others. You are not alone. So watch me do the funky dead butterfly. Part 2: Install Rhodecode. Part 3: Install Redmine. Part 4: Redmine on Apache. Part 5: Rhodecode through Apache reverse proxy. Part 6: Setup and force HTTPS access. Part 7: Setup LDAP authentication. Comparison of parallel execution management platforms. Part 1: Installing chocolatey and basic package management. Part 2: Imple...
forensicmethods.com
Forensic Methods | Computer Forensic Investigations
http://forensicmethods.com/page/2
March 1, 2014. Mdash; Leave a comment. It has been over six months since Edward Snowden’s unprecedented NSA leaks, and we are still a long way from being able to assess the damage. Worldwide trust in United States tech companies has undoubtedly been shaken. Cisco Systems blamed a ten percent revenue drop. On fallout from the leaks. Microsoft is offering the ability for foreign customers to have their data stored outside of the United States. Securing Your New Tablet. December 5, 2013. November 12, 2013.
forensicmethods.com
Malware | Forensic Methods
http://forensicmethods.com/category/malware
Mimikatz Kerberos Golden Ticket. June 30, 2014. Mdash; Leave a comment. It has been an interesting year for attacks against the Windows credential model. If you aren’t familiar with the Mimikatz “Golden Ticket” attack, it represents some of the best justification for guarding your domain administrator credentials with your life (if you really needed additional justification). CERT EU published an excellent whitepaper. On strategies for mitigating this attack. Malware Analysis Quant Project. The original ...
mbrownnyc.wordpress.com
ISO-3166 ccTLD CSV | mbrownnyc
https://mbrownnyc.wordpress.com/misc/iso-3166-cctld-csv
If you need help. Comment on the article. I will get back to you quickly. This will help improve the article for others. You are not alone. So watch me do the funky dead butterfly. Part 2: Install Rhodecode. Part 3: Install Redmine. Part 4: Redmine on Apache. Part 5: Rhodecode through Apache reverse proxy. Part 6: Setup and force HTTPS access. Part 7: Setup LDAP authentication. Comparison of parallel execution management platforms. Part 1: Installing chocolatey and basic package management. Part 2: Imple...
mbrownnyc.wordpress.com
My CCNA reference sheet | mbrownnyc
https://mbrownnyc.wordpress.com/misc/my-ccna-reference-sheet
If you need help. Comment on the article. I will get back to you quickly. This will help improve the article for others. You are not alone. So watch me do the funky dead butterfly. Part 2: Install Rhodecode. Part 3: Install Redmine. Part 4: Redmine on Apache. Part 5: Rhodecode through Apache reverse proxy. Part 6: Setup and force HTTPS access. Part 7: Setup LDAP authentication. Comparison of parallel execution management platforms. Part 1: Installing chocolatey and basic package management. Part 2: Imple...
blog.fox-it.com
Not quite the average exploit kit: Zuponcic | Fox-IT International blog
https://blog.fox-it.com/2013/12/19/not-quite-the-average-exploit-kit-zuponcic
News and opinions from Fox-IT. Back to fox-it.com. Large botnet cause of recent Tor network overload. Malicious advertisements served via Yahoo →. Not quite the average exploit kit: Zuponcic. December 19, 2013. A couple of weeks ago at the FOX-IT SOC, we noticed Zuponcic attempting to infect one of our clients protected networks. The incident was caused by a person visiting the website of Suriname’s Ministry of Finance, minfin.sr. This is interesting as websites hosting this kit have to be compromised du...
mbrownnyc.wordpress.com
Picking a portable headphone amp | mbrownnyc
https://mbrownnyc.wordpress.com/real-life/picking-a-portable-headphone-amp
If you need help. Comment on the article. I will get back to you quickly. This will help improve the article for others. You are not alone. So watch me do the funky dead butterfly. Part 2: Install Rhodecode. Part 3: Install Redmine. Part 4: Redmine on Apache. Part 5: Rhodecode through Apache reverse proxy. Part 6: Setup and force HTTPS access. Part 7: Setup LDAP authentication. Comparison of parallel execution management platforms. Part 1: Installing chocolatey and basic package management. Part 2: Imple...
mbrownnyc.wordpress.com
Comparison of “applications” that have definitions in libprotoident and nDPI | mbrownnyc
https://mbrownnyc.wordpress.com/misc/comparison-of-applications-that-have-definitions-in-libprotoident-and-ndpi
If you need help. Comment on the article. I will get back to you quickly. This will help improve the article for others. You are not alone. So watch me do the funky dead butterfly. Part 2: Install Rhodecode. Part 3: Install Redmine. Part 4: Redmine on Apache. Part 5: Rhodecode through Apache reverse proxy. Part 6: Setup and force HTTPS access. Part 7: Setup LDAP authentication. Comparison of parallel execution management platforms. Part 1: Installing chocolatey and basic package management. Part 2: Imple...
krebsonsecurity.com
Carberp Code Leak Stokes Copycat Fears — Krebs on Security
http://krebsonsecurity.com/2013/06/carberp-code-leak-stokes-copycat-fears
Ensp;Subscribe to RSS. Ensp;Follow me on Twitter. Ensp;Join me on Facebook. In-depth security news and investigation. Carberp Code Leak Stokes Copycat Fears. Carberp admin panel. Source: Xylibox.blogspot.com. The leak appears to have begun, as these things often do, with the sale of the source code in a semi-private cybercrime forum. On June 5, a member of the Lampeduza. By mid-June, links to download the entire Carberp archive were being posted on multiple forums, as first documented by Trusteer. A spec...
SOCIAL ENGAGEMENT