background preloader

White hat

Facebook Twitter

Hacking. Hacking Tools. Hacking. Security News. Computer Security. The time has come to install a personal firewall of some kind. This is especially true if you are the proud user of a full-time connection to the net such as a cable or ADSL modem. If you have an old PC sitting idle, then a product called GNATBox Lite from GTA is a high-quality, free solution. This provides both security and network address translation (NAT) that allows you to share your one connection with up to 5 machines on your LAN at the same time.

If you need to protect a web server (or some other server you run) then the full-blown commercial version of GNATBox is hard to beat. Current (July'05) estimates are that an unprotected windows box will be hacked within about 12 minutes from being connected to the internet. SmoothWall may be another choice for a personal firewall, it gets a reviewed review here and more here . MandrakeSoft is going to have an integrated firewall, VPN and traffic management product. Top 100 Network Security Tools. Set Up a Home Server. Setting up a home server running an open-source operating system is a popular and useful activity. Useful in what ways, you may ask. You could use it to run a website (I use a home server to power my world travel website, luxagraf.net), collect and send e-mail messages, store your OpenID credentials or serve your music around the home. As you can guess, we have a great many tutorials on Webmonkey for getting the most out of that machine in your closet.

But here are some guidelines for the hardware side of it. Introduction Before You Start – Alternatives Setting up a home server can be a lot of fun and a great learning experience. What you’ll need To build your own server, you need just a few components, some or all of which you may well have already: A computer A broadband network connection A network router, with Ethernet (CAT5) cable A monitor and keyboard (just for the first few steps) A CD/DVD drive/burner will be handy if you plan to use the server for media. The computer Memory. Mini ITX Case, Mini ITX Motherboard, DC-DC Power Supply - iDOTpc International, Inc.

Top 15 Security/Hacking Tools & Utilities. 1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source. Can be used by beginners (-sT) or by pros alike (–packet_trace). Get Nmap Here 2. Recently went closed source, but is still essentially free.

Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Get Nessus Here 3. You can get JTR Here 4. 5. 7. DOWNLOAD FREE ANTIVIRUS - The first free cloud antivirus against viruses - CLOUD ANTIVIRUS. GMER - Rootkit Detector and Remover. Nmap - Free Security Scanner For Network Exploration & Security Audits. Alternative Software And Apps for Windows, Linux, Mac, iPhone, Android, Web Apps/Online And Other Platforms. The Nightmare Before Charlie Brown's Christmas - Answers and Winners. Hello, challenge fans! Ed Skoudis and Yori “Skellington” Kvitchko here, with our announcement of the answers and winners from the holiday hacker challenge The Nightmare Before Charlie Brown’s Christmas. In past challenges, we typically showed our answers first, followed by the winner announcement. But, we know that everyone instantly jumps down to the winners first (we can tell this using the Metasploit-based tracking software we clandestinely installed on each of your systems while you read our packet captures – JUST KIDDING!).

So, in a topsy-turvy fashion for a change of pace, we’ll first announce the winners, and then provide our answers to the challenge. As usual, this year’s competition was intense, with some of the smartest and most clever folks we’ve ever seen participating. Also, many of you had a nice scent as well (we can tell via the new Meterpreter smell-o-matic script included in the payload of our tracking software; thanks for coding that one up, Carlos). --Ed Skoudis Go. Pitfalls of a Home Based Ethical Hacking Business. By EH-Net Member Cutaway, GSEC-G, GSNA-G, GCUX-S, GAWN-C, and CISSP Self-employed security professionals, or those who are involved with small businesses, will invariably find themselves conducting security assessments and penetration tests of Internet facing systems and services. These activities will happen through resources that are generally not as robust as those supplied to security professionals in medium and large organizations.

The following is a list of a few items that a security team should take into consideration before performing security related activities under these conditions. Small Office/Home Office (SOHO) DSL/Cable Routers Network and service enumeration, vulnerability scanning, or automated exploitation can pose a significant challenge to SOHO Routers. Scanning Hosts Projects that include a large target base and a team of people are going to require a location to consolidate resources and data output from a plethora of information gathering tools. Network Problems. How To Become A Hacker. Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?

". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. 1. 2. 3. 5. 2.

Know your Enemy: Tracking Botnets. Worse than Zombies: The Mobile Botnets are Coming. Bare Bones IRC Bot In Perl | Learn Hacking. By b0iler : b0iler@hotmail.com : last update July 26th 2002 Written for : - my site full of other cool tutorials This is a short guide to creating your own perl bot which will work on irc. I will not cover all the different modules and ways to connect to irc and issue commands. This will only cover connecting with IO::Socket and using raw irc commands. I feel you learn the most this way and have alot of control over what is happening. IRC experience is helpful, but I’ll take things slow enough so that an absolute beginner can understand what is taking place. We start off by getting a connection underway: #! You can use any irc server and any port (commonly used ports are 6667-7000), so long as they are valid. Now we have a connection to the server. While($line = <$sock>){ print "$line\n"; } We will see that the server prints out some lines.

NICK bots_nick USER bots_ident 0 0 :bots name With a line break after the bots_nick and a line break at the end. :nick! Ok. The Cuckoo's Egg (book) Summary[edit] Clifford Stoll (the author) managed some computers at Lawrence Berkeley National Laboratory in California. One day, in August 1986, his supervisor (Dave Cleveland) asked him to resolve a USD$0.75 accounting error in the computer usage accounts.

He traced the error to an unauthorized user who had apparently used up 9 seconds of computer time and not paid for it, and eventually realized that the unauthorized user was a hacker who had acquired root access to the LBL system by exploiting a vulnerability in the movemail function of the original GNU Emacs. Over the next ten months, Stoll spent a great deal of time and effort tracing the hacker's origin. He saw that the hacker was using a 1200 baud connection and realized that the intrusion was coming through a telephone modem connection.

Over the course of this investigation, Stoll contacted various agents at the FBI, CIA, NSA, and Air Force OSI. Stoll later had to fly to Germany to testify at the trial of Hess and a confederate. Digital footprint. Digital footprint refers to the traces of data that are left behind by users on digital services. [1] There are two main classifications for digital footprints: passive and active. A passive digital footprint is created when data is collected about an action without any client activation, whereas active digital footprints are created when personal data is released deliberately by a user for the purpose of sharing information about oneself.[1] Passive digital footprints can be stored in many ways depending on the situation. In an online environment a footprint may be stored in an online data base as a hit. This footprint may track the user IP address, when it was created, and where they came from; with the footprint later being analyzed.

In an offline environment, a footprint may be stored in files, which can be accessed by administrators to view the actions performed on the machine, without being able to see who performed them. Web browsing[edit] Privacy issues[edit] See also[edit] Teach Yourself Programming in Ten Years. Why Python? My first look at Python was an accident, and I didn't much like what I saw at the time. It was early 1997, and Mark Lutz's book Programming Python from O'Reilly & Associates had recently come out. O'Reilly books occasionally land on my doorstep, selected from among the new releases by some mysterious benefactor inside the organization using a random process I've given up trying to understand.

One of them was Programming Python. I found this somewhat interesting, as I collect computer languages. I know over two dozen general-purpose languages, write compilers and interpreters for fun, and have designed any number of special-purpose languages and markup formalisms myself. My most recently completed project, as I write this, is a special-purpose language called SNG for manipulating PNG (Portable Network Graphics) images. Perl, of course, is the 800-pound gorilla of modern scripting languages. At that time, I had used Perl for a number of small projects. That's certainly how I felt. The Python Tutorial — Python v2.7.1 documentation.

Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python’s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms. The Python interpreter and the extensive standard library are freely available in source or binary form for all major platforms from the Python Web site, and may be freely distributed. The same site also contains distributions of and pointers to many free third party Python modules, programs and tools, and additional documentation. The Python interpreter is easily extended with new functions and data types implemented in C or C++ (or other languages callable from C).

Python is also suitable as an extension language for customizable applications. The Glossary is also worth going through. Perl.com. Web::irssi::scripts. Computer-Books.us - Free computer books. Free Programming and Computer Science Books.

The Unix and Internet Fundamentals HOWTO. The Loginataka: Dialogue between a Guru and a Newbie. Translations: Czech Speak, O Guru: How can I become a Unix Wizard? O, Nobly Born: know that the Way to Wizardhood is long, and winding, and Fraught with Risks. Thou must Attune thyself with the Source, attaining the arcane Knowledge and Conversation of the System Libraries and Internals. Yea; and such an all-consuming Time and Energy Sink is this as to greatly Imperil thy Grade Point Average (if one thou hast), not to mention thy Sex Life (if one thou hast). But persevere, oh Larval One; rewards beyond the Dreams of Lusers await thee! Speak, O Guru: What books should I study?

O, Nobly Born: know that the Nutshell Guides are but the outermost Portal of the True Enlightenment. If thou desirest with True Desire to tread the Path of Wizardly Wisdom, first learn the elementary Postures of Kernighan & Pike's The Unix Programming Environment; then, absorb the mantic puissance of March Rochkind's Advanced Unix Programming and W. Immerse thyself, then, in the Pure Light of Maurice J. The Art of Unix Programming. You can browse my newest book here. If you like it, please order a paper copy. You can get it from Amazon or Barnes & Noble, or direct from Addison-Wesley.

The Art of Unix Programming attempts to capture the engineering wisdom and philosophy of the Unix community as it's applied today — not merely as it has been written down in the past, but as a living "special transmission, outside the scriptures" passed from guru to guru. Accordingly, the book doesn't focus so much on "what" as on "why", showing the connection between Unix philosophy and practice through case studies in widely available open-source software. If you're using Opera 5, be aware that it has problems rendering some of the HTML in the browseable version linked above. Revisions for the first print edition are now closed. Instructions for reviewers are here.

I have written some notes for translators. Raves: 123456789 Friendly: 12345678910 Pans: 12. Homepage.