background preloader

Home Of PaulDotCom Security Podcast

Home Of PaulDotCom Security Podcast

Schneier on Security Nullthreat Security remote-exploit.org Irongeek.com TaoSecurity $ dd if=/dev/profanity Darknet - The Darkside - Ethical Hacking, Penetration Testing & Computer Security Hacking Articles,Backtrack Tutorials,Hacking Tricks,Penetration Testing,Metaspolit Tutorial Ross Anderson's Home Page Ross Anderson [Research] [Blog] [Politics] [My Book] [Music] [Contact Details] What's New Security protocols and evidence: where many payment systems fail analyses why dispute resolution is hard. In Why bouncing droplets are a pretty good model of quantum mechanics, we solve an outstanding mystery in physics (see blog posts, three previous papers and older blog posts). Reading this may harm your computer – The psychology of malware warnings analyses what sort of text we should put in a warning if we actually want the user to pay attention to it (blog). 2013 highlights included Rendezvous, a prototype search engine for code; a demonstration that we could steal your PIN via your phone camera and microphone; an analysis of SDN Authentication; and papers on quantum computing and Bell's inequality. 2010 highlights included a paper on why Chip and PIN is broken for which we got coverage on Newsnight and a best paper award (later, the banks tried to suppress this research). Research

Free (as in beer) wireless pentesting class As a contribution to the incredibly awesome Security B-Sides unconference in Atlanta, the gang at Errata Security has put together a free training class based on our techniques for completing a professional wireless penetration test. We'll be going over the 5 basic areas of the "gold standard" wireless security assessment, as we do from time to time for a living. To see what prerequisite knowledge is required to participate, and to register for the class (only a few spots left!) WiFi pentesting in 5 parts.#1 Sniffing Get a proper WiFi adapter. List of compatible USB chipsets: Where to buy: Before the class, test your wifi on programs like WireShark for a successful capture in promiscuous mode. Use NetStumbler, Kismet, or Airdump to find networks to break into (orSquirrel).#3 Cracking Use the "aircrack-ng" suite. #5 Hacking (active) Registration for the class is closed.

Secrets of the Browser Developer Tools - Secrets Null Byte - The aspiring grey hat hacker / security awareness playground « Wonder How To

Related: