background preloader

Packet Storm

Packet Storm

http://packetstormsecurity.com/

Related:  network traffic analysisSecurity

www.digicert Easily Sign Files and Batches of Code Formerly, signing your software with a code signing certificate was an arcane and time-consuming process. Depending on the code you were signing, you would need to research how to sign the code, track down all the necessary assets, and labor through a clunky command line process.

Cross-site Scripting (XSS) This is an Attack. To view all attacks, please see the Attack Category page. Last revision (mm/dd/yy): 06/4/2016 Overview Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Hack This Zine Also check out Hackbloc's other publications There is also a mirror of all of our issues at HackThisSite and Textfiles.com {*style:<b>#13: People, Like Information, Want to be Free </b>*}

Who’s Attacking Whom? Realtime Attack Trackers — Krebs on Security It seems nearly every day we’re reading about Internet attacks aimed at knocking sites offline and breaking into networks, but it’s often difficult to visualize this type of activity. In this post, we’ll take a look at multiple ways of tracking online attacks and attackers around the globe and in real-time. A couple of notes about these graphics.

Senior U.S. spies warn of future security threats I think one of the most overlooked parts of Cyber threats is that the encryption we use now is strong but in 20 years it's not going to be. What secrets are you transmitting now and think are safe because the traffic is encrypted? I think some people have secrets from 20 years ago that might still be bad if they got out today. Except that 20 years ago everything wasn't going across the Internet.

Network Forensics an emerging approach to a network analysis Acquire the Compromised drive and make a forensic image of it. Compare files on the forensic image to the original installation image compare hash values of coomon files , such as Win.exe and standards DLLs and ascertain whether they have changed. Network forensics has important roles to play in new and developing areas related to social networking, data mining and digital imaging, and data visualization. XSS Filter Evasion Cheat Sheet Last revision (mm/dd/yy): 06/1/2016 This cheat sheet is for people who already understand the basics of XSS attacks but want a deep understanding of the nuances regarding filter evasion. Please note that most of these cross site scripting vectors have been tested in the browsers listed at the bottom of the scripts. XSS Locator Inject this string, and in most cases where a script is vulnerable with no special XSS vector requirements the word "XSS" will pop up.

Password eXploitation Class Password Exploitation Class This is a class we gave for the Kentuckiana ISSA on the the subject of password exploitation. The Password Exploitation Class was put on as a charity event for the Matthew Shoemaker Memorial Fund ( ). The speakers were Dakykilla, Purehate_ and Irongeek. Lots of password finding and crack topics were covered.

List of cyber attacks and data breaches in 2014 Sat in my Christmas jumper eating a mince pie and listening to my Christmas playlist, my Christmas spirit is palpable. However, even the sheer size of my excitement for Christmas isn’t enough to stop me keeping an eye on the developments on Sony cyber attack or, in fact, all cyber crime news. Several articles have been posted on the IT Governance blogs in the past few weeks detailing cyber criminals and their increased activity during the Christmas period.

Lots of Information about Hacking... and Tool by 3fish May 27

Related:  hackingExploitsSecurityTool Depotsgajeel