Tools

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Robert has a nice exploration of Intel's new processor named Nehalem.
    Errata Security: Nehalem vs. IDS
    Tags: ( hardware intel cpu )
  2. Andy speaks some truth about the user's responsibility in the security equation.
    Are we being irresponsible? >> Andy ITGuy
    Tags: ( awareness )
  3. The start of what looks to be a neat series. lsof is an awesome tool.
    Black Fist Security: *nix command of the day
    Tags: ( tools unix )
  4. Here is an interesting story about a different cyber-crime target. Still very lucrative.
    Hackers Steal Millions in Carbon Credits | Threat Level | Wired.com
    Tags: ( crime )
  5. This is a really good read.
    Jeremiah Grossman: The Web won't be safe, let alone secure, unless we break it
    Tags: ( wepabbsec )
  6. Securosis is looking for participants for some closed surveys. Check this out if you want to help.
    Securosis Blog | Need Brains. User Brains
    Tags: ( surveys )
  7. Want to setup and virtual network security testing lab? Check this out.
    In Lieu of... << Laz3rNet
    Tags: ( lab how-to )
  8. Windows 2008/7 offers new functionality that may help ease the pain of service accounts. (Hat tip: @grey_area)
    Service Accounts Step-by-Step Guide
    Tags: ( windows )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. This is a good article to look at if you are thinking about the cloud and your business. (Hat Tip: @infosecstuff)
    Cloud Security: Ten Questions to Ask Before You Jump In
    Tags: ( cloud )
  2. Another interesting tool today. Use Bing to find associated IP address and DNS hostnames. (Hat Tip: @lbhuston)
    Bing Web Server Probe
    Tags: ( tools webappsec )
  3. This looks like an interesting tool to add to your web app sec Firefox toolkit.
    Groundspeed 1.1 - Web Application Security Add-on For Firefox | Darknet - The Darkside
    Tags: ( webappsec tools firefox )
  4. Jarrod shares how he got into information security and offers some thoughts on making your own move.
    /dev/null - ramblings of an infosec professional: How to Get A Start in Information Security
    Tags: ( career )
  5. Ben is up next on the D-list interviews. I know Ben from Twitter and hope we can meet IRL someday.
    Andrew Hay >> Blog Archive >> Information Security D-List Interview: Ben Jackson
    Tags: ( interview )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. William is building a taxonomy of cloud computer benefits. Go check it out and contribute.
    William Vambenepe -- Taxonomy of Cloud Computing Benefits
    Tags: ( cloud )
  2. Brian is interested in finding out what kind of internet users his readers think they are.
    What Kind of Internet User Are You? -- Krebs on Security
    Tags: ( general )
  3. Burp Suite v1.3 has been released.
    PortSwigger.net - web application security: Burp Suite v1.3 released
    Tags: ( webappsec tools burp )
  4. Port knocking is a pretty nifty technique for providing remote access to your system while it appears to be unreachable via the network. It involves sending a specific set of packets or a specifically crafted packet to nominally "closed" ports on your system. The firewall or add-on tooling listens for these packets and then opens the appropriate ports when it sees them. This page has a list of tools that you can use to setup port knocking.
    PORTKNOCKING - A system for stealthy authentication across closed ports. : IMPLEMENTATIONS : implementations
    Tags: ( remote-access port-knocking )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Just in case you need some help security your IIS based FTP server.
    Securing your FTP Server 101 - Nazim's IIS Security Blog : The Official Microsoft IIS Site
    Tags: ( iis ftp tips )
  2. Sunbelt has a free tool available that will decrypt files that have been encrypted by the Data Doctor 2010 ransomware.
    Sunbelt Blog: Data Doctor 2010 encrypted files: we have a tool for that
    Tags: ( malware tools )
  3. Johannes shares a few handy scripts to have in your toolbelt if you are every faced with a denial of service attack.
    DoS Attack After Action Report - Shell Scripts
    Tags: ( ddos tools )
  4. Not sure yet exactly what this accomplishes. I did it and you get a big list of things you can do, some of which you can easily do in other places and some that appear unique. It will be fun to find out what's in there.
    Get your Windows 7 God Mode Groove On | Security Active Blog
    Tags: ( windows-7 tips )
  5. This list, in many cases, relates to information security like Dilbert relates to working in the corporate world, which is a very sad thing.
    Top 10 Reasons Your Security Program Sucks and Why You Can't Do Anything About It << Amrit Williams Blog
    Tags: ( general )
  6. This looks like something fun to play with, a new entry in the open source IDS/IPS arena.
    System Advancements at the Monastery >> Blog Archive >> Suricata: A Next Generation IDS/IPS Engine
    Tags: ( ids suricata )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. I think I pointed to part 1 of this article, but can't remember and am a bit too lazy at the moment to go look :) Either way, the second part is up and you will find a link to the first part inside. It is some pretty cool stuff from a visualization perspective.
    Detailed look at using Circos for IT Investigation - Part II << fifth.sentinel
    Tags: ( tools )
  2. This is a must read. I'm not saying anything else other than go read it. Now. Hurry!
    Verizon Business Security Blog >> Blog Archive >> 2009 Data Breach Investigations Supplemental Report
    Tags: ( verizon dbir )
  3. Heh. The first of a series of interviews by Andrew.
    Andrew Hay >> Blog Archive >> Information Security D-List Interview: Paul Asadoorian
    Tags: ( interviews )
  4. Here is an interesting perspective on the wonderful addition of Google and Bing integrating Facebook and Twitter status updates into search results.
    Google, Bing open new criminal opportunities by adding Twitter, Facebook feeds | The Last Watchdog
    Tags: ( malware facebook twitter search google )
  5. The Social Security Blogger Awards will be happening again at RSA 2010. If you have a security blog and want to be considered you need to become a member of the Security Bloggers Network. Check inside for details.
    The Ashimmy Blog: Social Security Blogger Awards 2010
    Tags: ( sbn awards )
  6. Chris's slides and handouts from his State of (In)Security talk at the 2009 MN-GTS conference are available for a short while.
    Dr. InfoSec: MN-GTS - The State of (In)Security in 2009
    Tags: ( general )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

It is Thanksgiving Day week in the U.S. and that means a couple of days off. I decided to tack on an extra day and won't be working tomorrow either. Yay! Five days off in a row.

Anywho, I will also be taking those days off from the Interesting Bits posts so this one will have to tide you over until Monday :)

Here are today's Interesting Information Security Bits from around the web.

  1. 10 things to think about not doing when on Facebook. This list will keep you safer.
    Errata Security: 10 Facebook Don'ts
    Tags: ( facebook )
  2. Is your iPhone infected with the Duh worm? Paul tells us how to clean it up.
    How to clean up the Duh iPhone worm | Paul Ducklin's blog
    Tags: ( iphone worm )
  3. Russel is looking for some collaborators on an research project he is working on. It looks to be very interesting. From his post: "The topic is the arms race between attackers and defenders from the perspective of innovation rates and "evolutionary success" - the Red Queen problem (running just to stand still). Here's a sample research question: "can bureaucracies (defenders) keep up with a decentralized black market (attackers)?", and similar." Read the rest of the post and drop him a line if you are interested.
    Information Security as an Evolutionary Arms Race - Research Collaborators Wanted << The New School of Information Security
    Tags: ( research )
  4. Shrdlu once again has penned an article that you should go read. Metrics are great, but they have to mean something.
    The meaning of metrics
    Tags: ( metrics risk )
  5. There is 0-day out there for IE 6 and IE 7. Microsoft's recommendation in some cases is to upgrade to IE 8. Um, oops.
    Major IE8 flaw makes 'safe' sites unsafe
    Tags: ( ie vulnerabilities )
  6. An interesting post that explores a conundrum that some organizations face when trying to comply with PCI. What happens when some of what I do requires me to be out of compliance with PCI-DSS?
    Branden Williams's Security Convergence Blog >> Multi-Function Service Providers, What To Do?
    Tags: ( pci )
  7. From the post: "We have uploaded the audio recording of select talks from the Ohio Information Security Summit that took place October 29-30, 2009 in Cleveland, Ohio." Looks like some good stuff is available. Check out the post for the details.
    Security Justice >> Blog Archive >> Select Talks from ISS2009 Now Available for Download
    Tags: ( audo conferences talks )
  8. A new tool is available that shows some interesting things about the internet.
    Room362.com - Blog - SHODAN The Computer Search
    Tags: ( tools )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Andy poses the question (paraphrased) "You get to build a security program from the ground up. How do you go about it?" Go over and offer your thoughts.
    Building a security program from the ground up >> Andy ITGuy
    Tags: ( infosec-program )
  2. Want to learn how to write exploits. You should really check out Dino's exploitation class. I'll be going through it at my earliest convenience. Oh, and by the way, it's free.
    Penetration Testing and Vulnerability Analysis - Exploitation
    Tags: ( class education explolits )
  3. From the site: A group of PenTesters/Researchers have gotten together with the purpose of posting their useful scripts. Feel free to submit your scripts, we will gladly review them, even post them crediting you. You can submit them at scripts@pentesterscripting.com
    start [PenTester Scripting]
    Tags: ( pentest scripts tools )
  4. Some interesting thoughts that Richard shares from a talk given by Michael Hayden.
    TaoSecurity: Notes from Talk by Michael Hayden
    Tags: ( general )
  5. I agree with the Infosec Cynic. Allowing non-Latin characters is going to open up a whole new way for evil to be propagated.
    International Websites | The Infosec Cynic
    Tags: ( dns )
  6. If you haven't heard yet, there is a worm running around that Rick Rolls iPhones that have been jailbroken. This post isn't really about the worm, but about the individual who wrote, released and then talked about doing it.
    Worm author tells media he initially infected 100 iPhones | Graham Cluley's blog
    Tags: ( general worm iphone )
  7. A nifty use of netcat to image a drive over the network.
    How-to: Cloning a (Laptop) Hard Drive using DD over the network | Roer.com - Kai Roer's Rants on Infosec
    Tags: ( backup imaging )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Microsoft has released their free anti-virus/anti-malware tool.
    Microsoft's New Tool in the Fight Against Malware Free to Consumers - Technology News - redOrbit
    Tags: ( anti-virus anti-malware free microsoft )
  2. Eric has a couple of interesting tools that might be fun to play with. One is an HTTP based SSH client. It runs on the server with no client other than a browser. The other is called Sockets Over HTTP (SOHT)
    EricDaugherty.com - Eric Daugherty's Open Source Projects
    Tags: ( tools evasion )
  3. Mike Murray is a cool dude. He made a promise and followed through on it. Check out this post to see the full version of the talk he gave at Hacker Halted.
    Hacker Halted Redux
    Tags: ( social-engineering video )
  4. Need to get around Green Dam censorship for some reason. Check out Dam Burst.
    jon.oberheide.org - blog - disabling green dam with dam burst
    Tags: ( green-dam dam-burst )
  5. I have pointed out the other articles in Alec's investigations into using entropy to detect encrypted sessions in live network traffic. Here is a continuation of that study. This is extremely cool and has the geek in me all excited :)
    Detecting encrypted traffic with net-entropy, part two << wirewatcher
    Tags: ( encryption network-forensics )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Adrian takes a look at a few database encryption myths.
    Securosis Blog | Database Encryption Misconceptions
    Tags: ( database encryption )
  2. The Infosec Cynic interviews Anton Chuvakin.
    Anton Chuvakin - Stuck In the Lift With The Cynic | The Infosec Cynic
    Tags: ( interview )
  3. A new free encryption tool is available. This one is provided by Sophos. That's pretty cool.
    Guest blog: Sophos Free Encryption | Graham Cluley's blog
    Tags: ( encryption tools sophos )
  4. Mark points out that Federal CIO Council's Information Security and Identity Management Committee released a document titled "Guidelines for Secure Use of Social Media by Federal Departments and Agencies." This is good stuff even if you aren't in the public sector.
    New Social Media "Guidelines" - Securing GovSpace
    Tags: ( social-networking guidelines )
  5. This is worth a read and a watch. It is the talk given by Matsano and Nate McFetters at last year's C4 conference. It is some guidance for independent Apple software developers. It also applies to non-apple developers too.
    Matasano Security LLC - Chargen - Indie Software Security: A ~12 Step Program
    Tags: ( sdl )
  6. Jack gives his perspective of the recent Massachusetts 201 CMR 17.00 public hearing. He was not impressed.
    Uncommon Sense Security: Making sausage, one hearing at a time
    Tags: ( law policy )
  7. The BruCon videos are up on the wiki and Xavier is also hosting a local copy.
    /dev/random >> BruCON Talks Video Mirror
    Tags: ( brucon videos )
  8. If you are having some issues with sqlninja and metasploit, take a look at this post.
    RaDaJo (RAul, DAvid and JOrge) Security Blog: Sqlninja & Metasploit
    Tags: ( sqlninja metasploit )
  9. Malware, like all software, tends to have common traits. This article talks about what some of them are.
    Categories of Common Malware Traits
    Tags: ( malware )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! Sorry for missing both Friday's and yesterdays bits posts. My Friday was spent working with Habitat for Humanity on a new home for a deserving family. It was a great experience and I heartily recommend it as time well spent. Yesterday was just too busy :)

Anyway, here are today's, and a few from this weekend, Interesting Information Security Bits from around the web.

  1. A new version of OffVis is available along with a training video.
    Security Research & Defense : OffVis updated, Office file format training video created
    Tags: ( tools microsoft office )
  2. Here is an interesting adaption of "The Joel Test."
    Matasano Security LLC - Chargen - The Joel Test: 12 Steps To Better IT Management
    Tags: ( general )
  3. A great article from Russel. This one contains some tips for building an Information Security Risk Scorecard.
    12 Tips for Designing an InfoSec Risk Scorecard (its harder than it looks) << The New School of Information Security
    Tags: ( scorecard risk )
  4. This is a very interesting article about backups and virtualization strategies. A very import part of your strategy needs to be, How are you going to deal with backups?
    The Side Effects of Backup on Server Virtualization - Backup & Beyond
    Tags: ( virtualization backup )
  5. The latest version of the SANS Top Cyber Security Risks report is out.
    SANS: The Top Cyber Security Risks
    Tags: ( risks )
  6. Here is a nice article with some questions to ask when considering the implementation of an identity management solutions. (Hat Tip: http://securityblog.typepad.com)
    12 questions to ask before implementing an identity management system -- Government Computer News
    Tags: ( identity-management )
  7. The Security Twits bus is off on another adventure as it gathers up a bunch to twits and heads to SecTor. Let Jack know if you want to be picked up :)
    Uncommon Sense Security: Security Twits Road Trip III, the SecTorBus
    Tags: ( conferences security-twits )
  8. Rsnake has a whole pile of HTTP headers for you to play with should you want to. I bet some interesting things can be found out.
    Half a Million HTTP Headers ha.ckers.org web application security lab
    Tags: ( data )
  9. An entirely virtual security conference is taking place on November 6th-8th. Very cool. What's even better is that all CFPs are being accepted.
    SecurityTubeCon - Democratizing Hacker Cons
    Tags: ( conference cfp securitytube )
  10. Want to setup some motion sensors to tweet activity? Ax0n shows us how.
    HiR Information Report: Gustav, the hackerspace twitter-bot
    Tags: ( hardware-hacking )
  11. SynJunkie took a short break from his CCNA studies (good posts in that series too) to give a post about using Fgdump, John the Ripper and Powershell together to do some nifty scripted password auditing.
    Syn: Password Auditing with Fgdump, John the Ripper & PowerShell
    Tags: ( passwords cracking )
  12. Russel has an interesting challenge for us. I know a few in academia that might enjoy this conversation.
    This Friday is "Take an Academic Friend to Work Day" << The New School of Information Security
    Tags: ( general )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }