blog.webfend.com
blog.WebFend.com: Linux Password Protect Zips
http://blog.webfend.com/2011/07/linux-password-protect-zips.html
Served Fresh and Witty With Extra Spice! Wednesday, July 6, 2011. Linux Password Protect Zips. Those of us who work around malware often need to password protect malware specimen within a zip archive in order to avoid accidental infection and/or antivirus quarantine. I can never remember the syntax for doing this from the Linux command line and it always seems hard to find via google, so I thought I would document it here. Zip -P password -r output.zip input file(s). Posted by Matt Myrick.
blog.webfend.com
blog.WebFend.com: Analyzing Flash Files
http://blog.webfend.com/2011/12/analyzing-flash-files.html
Served Fresh and Witty With Extra Spice! Thursday, December 8, 2011. A friend told me about this, so I thought I'd share. Xxxswf.py is a Python script for carving, scanning, compressing, decompressing and analyzing Flash SWF files. The script can be used on an individual SWF, single SWF or multiple SWFs embedded in a file stream or all files in a directory. The tool could be useful for system admistrators, incident response, exploit analyst, malware analyst or web developers. Posted by Matt Myrick.
blog.webfend.com
blog.WebFend.com: Simply Adding To The GIT Repo
http://blog.webfend.com/2012/11/simply-adding-to-git-repo.html
Served Fresh and Witty With Extra Spice! Monday, November 19, 2012. Simply Adding To The GIT Repo. Seems I'm always forgetting the git syntax for checking things into the repo.simply follow the steps below and you should be alright. Before you make changes to your local git dir. Git pull / to get you in sync with the main repo. Write your file to the local git directory where you want it. Git status / this will give you an idea of the changes. Git commit -m "some witty comment here". Posted by Matt Myrick.
blog.webfend.com
blog.WebFend.com: Splunk For Dummies
http://blog.webfend.com/2011/05/splunk-easy-way.html
Served Fresh and Witty With Extra Spice! Saturday, May 14, 2011. Splunk can be instrumental when it comes to aggregating and correlating data. However, like any tool there is a learning curve involved. Migrating away from Linux command line tools and learning something new when you're already pressed for time can slow the learning process. I've included a tidbit below that will help you get your data into splunk as quickly as possible. Posted by Matt Myrick. October 5, 2015 at 11:41 PM.
blog.webfend.com
blog.WebFend.com: The Basics of Linux Screen
http://blog.webfend.com/2013/01/the-basics-of-linux-screen.html
Served Fresh and Witty With Extra Spice! Wednesday, January 16, 2013. The Basics of Linux Screen. Screen is an awesome utility that offers the ability to detach a long running process (or program, shell-script, irc window, etc.) from a session and then attach it back at a later time. Below are the basics:. To get started, enter:. To see your existing screen sessions, enter:. To detach an attached screen, enter:. To re-attach to a detached screen, enter:. Posted by Matt Myrick. The Basics of Linux Screen.
blog.webfend.com
blog.WebFend.com: Android and the long-lived authToken
http://blog.webfend.com/2011/05/android-and-long-lived-authtoken.html
Served Fresh and Witty With Extra Spice! Wednesday, May 18, 2011. Android and the long-lived authToken. I was very disappointed to hear about Android sending long lived ( 2 weeks) auth tokens in the clear for Google services.very similar to the Facebook/Firesheep issue. There are a few writeups, but the research was originally done by Ulm University ( http:/ www.uni-ulm.de/en/in/mi/staff/koenings/catching-authtokens.html. May 18, 2011 at 10:05 PM. May 19, 2011 at 11:04 AM. Give the wireless providers the...
blog.webfend.com
blog.WebFend.com: Harvesting Actionable Security Intelligence From Palo Alto Networks Botnet Report
http://blog.webfend.com/2014/09/harvesting-actionable-enterprise.html
Served Fresh and Witty With Extra Spice! Friday, September 19, 2014. Harvesting Actionable Security Intelligence From Palo Alto Networks Botnet Report. If you're looking to leverage every last bit of your security investment from your Palo Alto Networks firewall, you will be pleasantly surprised by the botnet report. The BASH script below will automatically harvest and email only the highest level of alerts to an email of your choice for further analysis! Type=report&reporttype=predefined&reportname=botn...
blog.webfend.com
blog.WebFend.com: Interesting Bredo Phish..
http://blog.webfend.com/2011/05/interesting-bredo-phish.html
Served Fresh and Witty With Extra Spice! Thursday, May 5, 2011. 1837110.61, Wed, 4 May 2011 08:31:43 0000 (UTC). Not real, duuh). You visit illegal websites. Sir/Madam,we have logged your IP-address on more than 40 illegal Websites. Important: Please answer our questions! The list of questions are attached. pj aom vf. Guess what's attached. Document.zip ( 9a2bb7c1cfd069e4db5e7d46dadce561. Containing document.exe ( bd3648a60c4c4760db19bba544c2e8d2. So sad that this works still. Posted by Mike Ciavarella.
blog.webfend.com
blog.WebFend.com: Rename Perl script on the Mac
http://blog.webfend.com/2011/05/rename-perl-script-on-mac.html
Served Fresh and Witty With Extra Spice! Friday, May 20, 2011. Rename Perl script on the Mac. I love Linux and BSD. I also love my Mac. I really like the user interface, and the underlying BSD roots. (Insert generic Mac fan-pitch). There are a few things which drive me NUTS about the BSD underpinnings of the Mac, though. MacPorts. Shipped with Redhat) is just a perl script. Sorry for the lame code posting.blogspot sucks with that.or I suck finding a better way! Force) { warn "$was not renamed: $ already ...
blog.webfend.com
blog.WebFend.com: Hackers breached U.S. defense contractors (Reuters)
http://blog.webfend.com/2011/05/hackers-breached-us-defense-contractors.html
Served Fresh and Witty With Extra Spice! Saturday, May 28, 2011. Hackers breached U.S. defense contractors (Reuters). Unknown hackers have broken into the security networks of Lockheed Martin Corp ( LMT.N. And several other U.S. military contractors, a source with direct knowledge of the attacks told Reuters. ". They breached security systems designed to keep out intruders by creating duplicates to "SecurID" electronic keys from EMC Corp's ( EMC.N. May 30, 2011 at 9:46 PM. Rename Perl script on the Mac.