Quantcast
Channel: InfoSec – Infosanity's Blog
Browsing all 15 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

John the Ripper 101

For those that don’t already know, John the Ripper is: a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix...

View Article



Image may be NSFW.
Clik here to view.

A Northern Geek’s trip South

Tuesday started fine, train down the capital a chance to meet up with the London work team. So far so good, until a colleague suggested a ‘quiet’ drink after work. Ended up not being too quiet after...

View Article

Image may be NSFW.
Clik here to view.

SSH Tunnelling Example

Towards the end of last year I spent a few hours trialling SSH tunnels, I knew how the process worked but hadn’t had much cause to use it in anger; so my lab got some use instead, and a post was...

View Article

Image may be NSFW.
Clik here to view.

Kippo – pass.db

After a few weeks running my daily Kippo review script I’ve noticed that whilst I’m still mostly receiving several logins per day, it’s rare for a connection to actually interact with my emulated...

View Article

Image may be NSFW.
Clik here to view.

AVG & FUD?

Like most techies I get the job of fixing and maintaining relatives’ PCs. As part of this after fixing whatever is broken I have some common clean-up and install routines that I go through to both help...

View Article


Image may be NSFW.
Clik here to view.

Book Review: Zero day

Written by Microsoft’s Mark Russinovich, Zero Day focuses on the actions of a security consultant who starts a job for a client who’s systems have been infected with unknown malware and taking out of...

View Article

Image may be NSFW.
Clik here to view.

Book Review: Kingpin

Written by journalist Kevin Poulsen (of wired.coms Threat Level blog), KingPin spans the hacking, cracking and carding underworld spread over several decades. The narrative covers the life and...

View Article

Image may be NSFW.
Clik here to view.

Cuckoo Sandbox 101

It’s a while since I’ve found time to add a new tool to my malware environment, so when a ISC post highlighted a new update to Cuckoo sandbox it served as a good reminder that I hadn’t got around to...

View Article


Image may be NSFW.
Clik here to view.

HoneyD network architecture

I was recently asked about the network configuration I use for my honeyd sensor. I had thought I’d already written about this so initially went to find the article on honeyd configuration; but my...

View Article


Image may be NSFW.
Clik here to view.

ms12-020 mitigations

This week has been an interesting one for followers of the info-sec arena. On Tuesday Microsoft released a patch and security bulletin for MS12-020 for a critical flaw in remote desktop protocol,...

View Article

Image may be NSFW.
Clik here to view.

Online Bank Cards

The reaction most people have when you point out people are naive enough to post pictures of credit and debit cards online is to laugh, surely no one could be that unaware of the risks. But the fact is...

View Article

Image may be NSFW.
Clik here to view.

Stupidity, begets stupidity – and no security

I realised whilst at work today that my credit card wasn’t in my wallet, after hoping against hope that it would be in yesterday’s trouser pocket when I got home I had to accept that it was lost. Far...

View Article

Image may be NSFW.
Clik here to view.

Google Glass: New threat or business as usual?

Woke this morning to find several articles covering the release of a short script designed to locate and ultimately block wearers of Google Glass from accessing a wireless network. This was apparently...

View Article


Image may be NSFW.
Clik here to view.

Book Review: Zero day

Written by Microsoft’s Mark Russinovich, Zero Day focuses on the actions of a security consultant who starts a job for a client who’s systems have been infected with unknown malware and taking out of...

View Article

Image may be NSFW.
Clik here to view.

Book Review: Kingpin

Written by journalist Kevin Poulsen (of wired.coms Threat Level blog), KingPin spans the hacking, cracking and carding underworld spread over several decades. The narrative covers the life and...

View Article

Browsing all 15 articles
Browse latest View live




Latest Images