background preloader

Network-security

Facebook Twitter

Hacking

Security. GSN3:Installation &amp; IOS Configuration. Metasploit/UsingMetasploit : Reference (The Full Wiki) From Wikibooks, the open-content textbooks collection < Metasploit Current revision (unreviewed) This chapter covers various aspects of using The Metasploit Framework.

Metasploit/UsingMetasploit : Reference (The Full Wiki)

For the time being, its a collection of assorted topics. Later these can be organized to make more sense. Using Databases with MSF MSF allows storing scan/exploitation results into databases for persistent storage. Postgres MySQL SQLite (version 2 & 3) Note: Except for SQLite (which stores the database as a file), you need to start the database server for Postgres or MySQL before starting to use the databases with the Framework.

Note: Using the Framework with postgres requires edits to pg_hba.conf. Note: before using postgres, you must run $ gem install postgres. Note: For best results use msfconsole to interact with a database from the Framework. Database storage comes in handy for MSF in quite a few ways. The Database Schema. SecurityTube - Watch, Learn and Contribute Computer Security Videos. Metasploit/VideoTutorials - Wikibooks, collection of open-content textbooks. How to Encrypt Your File System. Protecting your data has become more important than ever.

How to Encrypt Your File System

Let's look at some options for encrypting Linux file systems. Everyone has either a laptop or a netbook or a desktop that carries, in many cases, some personal information – credit card numbers to buy those important system upgrades, Facebook logins, account numbers, incriminating photos of our high school days, etc. They are all stored on our systems in various forms, including cookies. Emerging Threats. Penetration testing. Flexible One-Time Password MetaSystem. High security multifactor authentication using aseries of single-use "passcodes" does not needto be expensive.

Flexible One-Time Password MetaSystem

In fact, it can be free... Generate your own unique set ofPrintable Paper Passcards right now: What is "Multi-Factor Authentication" . . . and why might you need it? Almost without exception, today's Internet users prove their identity online using a fixed account name and password. In the past, this simple system provided sufficient security. The trouble with a username and password is that they never change.

To hear or read more about the important and fascinating topic of "Multi-Factor Authentication", you are invited to listen to the free audio (mp3) podcast Leo Laporte and I produced to address this topic. The first episode (#113) explains the problem I was working to solve. Higher quality: 64 kbps mp3, 27 MB (Right-click and "Save Target As... ") Index of /content/downloads/pdf. Institute - SANS Top-20 2007 Security Risks (2007 Annual Update) Critical Security Controls for Effective Cyber Defense Over the years, many security standards and requirements frameworks have been developed in attempts to address risks to enterprise systems and the critical data in them.

Institute - SANS Top-20 2007 Security Risks (2007 Annual Update)

However, most of these efforts have essentially become exercises in reporting on compliance and have actually diverted security program resources from the constantly evolving attacks that must be addressed. In 2008, this was recognized as a serious problem by the U.S. National Security Agency (NSA), and they began an effort that took an "offense must inform defense" approach to prioritizing a list of the controls that would have the greatest impact in improving risk posture against real-world threats.

A consortium of U.S. and international agencies quickly grew, and was joined by experts from private industry and around the globe. Underground Search - Exploits : Archives. Virus Bulletin : Independent Malware Advice. GuardCentral.com - The Computer Security Portal. NIST.gov - Computer Security Division - Computer Security Resource Center. Infosec Writers Text Library. Disclaimer: Content in this library are provided "as is" and without warranties of any kind, either express or implied.

Infosec Writers Text Library

InfoSec Writers does not warrant the use or the results of the use of the content in terms of their correctness, accuracy, reliability, or otherwise. In no event shall InfoSec Writers be liable for any damages - indirect, consequential or whatsoever - from usage of the content provided here. However, we are dedicated to providing QUALITY content, so we encourage you the reader to voice your queries or suggestions with regard to the technical accuracy/validity of any such content in this library. Email us: submissions@infosecwriters.com along with a CC to the respective writer. Re-posting ANY material, edited or not edited, (including files, text, design) off this site for public use is prohibited without prior authorization from us (or the respective owner/writer).

To submit a text click here. Professional Security Testers resources warehouse. Professional Security Testers resources warehouse. Remote-Exploit.org - Supplying offensive security products to the world. Home - The Community&#039;s Center for Security. The Black Page - June 20, 2006 Edition. Institute - The SANS Security Policy Project. Welcome to the SANS Security Policy Resource page, a consensus research project of the SANS community.

Institute - The SANS Security Policy Project

The ultimate goal of the project is to offer everything you need for rapid development and implementation of information security policies. You'll find a great set of resources posted here already, including policy templates for twenty-seven important security requirements. Find the Policy Template You Need! There is no cost for using these resources. They were compiled to help the people attending SANS training programs, but security of the Internet depends on vigilance by all participants, so we are making this resource available to the entire community.

Over the years a frequent request of SANS attendees has been for consensus policies, or at least security policy templates, that they can use to get their security programs updated to reflect 21st century requirements. This page will continue to be a work in-progress and the policy templates will be living documents. What's in a name? Forensic Analysis of a Live Linux System, Pt. 1. 1.

Forensic Analysis of a Live Linux System, Pt. 1

Introduction During the incident response process we often come across a situation where a compromised system wasn't powered off by a user or administrator. This is a great opportunity to acquire much valuable information, which is irretrievably lost after powering off. I'm referring to things such as: running processes, open TCP/UDP ports, program images which are deleted but still running in main memory, the contents of buffers, queues of connection requests, established connections and modules loaded into part of the virtual memory that is reserved for the Linux kernel.

Nikto. Top 100 Network Security Tools. Default Password List. -= EthicalHack.org =- top ten apps. Comp.os.linux.security FAQ. Introduction to Network Security. Packet Crafting for Firewall &amp; IDS Audits (Part 1 of 2) With the current threat environment that home and corporate users face today, having a firewall and IDS is no longer a luxury, but rather a necessity. Yet many people do not really take the time to make sure though that these lines of defense are indeed working properly.

After all, it is very easy to invalidate your router's entire ACL list by making a single misconfigured entry. The same can be said for your firewall, whereby one poor entry into your iptables script, for example, could leave you vulnerable. Have you properly configured certain options which may be available with your firewall? All of these questions can be answered, and more importantly verified through the use of packet crafting. It is best to not blindly rely on the output of certain automated tools when auditing devices that safeguard your valuable computing assets. IT Top Interview Questions and Resources. Anti-Virus test file. Additional notes: This file used to be named ducklin.htm or ducklin-html.htm or similar based on its original author Paul Ducklin and was made in cooperation with CARO.The definition of the file has been refined 1 May 2003 by Eddy Willems in cooperation with all vendors.The content of this documentation (title-only) was adapted 1 September 2006 to add verification of the activity of anti-malware or anti-spyware products.

Anti-Virus test file

It was decided not to change the file itself for backward-compatibility reasons. Who needs the Anti-Malware Testfile (read the complete text, it contains important information)Version of 7 September 2006 If you are active in the anti-virus research field, then you will regularly receive requests for virus samples. A Few Cool Tools for Snort. Addressing security issues in Linux. Top 75 Network Security Tools. The Linux Security and Hacking Resource - Home.