Security

The things hackers hate their opponents to have :-)

Mcaffee Free tools download without the hassle

It seems that Mcaffee still has files laying around from the Windows 95/98 days on thier download server where they host all of their current files. seems like they might just have a negligent admin or something. anyhow, you can find these files and many more at:
http://downloadcenter.mcafee.com/

it might already be known, maybe not. Thought I would share it.

>$Grey

I wanna learn IT security

I want to learn about IT Security,like forensics,...get my cissp,ccna.cap etc. I can't afford right now to go to school, so i wanna learn it my self. I wanna learn all i can from online sites and sourses.Any online free schools something. I wanna join my husband in the Pc repair business , I figure if i know the security side of it, we can really make money for our family. But I don't know where to start, i just keep finding stuff that says get ready for ccna,cissp etc, but i want to learn the ends and outs. So do any one know any good sites especially videos that i can get on my road to learning all about IT Security. From beggging to end. I have kids so a lot of videos and example with explantions would help so much. Sitting at a computer on hours is not bootylicious. So any help are advice thanks Smile

Destroying hdd: software vs hardware

Ok I've decided to conduct and experiment on data security. I have had many hdd that soon become obsolete and I get rid of them. As usual I did some research on ways to destroy data permanently and tried program after program. I've used dban which was a great open source software to completely rewrite data with 1/0 but it was slow. I then tried active eraser but after I tried r-studio data recovery I was able to recover some data, only like ~2% but 2% is a failure to me. Then I used wipe drive 3.0 which seems to be the best. It's DoD approved and has several write options and is faster than dban but its performance is still based on CPU, ram, mobo, and cd drive specs. I've thought about let's say an extreme case...fake of course lol...where the data on your hdd is sensitive and you need to permanently erase it in minutes not hours. What is the best way? I know having a Disk Degausser Wand would do the trick but how many of us can actually afford one. So here's my questions:

How To Fail At Fuzzing

I felt this was a good post on DailyDave, so I am reposting it. All credit goes to Ben Nagy.
[quote=Ben Nagy]
So, I don't have a blog. I know it's probably wrong to use this list
as a substitute for one, but I am no stranger to wrong.

Or indeed failure.

You can also skip ahead to the end to read about the runtracing / code
coverage / fuzzing template selection tools we released at Ruxcon - as
I promised you may now all have your turn to pick holes in our
implementation and generally poke fun.

At Kiwicon 4 "New Zealand's best (only) hacker con", some beers and I
enjoyed ourselves immensely while presenting a talk entitled "How to
FAIL at Fuzzing". That presentation won me a newly minted award for
"Most Offensive Speaker", and the slide deck I used will never again
see the light of day. However, for those interested, I summarise it
below. Whilst I will attempt to retain some of the, ahem, 'earthy'
tone of the presentation I feel it wiser to omit the bulk of the

Ok weird request coming up...

Bit of a weird request here:

I have noticed an unsecured wireless network in my area that still has the default admin username & password. Naturally i logged in and nosed around just for giggles.

What i want to do is trace the exact location of this router and notify it's owners that it is unsecure and that they could really get fucked over BUT i can't seem to lock it down to to an exact address. I reckon the AP is in my street and (funnily enough) i have a contact number for the user of the AP (ISP username is their telephone number). They are ex-directory.

There are 3 minds I'm in:

1 is to be a bastard, leech the hell oout of their network, max out thier usage etc etc just because
2 is to "do the right thing" and tell them so they can sort it out
3 is to do 2 but do it for them and charge.

I've got the landline number and the router MAC, is there anything i can use to pinpoint exactly which house it is?

Any help? Smile

Note: I am in the UK, not US.

IP?

I'm not sure if I put this in the right category or not, but for me it seemed the best place.
Does anyone know of any trust-worthy IP Maskers? I run on Windows 7.
Thanks.

El Jefe from Immunity

Has anybody followed the news on El Jefe from Immunity? It looks pretty useful and it's will be released under the GPL.

Here is an excerpt from dailydave:
[quote=dave]
There are two issues with modern security monitoring solutions, in my opinion. One is
that they have a low noise to signal ratio. There's just only so much information
about intrusions you can derive from raw network data or random application logs!

The other side of the story is anti-virus, which becomes very keyholed into looking
at activity on a host, when intrusions are typically multi-host events. Likewise,
Anti-Virus and Anti-Malware products tend to be essentially managed services, with no
way for an enterprise to customize use of the infrastructure for intrusion
suppression. (i.e. right now you just have to wait for your AV vendor to get
signatures out the door for Stuxnet variants, even if you've found one on your
systems yourself!)

cisc0ninja? What about all of these cisco advisories

dailydave wrote:
Cisco released a lot of advisories today with "Denial of Service" in them.
Traditionally that means "remotely exploitable" in Cisco-language. Has anyone looked
into them? If you're a CSO/IT manager, I assume you're just sitting around hoping no
one has owned your SSL VPN device, or VOIP device, or router, right? :>

- -dave
(c.f: http://www.cisco.com/warp/public/707/cisco-sa-20100922-h323.shtml)

What are your thoughts on this cisc0ninja?

tscrack

Guys i want to ask what can be a maximum time taken by a tscrack for terminal server located in a same LAN. I tried it in the my own home lan but it took more than 2 hrs with no result. it has 15 letter passwd.

if anybody tried it plz help i need to use only a bruceforce tool. so how many hours i have to wait!

thanks !

User Privileges Escalation

I'd like to get some different ways of escalating privileges within windows. The easier, the better. I've got some thoughts and ideas already, but I'd like to hear back from some of you "seedier" folks.

Local and remote exploits welcome.

http://www.scribd.com/doc/31811266/Windows-XP-Privilege-Escalation-Exploit

http://www.askstudent.com/hacking/demonstration-of-windows-xp-privilege-...

Based on the above, I believe you could also pull the hard drive over to another machine, rename the login.scr, copy cmd.exe to login.scr, return the drive to the original system, boot the system, and wait for the login screen saver to execute, thus giving you system privileges in a command prompt. I'd actually wonder if you could do the same with winlogon.exe to start a full system account login... gonna have to test that one.

Syndicate content