background preloader

Tools for a Safer PC

Tools for a Safer PC
An important aspect of securing any system is the concept of “defense-in-depth,” or having multiple layers of security and not depending on any one approach or technology to block all attacks. Here are some links to tools and approaches that I have found useful in stopping malware from invading a PC. Your mileage may vary. Learn, Memorize, Practice the 3 Rules Follow Krebs’s 3 Basic Rules for online safety, and you will drastically reduce the chances of handing control over your computer to the bad guys. In short, 1) If you didn’t go looking for it, don’t install it; 2) If you installed, update it. 3) If you no longer need it, get rid of it! Keep Up-to-Date with Updates! It shouldn’t be this way, but the truth is that most software needs regular updating. Put a Leash on Javascript Most Web sites use JavaScript, a powerful scripting language that helps make sites interactive. Firefox has many extensions and add-ons that make surfing the Web a safer experience. Microsoft EMET Avast AVG Free Related:  Security

Awesome-Hacking/README.md at master · Hack-with-Github/Awesome-Hacking Mac Rumors: Apple Mac Rumors and News You Care About Transmit Data Through Sound: Quiet This library uses liquid SDR to transmit data through sound. This makes it suitable for sending data across a 3.5mm headphone jack or via speaker and mic. Quiet can build standalone binaries for encoding/decoding data via .wav files or for streaming through your soundcard via PortAudio. Dependencies Liquid DSP Be sure to work from the devel branchlibfec (optional but strongly recommended)Janssonlibsndfile (optional)PortAudio (optional) Build With the dependencies installed, run . Profiles The encoding and decoding processes are controlled by the profiles in quiet-profiles.json. Cable For cable transmission, use the cable- profiles. Ultrasonic The ultrasonic- profiles encode data through a very low bitrate, but the audio content lies above 16kHz, which should pass through audio equipment relatively well while being inaudible to the average person. Javascript binding for libquiet Javascript binding for libquiet allows sending and receiving data via sound card from any browser. Compatibility Usage

TOR Mail Encrypted Server: OnionMail TOR Mail Encrypted Server for Hidden Services OnionMail is an anonymous, encrypted mail server made to run on TOR network without losing the ability to communicate with the Internet. All OnionMail servers are configured as TOR hidden services and use SSL (via STARTTLS). To use OnionMail all you need is an email client connected to the TOR network – Example: Claws-Mail or Thunderbird. All OnionMail servers are connected in a ‘federated network’. Thanks to the TOR network nobody can know: Who are you.With whom you are communicating.If you are communicating.What are you reading or writing.Where are you.Where is the server.What you are doing. List of some OnionMail’s functions: Multiple instances of server. Password key derivation via multiple keyfiles and passwords.Deleting files with wipe by default.Message headers filtering to hide informations and sigint.POP3 TLS Access.SMTP TLS Access.User’s parameters.Exit node selection to connect to internet.M.A.T.

Pattern Matching Swiss Knife: YARA YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic. Let’s see an example: The above rule is telling YARA that any file containing one of the three strings must be reported as silent_banker. Pattern Matching Swiss Knife: Installation Download the source tarball and get prepared for compiling it: tar -zxf yara-3.1.0.tar.gz cd yara-3.1.0 . YARA uses GNU autotools, so it’s compiled and installed in the standard way: . Some YARA’s features depends on the OpenSSL library. The following modules are not copiled into YARA by default: cuckoomagic If you plan to use them must pass the corresponding --enable-<module name> arguments to theconfigure script. For example: . Installing on Windows dummy my_first_rule

Dark Internet Mail Environment: DIME Internet electronic mail (email) was designed in the early days of the Internet, and so lacks any mechanism to protect the privacy of the sender and addressee. Several techniques have been used in an attempt to increase the privacy of email. These techniques have provided either modest increases in privacy, or have proven to be very difficult to use for most people. In addition to protection of content, truly private email must limit information disclosed to handling agents, only exposing information necessary for delivery (the metadata), and provide robust identity guarantees which prevent the impersonation of senders. The goal of DIME is to provide a messaging system capable of protecting user privacy. The term security is frequently has also been frequently abused. These definitions led to specific deficiencies within the current email infrastructure, and its ability to ensure the security of confidential information. Technologies used Directories autoreconf --install Then: .

Automated Modular Cryptanalysis Tool: FeatherDuster Automated Modular Cryptanalysis Tool FeatherDuster is a tool written by Daniel “unicornfurnace” Crowley of NCC Group for breaking crypto which tries to make the process of identifying and exploiting weak cryptosystems as easy as possible. Cryptanalib is the moving parts behind FeatherDuster, and can be used independently of FeatherDuster. Cryptanalib can be used separately of FeatherDuster to make Python-based crypto attack tools. Documentation for cryptanalib functions can be accessed through the Python help() function The analysis engine in Cryptanalib, used by FeatherDuster, can automatically detect encodings and decode samples. The engine assumes that all samples are generated with the same process (for instance, base64encode(aes_encrypt(datum))), but can handle mixed samples to some degree. Vanilla Base64 ASCII hex-encoding Zlib compression Cryptanalib’s analysis engine can detect a number of properties in the analysis phase, too: This is a beta release of FeatherDuster. Installation

Multiprotocol Network Emulator - Simulator: IMUNES IMUNES GUI is a simple Tcl/Tk based management console, allowing for specification and management of virtual network topologies. The emulation execution engine itself operates within the operating system kernel. Univesity of Zagreb developed a realistic network topology emulation / simulation framework based on the FreeBSD and Linux operating system kernel partitioned into multiple lightweight virtual nodes, which can be interconnected via kernel-level links to form arbitrarily complex network topologies. Main advantages: Current applications: General-purpose network testbed used for Ericsson Nikola Tesla product testingRealistic laboratory and learning environments used for teaching at the University of Zagreb Technologies used: jails, netgraph (FreeBSD)Docker, Open vSwitch (Linux) IMUNES advantages Project overview As invaluable tools in networked and distributed systems research, network emulators and simulators offer a viable alternative to live experimental networks. FreeBSD packages

Open-Source Phishing Toolkit: gophish Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute hishing engagements and security awareness training. Installing Gophish Using Pre-Built Binaries Gophish is provided as a pre-built binary for most operating systems. With this being the case, installation is as simple as downloading the ZIP file containing the binary that is built for your OS and extracting the contents. Installing Gophish from Source One of the major benefits of having written gophish in the Go programming language is that it is extremely simple to build from source. To install gophish, simply run go get github.com/gophish/gophish This downloads gophish into your $GOPATH. Next, navigate to $GOPATH/src/github.com/gophish/gophish and run the command go build This builds a gophish binary in the current directory. Running Gophish Now that you have gophish installed, you’re ready to run the software.

Malicious Traffic Detection System: Maltrail Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. for known malicious executable) or IP address (e.g. 103.224.167.117 for known attacker). Also, it has (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware). The following (black)lists (i.e. feeds) are being utilized: As of static entries, the trails for the following malicious entities (e.g. malware C&Cs) have been manually included (from various AV reports): Architecture Maltrail is based on the Sensor <-> Server <-> Client architecture. Server‘s primary role is to store the event details and provide back-end support for the reporting web application. Source && Download

Open-Source Disk Encryption for Windows: LibreCrypt LibreCrypt is an Open-Source “on-the-fly” transparent disk encryption for Windows (both 32 and 64 bit). LUKS compatible – (formerly DoxBox). This software can create “virtual disks” on your computer – anything written to these disks is automatically encrypted before being stored on your computer’s hard drive. Features Easy to use, with a ‘wizard’ for creating new ‘containers’.Full transparent encryption, containers appear as removable disks in Windows Explorer.Explorer mode lets you access containers when you don’t have admin permissions.Compatible with Linux encryption, Cryptoloop “losetup”, dm-crypt, and LUKS. Please note this is a Beta version with some known limitations. New features in version 6.2 Change of name to ‘LibreCrypt’Many UI bugs fixedImproved support for GPT partitioned discs. Release notes Important: LibreCrypt in Portable mode will not work on Windows Vista and later 64 bit versions without a extra step before use. Passwords About LibreCrypt Technical details SafeBoot

Best Free Server Monitoring Tools Monitoring Linux System and Network Performance can be a daunting task for a new system admin. Network and system monitoring is a broad category. There are solutions that monitor for the proper operation of servers, network gear, and applications, and there are solutions that track the performance of those systems and devices, providing trending and analysis. These tools can make your life easier. Note: All tools are available under all flavors of Linux . Top – Linux Process Monitoring Linux Top command is a performance monitoring program used frequently by many system administrators to monitor Linux performance. # top VmStat – Virtual Memory Statistics Linux VmStat command is used to display statistics of virtual memory, kernerl threads, disks, system processes, I/O blocks, interrupts, CPU activity and much more. Lsof – List Open Files Lsof command is used to display a list of all open files and processes. Tcpdump – Network Packet Analyzer Netstat – Network Statistics # htop # iotop atop ftptop

Network Forensic Analysis Tool: Xplico CyberPunk » Digital Forensic The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is released under the GNU General Public License and with some scripts under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) License Features Xplico is a Network Forensic Analysis Tool (NFAT) Xplico System is composed from four macro-components: a Decoder Manager called Demaan IP/network decoder called Xplicoa set of applications called Manipulators for the manipulation of decoded dataa visualization system to view data extracted Install Source && Download Visitors Rating 11 ratings You have rated this Read More Command Line Interface DLL Injector: Injectory Multiplatform Linux Sandbox: Detux Memory Scanning Tool: MemScan

Open Source Network Access Control: Packet Fence PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) system. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, 802.1X support, layer-2 isolation of problematic devices, integration with IDSs and vulnerability scanners; PacketFence can be used to effectively secure networks – from small to very large heterogeneous networks. Free and Open Source Network Access Control Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, powerful BYOD management options, 802.1X support, layer-2 isolation of problematic devices; PacketFence can be used to effectively secure networks small to very large heterogeneous networks. Among the different markets are : Features: PacketFence reuses many components in an infrastructure. Depending on your setup you may have to install additional components like:

Related: