nessus

Hi folks.

The Backtrack 4 USB Drive How-to has undergone a huge re-write. One of the largest changes is that we are no longer using UNetBootin except for one minor thing and then only if you want to. Everything is done from within Backtrack itself now.

Another change is that I have added instructions on setting up encryption with Truecrypt directly into the how-to. Finally, I have added some interesting tweaks such as mounting the Truecrypt volume on boot, changing root's home directory to the encrypted volume on the fly and setting nessus up to log to the encrypted directory.

It still lives in the same place.

If you were using the old how-to and don't want to start over, it is living here now. The parts of the new how-to on encryption and tweaks will still work with the old how-to if you just want to add that bit.

As always, let me know of any problems, typos, mistakes, etc. of which I am sure there are plenty. 🙂

-Kevin

{ 0 comments }

I participated in the Nebraska CERT Conference this week and gave a talk on Building the Perfect Backtrack 4USB Thumb Drive. Below is the slide deck from my talk.

Let me know if you have any comments or questions.

-Kevin

{ 4 comments }

Hi there folks.

With the final release of Backtrack 4 Final right around the corner, I thought I would get ahead of the curve and update the how-to. I have access to the pre-final via the Informer.

The updated version is where the original Beta instructions used to live. I have copied the Beta instructions to a new page. They can be found here.

So here you go.

http://www.infosecramblings.com/backtrack/backtrack-4-usbpersistent-changesnessus/

-Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Nessus 4.0.1 has been released. I will be updating the Backtrack how-to sometime this week to reflect this.
    Tenable Network Security: Nessus 4.0.1 Released
    Tags: ( nessus )
  2. Service Pack 2 for Vista Server 2008 is ready for you to start testing. You do test before deploying, right?
    SP2 For Vista, Windows Server 2008 Available For Download - Security Watch
    Tags: ( vista patches )
  3. Just the thing for that UNIX geek that is so difficult to buy for. Of course, he's going to have to have a pretty good sized cube to hang it in. (via The Register)
    Eric Levenezs' Gorgeous Unix Diagram
    Tags: ( general )
  4. Here is what looks to be a very nice paper on the Kraken bot. I have ready the beginning and look forward to finishing it.
    SecSci Social Scene: Dissecting the Kraken
    Tags: ( botnet kraken analysis )
  5. Paul has posted some slides on using Nessus during a web application assessment.
    Tenable Network Security: Presentation "Using Nessus In Web Application Assessments"
    Tags: ( webappsec nessus )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. This is a great article that peeks into the realities of whether secure coding is less expensive than fixing vulnerabilities after they are detected in production.
    Jeremiah Grossman: Mythbusting, Secure code is less expensive to develop
    Tags: ( cost secure-coding )
  2. You should be aware that you may get IE8 whether you want it or not.
    Security Fix - Microsoft Pushing Out IE8 Through Auto Update
    Tags: ( microsoft patches ie8 )
  3. A nice how-to on using nmap and Nessus together to produce command line Nessus scans.
    Tenable Network Security: Using Nmap Results With Nessus Batch Scanning
    Tags: ( nmap nessus )
  4. Bill gives us some really good advice on how to avoid being the one that needs to look for that new job.
    Career Advice for Security Geeks, Part 1 : The Security Catalyst
    Tags: ( career )
  5. A very nice article regarding what happens when nothing happens.
    The Irony Of Preventing Security Failures - Hacked Off - Dark Reading
    Tags: ( spending )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Christian walks us through how he sandboxed a Windows VM on an Ubuntu server. Good stuff if you ever want to test some bit of evilness.
    un-excogitate.org >> Blog Archiv >> Sandboxing a Windows VM on Ubuntu
    Tags: ( virtualization sandboxing )
  2. Test it yourself, but it looks like Nessus 4 is quite a bit faster than version 3.
    Tenable Network Security: Nessus 4 Performance Benchmarks
    Tags: ( nessus )
  3. Adam writes about outcomes vs. process or technology. I completely agree with him.
    Security is about outcomes, not about process << The New School of Information Security
    Tags: ( general )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 2 comments }

Good morning everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Looks like some new developments in the continuing saga of Conficker.
    Conficker wakes up, updates via P2P, drops payload | Security - CNET News
    Tags: ( conficker malware )
  2. This is a nice resource. You should check it out.
    Security Technical Implementation Guides (STIGS) : Liquidmatrix Security Digest
    Tags: ( guides )
  3. You really need to be aware of this. Google has made available the option for a bi-directional encrypted tunnel to app engine which allows you apps in the cloud to access information on your internal systems. Be very careful here.
    Rational Survivability >> Google's Updated App Engine - "Secure" Data Connector: Your Firewall Means Nothing (Again)
    Tags: ( cloud google )
  4. Portswigger has posted a quick how-to on getting Burp Extender working.
    PortSwigger.net - web application security: Using Burp Extender
    Tags: ( webappsec )
  5. The latest Security Intelligence Report from Microsoft is available. It was released yesterday. The post below also has a pointer to the official website that has the key findings published.
    Jeff Jones Security Blog : Security Intelligence Report v6
    Tags: ( reports )
  6. Nessus Version 4 has been released. For those who follow and use my Backtrack 3 and Backtrack 4 how-tos, they will be updated this weekend, hopefully 🙂
    Tenable Network Security: Nessus Version 4 Released
    Tags: ( nessus )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. I'm not sure how I missed this, but Gnucitizen has a project called Jeriko. It is a collection of scripts that can be used to automate some common penetration testing tasks. Some nifty stuff in there.
    GNUCITIZEN Code
    Tags: ( pentest scripts jeriko )
  2. Paul offers some tips on getting your Nessus scan to complete successfully through a firewall.
    Tenable Network Security: Configuring Nessus To Scan Through Firewalls
    Tags: ( nessus )
  3. Craig brings up some very good points regarding security in the AWS platform.
    Is Amazon AWS Really HIPAA Compliant Today? | Cloud Security
    Tags: ( cloud hipaa )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. A security code review guide, security developer guide and a security testing guide. That sure looks like a trifecta to me. Man, my reading pile is getting HUGE!
    Writing Secure Software: OWASP Releases World's First Security Code Review Guide for Free
    Tags: ( owasp guides )
  2. Slightly off topic, but I really want this setup.
    From My Couch... Thy Social Media Monitoring Shall Be Done | The Home of Peter Shankman - Shankman.com
    Tags: ( ot )
  3. Here's a quick tip from the folks a Tenable on finding Open SMB file shares.
    Tenable Network Security: nessuscmd Tip: Finding Open SMB File Shares
    Tags: ( nessus tips fileshares )
  4. Lori brings up some really good points.
    The Web 2.0 API: From collaborating to compromised
    Tags: ( api )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Via @alexhutton, this article is very interesting. Those who are interested in measuring and communicating risk should read it.
    2845 ways to spin the Risk | Understanding Uncertainty
    Tags: ( risk management )
  2. Rob (@mubix) posted a nifty how-to the other day and was taken to task for it. He responds publicly. His response and the comments are worthy of a read.
    The Ethics of Teaching Hacking | Room362.com
    Tags: ( ethics )
  3. Yup, time to make sure your patching is working on your Windows 7 Beta installs.
    Windows 7 beta gets its first security update - Ars Technica
    Tags: ( infsec microsoft patches windows-7 )
  4. This is quite cool. Requires authenticated scans, but does give the opportunity to see who is using USB drives on your systems.
    Tenable Network Security: USB Device History Auditing with Nessus
    Tags: ( nessus )
  5. Here's a script to help you lock down your IIS 6 installations. Careful though. It's brand new and has not been tested extensively.
    Script to lock down IIS paths - Nazim's IIS Security Blog : The Official Microsoft IIS Site
    Tags: ( iis scripts securing )
  6. Part 2 is up on not being nice to your Citrix installation 🙂
    Syn: Abusing Citrix - Part 2
    Tags: ( hacking citrix )
  7. In my opinion, yes, the BBC broke the law.
    Did BBC break the law by using a botnet to send spam? | Graham Cluley's blog
    Tags: ( botnet )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }