Windows BitLocker Drive Encryption Step-by-Step Guide What is BitLocker Drive Encryption? BitLocker Drive Encryption is an integral new security feature in the Windows Vista operating system that provides considerable protection for the operating system on your computer and data stored on the operating system volume. BitLocker ensures that data stored on a computer running Windows Vista remains encrypted even if the computer is tampered with when the operating system is not running. BitLocker uses a Trusted Platform Module (TPM) to provide enhanced protection for your data and to assure early boot component integrity. BitLocker is designed to offer a seamless user experience. The TPM interacts with BitLocker to help provide seamless protection at system startup. Who should use BitLocker Drive Encryption? This guide is intended for the following audiences: IT planners and analysts who are evaluating the product Security architects In this guide Requirements for BitLocker Drive Encryption These steps are for testing only. Before you start
Hacking IPv6 III – IPv6 Spoofing in 6in4 tunnels « iniqua In this post we will show a real risk that happens today in Intenet related with IPv6 tunnels. We have detected that some of the main 6in4 tunnel providers don’t control correctly the IPv6 source filtering in the client access they provide to their clients. This situation leverages a risk that make easy the execution of some attacks that require source IP spoofing. To help the reader understand the risks that involves IP spoofing in the Internet, below are shown a brief list of attacks that take advantage of this risk: SYN flooding desde direcciones IP falseadas.Connection hijacking averiguando el número de secuencia TCPBypass firewallIDLE scanSmurf attackDNS Cache Poisoning … This assessment is only focused on one type of tunnel, the 6in4 type. In our oppinion, these tunnels may happen to be a headache form a security point of view in some points of Internet. Iniqua people have done a brief assessment of the three main IPv6 tunnel provider. Conlusion: Conlusión:
remote-exploit.org John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. To verify authenticity and integrity of your John the Ripper downloads, please use our PGP public key. There's a wiki section with John the Ripper user community resources.
FBI acknowledges more SCADA attacks, increases cyber budget At a recent security conference Michael Welch, the deputy assistant director of the FBI's Cyber Division, gave a speech where he discussed the issue of SCADA security. Information Age magazine reported on his speech and quoted Welch as saying: "We just had a circumstance where we had three cities, one of them a major city within the US, where you had several hackers that had made their way into SCADA systems within the city," We don't know which cities Welch is referring to, but this does bring more light to a subject that has been mired in confusion of late. Many argued that the security of SCADA systems was being exaggerated after it became public that the water treatment attack in Springfield, IL was a false alarm . That of course ignores the attack by pr0f on the City of South Houston's systems and these other three referred to by Welch. Sound too good to be true? The majority of the funding increase will be used to expand their operation from 8 hours/5 days to 24 hours/7 days.
Wordlists & Password Profiling with CRUNCH, WyD, & CUPP Today I am going to show you how to use three (3) different tools in Linux (Backtrack 5) for creating targeted wordlists to help speed up and increase the chance of success for your dictionary attacks. I will be covering the use of CRUNCH for pure wordlist generation, and then I will cover the use of WyD and CUPP which use password profiling techniques to create targeted wordlists to narrow your attacks. I will provide the written walk through here with a video at the end. CRUNCH is a wordlist generator based on the user specified character set. You will need to download and extract using the following methods: COMMAND: tar -zxvf crunch-3.0.1.tgz COMMAND: cd crunch-3.0.1/ COMMAND: make && make install Basic syntax of CRUNCH looks like this (See MAN Pages for details): ./ crunch <min-len><max-len> [-f /path/to/charset.lst charset-name] [-o wordlist.txt] [-t [FIXED]@@@@] [-s startblock] [-c number] Breakdown of Syntax: o min-len = minimum length string to start at (REQUIRED) o -t *^ssw@rd% Thanks,
Create a Shiny Earth with Photoshop 3D Layers In this tutorial I'll show you how to create a shiny planet icon using the 3D features of Photoshop CS4 Extended. This will cover basic information about 3D layers and texture maps. Let's get started! Video Tutorial Our video editor Gavin Steele has created this video tutorial to compliment this text + image tutorial. Step 1 Create a new document which is 1000 pixels wide and 500 pixels high at a resolution of 300 pixels/inch, with a name of "Home." Step 2 We'll be using some texture for our planet. Step 3 Now go to 3D > New Shape From Layer > Sphere. Step 4 The "Earth" layer is now a 3D layer and a cube icon is displayed in the Layers Palette. Step 5 Grab the 3D Rotation Tool, click on the canvas, hold and drag to rotate the sphere and adjust it as you wish. Step 6 The edges of the sphere look aliased at the moment. Step 7 Now click on the Global Ambient Color box and set the color to R:100, G:100, B:100 and hit OK. Step 8 We'll now add a bump map to our planet. Step 9 Step 10 Step 11 Step 12 Step 13
Patch Tuesday December 2011 Microsoft finishes out this year of patching with a heavy release that's all over place. While techs were notified of an anticipated 14 bulletins, 13 were released for the month of December. Headline grabbing events and code are addressed in one of them, and while fewer are labelled "Critical", are they any less important? Many speculative bits have been spilled on the group behind Stuxnet and its precursor Duqu, with our own researchers posting at least a half dozen Securelist writeups on Duqu findings alone. The targeted functionality provides TrueType font parsing capabilities for the OS, and the group abused these components by delivering exploits in the form of Word Documents attached to emails interesting to their individual victims, a technique known as spear-phishing. The other headline grabbing event and code that was anticipated to be released is known as the SSL BEAST vulnerability.
Realistic Smoke Effect Photoshop Tutorials Adobe Photoshop, as we all know is rightfully regarded as the Swiss knife of designers all around the world. With Photoshop, you can literally create all kinds of illustrations that you previously only dream about! With this fantastic tool, you can virtually create any effect you want. It’s like an infinite canvas of your dreams. If you have the imagination, sky is the limit. Pin it Smoking is damaging to health they say, indeed, but with Photoshop who needs real smoke? Below the promised showcase of awesome smoke effect Photoshop tutorials. Create Smoke TextMixing type and a smoke image to create a really nice abstract wallpaper. Smoke EffectHow to create smoke effect in 30 seconds. Manipulate Smoke to Create Hyper-Real ImagesLearn to apply the Warp Tool effectively and a few other tricks to make smoke look like a skull. Creating Smoke Like EffectsHow to create subtle smoke-like effect. Smoke Fading EffectSmoking hot girl with smoke fading effect. Photoshop Smoke Tutorial Creating Smoke
REVERSING RORPIAN – DHCP Hijacking Malware | InfoSec Institute – IT Training and Information Security Resources We have seen our fair share of malware codes from time to time. With the help of disassemblers and debuggers, we have a shot of understanding them. But malware are not that simple to understand, one has to know assembly language. But even knowing the language is not enough by itself, most of the latest malware, if not all, are either packed, encrypted or anything in between. This paper will be the first of many; in helping us understand deciphering codes that malware has to offer. Rorpian worm is the first in line. Rorpian initially allocated a virtual memory space to copy itself. The malware started decrypting codes at the very end of the file in memory. It started slowly. Figure 1 Let’s now take a closer look at the decryption algorithm. The value from DWORD PTR SS:[EBP+10], contains the COUNTER or the number of iterations this block of code will be executed. After executing the first 3 instructions of this decryptor, The following codes below looks complicated but they are not.
GooBing Detroit A garage in northeast Detroit deteriorates. Lady waving to the street view car in the first image, c. 2009. Nearby the Heidelberg Project, and in the style, though not sure if a Tyree or not. Why Don’t We Own This? This block is incredible. The New York Times visited this block during the Motor City Mapping survey: "Blight, as Karl Baker, one Detroit resident, has seen, tends to spread. Most of the houses nearby are standing but abandoned, and visitors have clearly passed through — empty liquor bottles lie along debris-covered floors near broken windows and doors, every memory of a metal appliance or gutter seems to be gone from some of the homes, and two old couches that were dumped along a lawn are now blanketed by a thick layer of snow. The last neighbor left six months ago, he said, and the single streetlight overhead has not worked for months. That’s a lotta washing machines… Just east of Osborn, in “Burbank”… if anyone actually calls it that. Source: Why Don’t We Own This?
Plagiarism in IT Security - Walking a Fine Line As many of you are familiar by now, I ran into a recent incident where an individual was shamelessly copying my work (and that of many, many others) and putting their own name on it and calling it original - then posting it to their company blog. The result was one of the fastest and most sincere resolutions I've personally ever witnessed, and while I don't need to recap the whole issue in this post (because you can read it here) one thing kept coming up over and over... The idea of content control, was a common theme in discussions on Twitter, in person, and on the web over the issue of plagiarism. At the heart of the matter is the case where an employee works for a company, call them ACME Widget Corp, and posts (supposedly) original content to the corporate website. Believe me when I tell you that you wouldn't want to try and be a blogger or writer on one of these sites. That whole process probably takes 2-3 weeks, if you're lucky. Are you sure you want that?
Finding more mobile-friendly search results Webmaster level: all When it comes to search on mobile devices, users should get the most relevant and timely results, no matter if the information lives on mobile-friendly web pages or apps. As more people use mobile devices to access the internet, our algorithms have to adapt to these usage patterns. In the past, we’ve made updates to ensure a site is configured properly and viewable on modern devices. We’ve made it easier for users to find mobile-friendly web pages and we’ve introduced App Indexing to surface useful content from apps. 1. Starting April 21, we will be expanding our use of mobile-friendliness as a ranking signal. To get help with making a mobile-friendly site, check out our guide to mobile-friendly sites. If you want to test a few pages, you can use the Mobile-Friendly Test. 2. Starting today, we will begin to use information from indexed apps as a factor in ranking for signed-in users who have the app installed.
Network Security in the Age of Social Media In the book Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks, it states that businesses that take days to respond to social media issues are way behind the curve. Social media operates in real-time, and responses need to be almost as quick. In a valuable new book on the topic, Securing the Clicks Network Security in the Age of Social Media, Gary Bahadur, Jason Inasi and Alex de Carvalho provide the reader with a comprehensive overview on how not to be a victim of social media based security problems. Social media is now mainstream in corporate America, and even though it is hot, the security and privacy issues around it are even hotter. In the past, many firms simply said no to social media at the corporate level. But as Natalie Petouhoff of Weber Shandwick has observed, that will no longer work, as “social media isn’t a choice anymore; it’s a business transformation tool”. The book also lists numerous amounts of tools.