background preloader

Security Tools

Facebook Twitter

Andrew's Blog - Password Cracking on Amazon EC2. Introduction In one of my courses at McMaster University - Computer Networks and Security - the professor gave a challenge in class. The first person to crack a crypt() hash would get a 3% bonus on their final grade, and the first person to crack a md5crypt()-based hash would get a 7% bonus on their final grade. I cracked the crypt() password while the class was still going, by using John the Ripper and a decent wordlist that I had lying around on this server. The md5crypt() one would be much harder to do on a cheap VPS, though, and my MacBook Air is nowhere near powerful enough to be of use. Installing CUDA First, you need to start the instance. EDIT: I’ve noticed that some people have trouble launching this AMI. Once the instance is started, SSH into it, and install the basics: sudo apt-get updatesudo apt-get install gcc g++ build-essential linux-headers-`uname -r` Now, we need to install GLUT: sudo apt-get install freeglut3 freeglut3-dev Next, the CUDA toolkit for this version of Linux. .

Mullvad. Tripwire, Inc – IT Security Software to improve data security and regulatory compliance. Netstat. It is used for finding problems in the network and to determine the amount of traffic on the network as a performance measurement.[1] Parameters[edit] Parameters used with this command must be prefixed with a hyphen (-) rather than a slash (/). If a parameter is supported only on some platform or platforms, the platform or platforms is listed in parentheses after the parameter. Statistics provided[edit] Netstat provides statistics for the following: Proto - The name of the protocol (TCP or UDP).Local Address - The IP address of the local computer and the port number being used.

Examples[edit] To display the statistics for only the TCP or UDP protocols, type one of the following commands: netstat -sp tcp netstat -sp udp On Microsoft Windows: To display active TCP connections and the process IDs every 5 seconds, type the following command (works on XP and 2003 only, or Windows 2000 with hotfix): netstat -o 5 netstat -no To display all ports open by a process with id pid: netstat -aop | grep "pid" RootkitRevealer. Introduction RootkitRevealer is an advanced rootkit detection utility. It runs on Windows XP (32-bit) and Windows Server 2003 (32-bit), and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit.

RootkitRevealer successfully detects many persistent rootkits including AFX, Vanquish and HackerDefender (note: RootkitRevealer is not intended to detect rootkits like Fu that don't attempt to hide their files or registry keys). If you use it to identify the presence of a rootkit please let us know! The reason that there is no longer a command-line version is that malware authors have started targetting RootkitRevealer's scan by using its executable name. We've therefore updated RootkitRevealer to execute its scan from a randomly named copy of itself that runs as a Windows service. What is a Rootkit? Persistent RootkitsA persistent rootkit is one associated with malware that activates each time the system boots. Top of page. Windows Sysinternals: Documentation, downloads and additional resources.

SecDef.