background preloader

Hash Database

Facebook Twitter

Eureka Malware Analysis Page. Step-by-Step Reverse Engineering Malware: ZeroAccess / Max++ / Smiscer Crimeware Rootkit |  InfoSec Resources. (quick plug – to all current & future reverse engineers – check out our Reverse Engineering Training Course. We’d love to publish your work next!) Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent DropperPart 2: Reverse Engineering the Kernel-Mode Device Driver Stealth RootkitPart 3: Reverse Engineering the Kernel-Mode Device Driver Process Injection RootkitPart 4: Tracing the Crimeware Origins by Reversing the Injected Code This four part article series is a complete step-by-step tutorial on how to reverse engineer the ZeroAccess Rootkit. ZeroAcess is also known as the Smiscer or Max++ rootkit. InfoSec Institute would classify ZeroAccess as a sophisticated, advanced rootkit. At the conclusion of the analysis, we will trace the criminal origins of the ZeroAccess rootkit. Symantec reports that 250,000+ computers have been infected with this rootkit.

Want to learn more?? It has the following capabilities: Step-by-step Analysis MD5: d8f6566c5f9caa795204a40b3aaaafa2 . Blog - pentestmonkey.net. Wikileaks Mirrors. HBGary Email Viewer: Portal - AnonLeaks. Penetration Testing and Vulnerability Analysis - Home. ..:: Corelan Team | Peter Van Eeckhoutte (corelanc0d3r) ::.. Unescape Decoder and Encoder for Javascript. THC Hydra HELP - TSF - Mac Security Forums. Tssci security. Training. This section of the web site provides security training resources for infosec professionals based in or around the Northern Virginia (NoVA), DC, and MD areas.

If there are any mistakes or information we should add, please let us know through our Contact Us form. For recent posts regarding this information, see the Recent Posts area below. Look for a complete list of all related posts on the Training category page. Northern Virginia Infosec Training Hacking Challenges A key part of being a good infosec profession is understanding what attackers are currently doing. ShmooCon Contests: As part of the annual ShmooCon conference in Washington, DC, the organizers usually sponsor a Hack-or-Halo challenge. Courses/Training at Conferences SANS Training: SANS provides intensive, immersion training designed to help you and your staff master the practical steps necessary for defending systems and networks against the most dangerous threats – the ones being actively exploited.

Formal Education OSes. Partner Colleges for Online College Credit. Enjoy a hassle-free application process and save money when you enroll at one of StraighterLine's accredited Partner Online Colleges and Universities. Most online colleges and universities have agreed to accept StraighterLine college credits directly. StraighterLine selects Partner Colleges for their rigorous and high quality degree programs as well as for their commitment to individual learners and their needs. All of our Partner Colleges have distance learning options available. With StraighterLine, you can enroll at one of our Partner Colleges or enroll at any college that awards credit for ACE recommended courses. In either case, you can transfer StraighterLine credits to the college of your choice. You decide. Colleges can make it difficult to receive credit for coursework you have taken.

Do you want to attend a StraighterLine partner college? Do you want to attend a college that awards credit for ACE approved courses? Remember, recognition of college credit is made by each school. eLearnSecurity : Penetration testing and IT Security courses. ECA Program. SecurityTube - Watch, Learn and Contribute Computer Security Videos. BugiX - Security Research. SQL Injection Cheat sheet: Esp: for filter evasion - by RSnake. TOR Node List. The Cover of Night. T2 Magazine - From scratch to login promt with T2. 2008-12-07, by Iulian Demetrescu I am a Linux user for about 15 years or so and i was always wondering about what is "under the hood" of it and how it's put together. I was especially interested in how a distribution is made up, since there are so many things that you have to take into account.

Recently i was asked about one of my customers to deliver an embedded device capable of maintaining a small database, serve some pages via http and print some information on a thermal printer. In an instant i said embedded Linux and the customer agreed. Driven by my customer demands and of course by my unsatisfied curiosity, i started searching the net for such distributions. And they are many. From DSL that fits in a credit card size CD to Puppy Linux, you can take your pick. But in my heart i wanted to build my own Linux. I mentioned earlier that there are some projects on the net, projects that can be used to build your own distribution. The build environment The Target Yourself The development PC. SIPVicious. Metasploit Unleashed By Offensive Security. Massive Scareware Serving Blackhat SEO, the Koobface Gang Style | Latest Security News | GSO. Ali Baba and the 40 thieves LLC are once again multi-tasking, this time compromising hundreds of thousands of web sites, and redirecting Google visitors -- through the standard http referrer check -- to scareware serving domains.

What's so special about the domains mentioned in Cyveillance's post, as well as the ones currently active on this campaign? It's the Koobface connection. For instance, the ionisationtools .cn or moored2009 .cn redirectors, as well as the scareware serving premium-protection6 .com; file-antivirus3.com; checkalldata .com; ... Ali Baba and the 40 thieves LLC are once again multi-tasking, this time compromising hundreds of thousands of web sites, and redirecting Google visitors -- through the standard http referrer check -- to scareware serving domains. What's so special about the domains mentioned in Cyveillance's post, as well as the ones currently active on this campaign?

It's the Koobface connection. This post has been reproduced from Dancho Danchev's blog. Laramies Corner. Google dorks. OWASP WebScarab Project. Webgoat - Project Hosting on Google Code. After 1,000,000+ downloads and 10+ years, we have started an effort to significantly upgrade WebGoat. We are looking for help. If you have experience in any of these areas and time to contribute: UI Design Spring MVC JavaEE ESAPI and other security controls Application attacks (lessons revamp) Technical writing Please contact Bruce Mayhew (webgoat AT owasp DOT org). The source code repository has moved to github, You can find us at There are many WebGoat repositories on GitHub. WebGoat is a deliberately insecure J2EE web application designed to teach web application security lessons.

Why the name 'WebGoat'? Goals Web application security is difficult to learn and practice. The primary goal of the WebGoat project is simple: create a de-facto interactive teaching environment for web application security. Questions If you have questions or suggestions regarding WebGoat, send email to Bruce Mayhew at "webgoat AT owasp DOT org" Releases WebGoat 5.4 Standard: Dive Into Python 3. Bagside - Webdesign - Virtual Appliances - Free Graphics - Wallpaper. Armorize Blog.