Most networks these days run behind some type of network router/firewall device. Most commonly home office and SOHO networks use small firewall/routers made by companies such as Linksys, D-Link, and Netgear to provide their network connectivity. The problem is these devices are often weak, underpowered, and feature limited. The solution? Building your own!
Friday, September 30, 2005
Debian Firewalls
Thursday, September 29, 2005
Sniffing the Air (or How I learned to stop worrying and love the Pig)
Wednesday, September 28, 2005
Defeating Citi-Bank Virtual Keyboard Protection
More details can be found at:
http://xforce.iss.net/xforce/xfdb/21727
http://www.us-cert.gov/cas/bulletins/SB05-222.html
http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=17684
http://www.virus.org/Article151.html
Download link of the PoC:
http://www.hackingspirits.com/vuln-rnd/defeat-citibank-vk.zip
BatteryUniversity.com
The presentations are easy-to-read and are limited to about 1000 words. The material is based on the book Batteries in a portable World - A handbook on rechargeable batteries for non-engineers, and is written in condensed form.
Gas Thief Found Asleep at the Scene of the Crime
But 38-year-old Brad Hodson wasn't filling his tank. Police say a 55-gallon barrel was in the back of his van.
Muncie Police Chief Joe Winkle explains, "He had pulled up next to the underground tank and had put a homemade siphoning hose in the underground tank."
Hodson used batteries to do the actual siphoning. But in the process, Chief Winkle says Hodson apparently fell asleep. "The fact it was 5:30 in the morning, he may have just got tired trying to fill that large drum up with gasoline. I'm not sure how fast that happened, but it probably took a little while and he probably just sat back."
And that's how the station manager discovered Hodson when he came to open shop for the day just after five a.m.
Tuesday, September 27, 2005
Think Your Anonymizer is Foolproof?
A patent granted last week, describes a process based on latency, or time lag between computers exchanging data, of "numerous" known locations on the Internet to build a "network latency topology map" for all users. Identifying the physical location of an individual user could then be accomplished by measuring how long it takes to connect to an unknown computer from numerous known machines, and using the latency response to display location on a map.
Monday, September 26, 2005
Dolphin Assassins Menace Gulf of Mexico
Sunday, September 25, 2005
Methods of Conducting Industrial Espionage
The National Counterintelligence Center, which later became the Office of the National Counterintelligence Executive, has been reporting annually to Congress since 1995 about foreign economic collection and industrial espionage. Its reports are freely available as PDF files.
Personal Security - Katrina, When Poor People Have Lost it All
My mom was feeling very hopeful through all this. Then we met with FEMA this morning. After two hours waiting in line for it's cold bureaucratic embrace, her hope started to flicker.Link to the blog where Siege is documenting the trip, and efforts to raise funds to buy his mom and brother a new home (he's auctioning off prints of his erotic, fashion, and portrait work for that purpose).This is what it looks like when poor people have lost it all, and are told to get in line. Which line? Did you fill out that form? I hear they suspended the vouchers. Who do I call for shelter? Call this 800 number to get your number. But sir, I don't have a phone. Go to this website to get a number. But sir, I don't have a computer, or a home to put it in, or a phone to connect it to.
Saturday, September 24, 2005
Homeland Security protecting a Honey Baked Ham store. I’ll sleep better tonight...
Overall, Online Banking Sites are Laggards in Service Levels Compared to Credit Card and Stock Trading Sites
Friday, September 23, 2005
Crave privacy? New Tech Knocks out Dgital Cameras
The technology they've devised detects the presence of a digital camera up to 33 feet away and can then shoot a targeted beam of light at the lens, according to Shwetak Patel, a grad student at the university and one of the lead researchers on the project.
That means that someone trying for a surreptitious snapshot of, say, a product prototype or an amorous couple gets something altogether less useful--a blurry picture (or a video) of what looks like a flashlight beam, seen head on. (Info and video of how the system works can be viewed here.)
Thursday, September 22, 2005
Greyhats Security is Back
- New layout and navigation.
- A promise that: Bias is gone. No more criticism to either Microsoft nor Mozilla will be found on the website unless it is deemed as necessary for the progress of computer security.
You can find Greyhats Security at its old address, http://greyhatsecurity.org.
Wednesday, September 21, 2005
Magical Jelly Bean Keyfinder v1.41
The Magical Jelly Bean Keyfinder is a freeware utility that retrieves your Product Key (cd key) used to install windows from your registry. It has the options to copy the key to clipboard, save it to a text file, or print it for safekeeping. It works on Windows 95, 98, ME, NT4, 2000, XP, Server 2003, Office 97, and Office XP. This version is a quick update to make it work with Windows Server 2003.
Tuesday, September 20, 2005
Linux-based Handheld that's Open, Powerful and Cheap
It can play games. It can play your Movies. It can play your music. It can view photos. It can read Ebooks. It runs on just 2 AA batteries - And it can do all this in the palm of your hand or on your TV screen.
It runs the free Linux operating system. This means a whole world of Games, Utilities and Emulators are at your disposal. Quake, Doom, SNES, Megadrive, MAME, Media players and Applications to name just a few.
It's powerful - Two 200mhz CPU's with 64meg of RAM, custom graphics hardware and decoding chips. Takes SD cards and has 64M of NAND memory. Plenty to play with. One of the most powerful and advanced handhelds today.
It's cheap. Just $189.99.
It's open. You want to develop your own games for the GP2X? Go right ahead. The SDK is included with the system free. Not since the days of the Amiga has a system been so easy to develop for, commercially and for fun.
The GP2X isn't just another wannabe be Gameboy. Its a whole different design. A whole new idea for a handheld games system.
But wait, we're not new to the scene. Heard of the GP32? An accidental experiment in an open source handheld that went right. Some 30,000 units were sold worldwide, mostly in the UK and parts of Europe. The machine has an astonishing following. The GP2X is the successor.
An Introduction to Application Security Testing with Open Source Tools
Monday, September 19, 2005
PASSWORDMAKER - Browser Extension
How It Works
You provide PASSWORDMAKER two pieces of information: a "master password" -- that one, single password you like -- and the URL of the website requiring a password. Through the magic of one-way hash algorithms, PASSWORDMAKER calculates a message digest, also known as a digital fingerprint, which can be used as your password for the website. Although one-way hash algorithms have a number of interesting characteristics, the one capitalized by PASSWORDMAKER is that the resulting fingerprint (password) does "not reveal anything about the input that was used to generate it." In other words, if someone has one or more of your generated passwords, it is computationally infeasible for him to derive your master password or to calculate your other passwords. Computationally infeasible means even computers like this won't help!
Hackers target VoIP
Malicious hackers are turning their attention to the technology behind net phone calls, says a report.
The biannual Symantec Threat Report identified Voice over IP (Voip) systems as a technology starting to interest hi-tech criminals.
The report predicted that within 18 months, Voip will start to be used as a "significant" attack vector.
As well as prompting new attacks, Voip could also resurrect some old hacking techniques, warned the report.
Sunday, September 18, 2005
Spam Map
Mailinator is about saving you from spam. But in the process it ends up getting plenty of its own (averaging over a million emails a day!). This map shows (in semi-realtime) ip addresses that are currently sending the most spam to Mailinator.
Saturday, September 17, 2005
LA Power Outage
An inaccurate work order led a crew to cut the lines that caused Monday's power outage to 2 million people in Los Angeles, the city's Department of Water and Power has determined.
"It was a case of miscommunication," Henry Martinez, an assistant general manager for the DWP, said Thursday.
DWP engineers who planned the replacement of a control system at a Toluca Lake receiving station specified that a bundle of three charged lines should be left intact, but work drawings handed to the crew called for the lines to be cut and removed, Martinez said.
The wire cutters used by the work crew closed a circuit between two live wires, triggering circuit breakers that shut down the receiving station and began the power outage, he said.
The agency is still trying to determine who drafted the work drawings that differed from the engineers' plans.
Nation's Critical Infrastructure Vulnerable to Cyber Attack
WASHINGTON, D.C., September 15, 2005 – In testimony before the House Science Committee today, the Chief Information Officers (CIOs) of major U.S. corporations warned Congress that the nation’s critical infrastructure remains vulnerable to cyber attack. The witnesses said the economy is increasingly dependent on the Internet and that a major attack could result in significant economic disruption and loss of life.
Urging action to address this vulnerability, the witnesses advocated increased funding for cybersecurity research and development (R&D) and greater information sharing between industry and government and among various sectors of industry. Witnesses also urged greater federal attention to cybersecurity and praised the creation of an Assistant Secretary for Cybersecurity at the Department of Homeland Security (DHS).
Friday, September 16, 2005
The Next 50 Years of Computer Security: An Interview with Alan Cox
According to Alan Cox, we're just at the beginning of a long journey into getting security right. Eager for directions and a glimpse of the future, O'Reilly Network interviewed him about his upcoming keynote.
Fridays are for fun... Do You Like to Watch?
Thursday, September 15, 2005
National Vulerability Database (NVD)
Wednesday, September 14, 2005
Goolgle's Beta Blog Search Engine
Sunday, September 11, 2005
Whax and Auditor Want to Merge
Post your suggestions to the forum at: http://forum.remote-exploit.org/viewtopic.php?p=5488#5488
Saturday, September 10, 2005
25 Mind-Numbingly StupiStupid Quotes about Hurricane Katrina
Friday, September 09, 2005
Marcus Ranum's "The Six Dumbest Ideas in Computer Security"
School Security
A Cincinnati-area mother says her 12-year-old daughter was humiliated and eventually stunned with a taser gun by Cincinnati Police inside Burton Elementary School Wednesday.
Nmap Port Scanner Gets an Upgrade
After more than 7 months of solid work, Insecure.Org is pleased to announce the immediate, free availability of the Nmap Security Scanner version 3.90. Changes in this massive update include: the ability to send and properly route raw ethernet frames, ARP scanning (for faster and more reliable local LAN host discovery), MAC address spoofing, enormous version detection and OS detection updates, dramatic Windows performance and stability improvements, 'l33t ASCII art, OS/hostname/device type detection via service fingerprinting, dozens of bug fixes and much more. Read the Changelog for the full scoop. Or snag a copy from the download page!
Thursday, September 08, 2005
Email Policy Enforcement Story from Australia
TWO secretaries at one of Sydney's top law firms have been sacked after a catty email exchange that was circulated around the city's legal and financial district.
Allens Arthur Robinson has been rocked by the cyber brawl, which began over a missing ham sandwich and ended with one woman taunting the other for being unable to hold on to a boyfriend.
In a warning to everyone who uses email at work, Allens confirmed that Katrina Nugent and Melinda Bird had been sacked and other high-flyers were facing disciplinary action.
Survival of New Orleans Blog
also
FEMA Blocks Photos of New Orleans Dead. Apparently the First Amendment of the US Constitution is rescinded by decree. The fact is they do no want the public to witness the horror of their botched job. Where is the outrage? The bloggers will have to do it...
Nerd TV
NerdTV is essentially Charlie Rose for geeks - a one-hour interview show with a single guest from the world of technology. Guests like Sun Microsystems co-founder Bill Joy or Apple computer inventor Steve Wozniak are household names if your household is nerdy enough, but as historical figures and geniuses in their own right, they have plenty to say to ALL of us. NerdTV is distributed under a Creative Commons license so viewers can legally share the shows with their friends and even edit their own versions. If not THE future of television, NerdTV represents A future of television for niche audiences that have deep interest in certain topics.
Wednesday, September 07, 2005
Who is Jamming Radio Communications in New Orleans?
He Picked the Victims From a Sheriff's Web Site
Mullen told authorities he targeted at least one of the two men after checking the county sheriff's Web site July 13, according to the police statement.
Tuesday, September 06, 2005
Artists Against 419
An international community of individuals dedicated to fighting advance fee "419" fraud through artistic means! The images on this site are loaded from fraudulent Web sites that are being used in active scams, defrauding people of their money; by visiting this site, you are costing a scammer money.
Monday, September 05, 2005
Everthing Comes in Threes - Ready for #3?
In early 2001 the Federal Emergency Management Agency listed what it believed were the three most likely disasters to face the United States in coming years. One was a terrorist attack on New York City. The second was a hurricane-spawned flood of New Orleans.
Kind of makes you want to know what the third one is, doesn't it? The third is a major earthquake in San Francisco.
The first two have come to pass in under five years. And in both cases, the post-mortems have had two main elements: How could this have been prevented, and could it have been handled better once it occurred?
Sunday, September 04, 2005
Personal Security - Bet Your Life?
Following these remarks is a brilliant piece of reporting by the American Progress Action Fund. It makes a clear case for what we are all now suspecting and seeing: the Bush administration is horribly mismanaging relief efforts along the Gulf Coast. Several things are now becoming clear. It is unlikely that New Orleans will ever be significantly rebuilt. When we talk about collapse as a result of Peak Oil, New Orleans is an exemplary – if horrifying – glimpse of what it will look like for all of us. In the case of New Orleans, however, it’s happening about two or three times as fast as we will see it when Peak Oil becomes an unavoidable, ugly, global reality. How long? Months. If we’re lucky, a year. As of August 2005 it’s not just a race to make sure that a particular region is not eaten by warfare and economic collapse. Mother Nature is obviously very hungry too. What region will be the next to go? What sacrifices can be offered before the inevitable comes knocking at our own personal door? Who can be pushed ahead of us into the mouth of the hungry beast in the hopes it will become sated?(more)
How low can human beings sink? Keep watching the news. It’s not the first time civilizations have collapsed. This has all happened many times before. This behavior is not new. What is new — but is now dying — is our enshrined belief that there were to be no consequences of our reckless consumption and destruction of the ecosystem. What is now dying a horrible death is America’s grotesque global arrogance, brutality and cupidity.
Saturday, September 03, 2005
Gumshoe chases Internet villains in Eastern EU
Microsoft's Enforcement Team employs 65 people world-wide, including former policemen, lawyers and paralegals. The group, which gets a seven-figure annual budget, has 25 investigators including Mr. Fifka.
Friday, September 02, 2005
Hacking in Iraq, Interview with Jake Appelbaum
Incredible Tales Beginning to Emerge — told by bloggers
READ THIS NOW!
More photos (here)
Thursday, September 01, 2005
Wil Wheaton runs a Poker Charity Tournament for Katrina
Will has all the information for anyone wanting to join the tournament.