background preloader

Security & intel

Facebook Twitter

C05784271.

Digital forensics

Kaspersky Cyberstat | Real-time cyberworld stats from Kaspersky Lab. Infosec links & info. Security. Send Anonymous Emails: 20 Sites To Keep Your Identity Hidden. The first question to answer here is why go for anonymous email when there are plenty of premium featured and free email services such as Gmail, Outlook and Yahoo! Mail available? Well, privacy and anonymity is a digital right — our digital right. These email services are ‘free’ because of the advertisements. Although deemed necessary evils, ads are mostly tailored for the visitor or service user, and to do that, service providers need your data to show you advertisements targeted to you and your user group. These are ads that you are most likely to click and/or follow. Moreover, the disclosure of the motives of secret agencies and their top-secret internet-censoring programs (such as PRISM) has raised concerns among digital privacy advocates. Recommended Reading: VPN Protocols: Preserving Your Sensitive Information Online Anonymous email forms the basic foundation of anonymity over the web.

Encrypted / Anonymous Email Service Send Emails Without Registration Receive Emails. Brandieself added: March, 2015 | Security Unlocked - Part 3. A lot of people contact us and ask: What are your preferred tools for Pentesting and which ones are free? Whilst there are hundreds and thousands of free Pentesting tools around, we seem to use only a core bunch of them as many have similar functionality. Some people may prefer one tool over another, but the bottom line is: There are many tools to achieve the same goal. Here is our personal list of preferred tools, which does by no means indicate that those are the only ones to use. Scanning NMAP Angry IP Scanner Firewalk OpenVAS Nexpose Penetration Testing Metasploit Framework Kali Linux Netcat Web Application Penetration Testing Burp Suite Acunetix SQLmap Nikto w3af owasp-zap Webscarab Wapiti Password Attacks and MITM Cain & Abel Snort THC Hydra Ettercap John the Ripper Medusa Wireless Attacks Aircrack-NG Suite Wifite Easy-Creds Evil-AP script dsniff, tcpdump, stringswatch, SSLStrip, TShark Ettercap zANTI (Android) Intercepter-NG (Android) dSploit (Android) Social Engineering Commercial Tools.

99 Resources to Research & Mine the Invisible Web. College researchers often need more than Google and Wikipedia to get the job done. To find what you're looking for, it may be necessary to tap into the invisible web, the sites that don't get indexed by broad search engines. The following resources were designed to help you do just that, offering specialized search engines, directories, and more places to find the complex and obscure. Search Engines Whether you're looking for specific science research or business data, these search engines will point you in the right direction.

Turbo10: On Turbo10, you'll be able to search more than 800 deep web search engines at a time. Agrisurf: If you're searching for information related to agriculture and farming, check out this engine. IncyWincy: This search engine canvasses the deep web. Databases Tap into these databases to access government information, business data, demographics, and beyond.

Catalogs Directories Get hand-picked links to high quality research sources with these directories. Guides. Derbycon 2015 - Blue Team Starter Kit. Description: A look at some of the low-cost tools that can be utilized by Blue Team members. Tools include Redline for forensics, EMET for computer hardening, Zed Attack Proxy for web application security, and PDQ Deploy and Inventory for third party patch management. Descriptions of each tool, experiences and how I've used each of these tools, and short demos of each tool. U.S. Navy Veteran 2001-2007 Sysadmin, network administrator, now information security officer for state of South Carolina. ColaSec organizer, producer of PVC Security podcaster, and regular BSides attendee and photographer of South East. For More Information Please Visit: - Tags: Disclaimer: We are a infosec video aggregator and this video is linked from an external website. Comments: Search WikiLeaks. 2.

Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour. 3. Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used. In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion. 4. If a legal action is brought against you as a result of your submission, there are organisations that may help you. Can You Find the Confession in this Statement? Communication. Home | Fingerprint Sensors and Biometric Software Solutions. Knowledge. WiGLE - Wireless Geographic Logging Engine - Plotting WiFi on Maps. Tools. Surveillance II. How encryption works in your web browser. CyberWar. SCADApedia. A blog is great for providing current information, but this information tends to age off and lose value over time.

Our answer to this problem is the SCADApedia. The SCADApedia is a set of pages covering topics of importance in ICS and control system IT. The best way to use it is either by the search feature in the web site or by clicking on the top level category links listed below. Let us know if you have suggestions for new topics, comments on existing topics or a page you would like to contribute. Send any or all of this to info@digitalbond.com. ICS Security Books ICS Security Event Calender Government Products Protocols Sectors Security Controls Standards Vendors Vulnerability Notes.

COMPUTING SITES. Asterisk.

DARPA

The NSA Files: PRISM & Boundless Information. Tools: Security - Forensics - Pentesting - Ethical Hacking. About Hackers & Hacks. Ethical Hacking. Security Tools.