dc303.org
dc303 - meetings
http://www.dc303.org/meetings.html
We encourage members to be active and contribute to the group. if you have a meeting topic or idea, propose it on the mailing list or contact mantis. Meetings are held at denhac. 700 Kalamath St., Denver CO 80204; BRING $5 (or more) as a donation to pay utility costs for denhac. 3rd friday of every month, 7:00 - 10:00 PM. Mantis = hands on with the Witchcraft Compiler Collection. Recently released at Defcon 24). Video game console hacking. Intro to IDA Pro. Local security bypass with firewire or USB.
semibad.com
semiBad. blog.
http://www.semibad.com/blog
In a familiarly-named post over at All In The Head. Urges us all to follow his blogging lead:. 8220; Permanence and findability are important for ideas to spread and grow. Twitter is a fragile and fleeting place. Give your ideas and thoughts the permanent home they deserve. ”. No comments so far. A couple of days ago, my friend and colleague Gavin Logan. Wrote a short post. Which has got me thinking about criticism (or lack thereof) in the local web community:. Just one comment so far. No comments so far.
zeltser.com
Reflections Upon Deception and Protean Security Tactics
https://zeltser.com/deception-and-protean-security-tactics
Reflections Upon Deception and Protean Security Tactics. I’ve been pondering the use of deception and variability to slow down and misdirect computer attackers. Honeypots have been discussed in this context for some time, yet they’ve failed to take off as mainstream components of a security architecture. Perhaps now is the time when a new set of tools and people can reignite an interest in this aspects of information security. I believe this area is ripe for innovation. Service emulators that would proce...
petermorin.com
Malware Analysis Tools | petermorin.com
http://www.petermorin.com/malware-analysis-tools
Skip to primary content. Skip to secondary content. Information & Sites. Please find below links to sites that provide both open source and/or commercial tools related to malware analysis and reverse engineering. If you would like me to add a link, please drop me an e-mail. Nepenthes Malware Collection Tool. BinNavi (Binary visualization), BinnDiff, VxClass (Unpacker). September 27, 2016. IIA National Conference, Halifax, NS. Eddie Bauer’s POS Breached. See You At BlackHat and DEFCON.
blog.botnetzprovider.de
Why Samsung Knox isn’t really a Fort Knox | BotNetzProvider.de
http://blog.botnetzprovider.de/2014/10/28/why-samsung-knox-isnt-really-a-fort-knox
Ein Security Blog über Honig-Töpfe (honeypots) , Bots und Bitcoin. Why Samsung Knox isn’t really a Fort Knox. Apparently Samsung said in their press release that user should try out My Knox, as Knox Personal is deprecated. I just tried to install it but sadly My Knox only works on Samsung Galaxy S5 and Samsung Galaxy Note4. So Samsung, you're leaving all devices older than the S5 with a vulnerable version of Samsung Knox? Kommentare dieses Artikels abonieren ). Leave a comment Antworten abbrechen. Webser...
lvdeijk.wordpress.com
Lvdeijk's Blog | Random Security Rambling | Page 2
https://lvdeijk.wordpress.com/page/2
December 11, 2009. Posted by lvdeijk in Uncategorized. Well, it seems there are other purposes for RAM carving according to this post on securityfocus. As the article mentions it is mostly used in targeted attacks…for now. If this type of attack becomes mainstream in malware behavior it could develop into a really nasty attack vector. Carving malware from live memory. November 17, 2009. Posted by lvdeijk in Uncategorized. How to get malware. A honeypot designed for collecting malware is a machine that em...
blog.botnetzprovider.de
Plesk | BotNetzProvider.de
http://blog.botnetzprovider.de/tag/plesk
Ein Security Blog über Honig-Töpfe (honeypots) , Bots und Bitcoin. Plesk Update SSL Zertifikate. Normalerweise werden für den Login im Plesk eigene generierte SSL-Zertifikate erstellt, die beim Login auf https:/ meine-domain.tld:8443 aufgerufen werden. Weiterhin werden SSL-Zertifikate für einzelne Domains, z.B. Online-Shops,etc zur sicheren Übertragung von Kundendaten genutzt. Durch den " Heartbleed-Bug. Können diese sensiblen Daten (Benutzernamen, Passwörter) mitgelesen werden! Diese Version ist von die...
blog.botnetzprovider.de
Heartbleed-bug | BotNetzProvider.de
http://blog.botnetzprovider.de/tag/heartbleed-bug
Ein Security Blog über Honig-Töpfe (honeypots) , Bots und Bitcoin. Plesk Update SSL Zertifikate. Normalerweise werden für den Login im Plesk eigene generierte SSL-Zertifikate erstellt, die beim Login auf https:/ meine-domain.tld:8443 aufgerufen werden. Weiterhin werden SSL-Zertifikate für einzelne Domains, z.B. Online-Shops,etc zur sicheren Übertragung von Kundendaten genutzt. Durch den " Heartbleed-Bug. Können diese sensiblen Daten (Benutzernamen, Passwörter) mitgelesen werden! OneCoin Scam – Stüm...
blog.infosanity.co.uk
Mercury – Live Honeypot DVD | Infosanity's Blog
https://blog.infosanity.co.uk/2010/09/22/mercury-live-honeypot-dvd
Offensive and Defensive IT Security. Mercury – Live Honeypot DVD. Mercury – Live Honeypot DVD. UPDATE Live download mirror: carnivore.it. Mercury Live DVD was initially (I believe) announced in a post. To the Nepenthes Mailing list. It is a remastered Ubuntu distribution with pre-installed honeypot applications and malware analysis tools created by John Moore. From the ReadMe:. The majority of the additional applications reside in /opt:. 8211; Fuzzy Fingerprinting is a util to aid SSH MitM attacks. Svn r...