Friday, July 31, 2009

Programming from the Ground Up

RT @windexh8er: Was looking for a good assembly book. Ran across free! Friday FTW.
(Long Version:

I have only had a chance to jump through it quickly but the examples look easy to read and has a bunch of explination surrounding it. Definitely in my 'to read' pile.

Then @craigbalding countered with: @mubix @windex8er cool...but don't forget the original ASM freebie: (The Art of Assembly)

This should be enough assembly to fill quiet a few weekends.

Thursday, July 23, 2009

Ncrack – Think Hyrda integrated into Nmap

and made better ;-)

Salted Password Cracker / MetaScanner

Kalgecin has two great tools over at his Google code page. - md5/sha1cracker, works with dictionaries as well as rainbowtables. Or so it says. I haven’t tested yet.

MetaScanner – Kinda like db_autopwn but a lot more customizable.

Internet by all means

S├ębastien Raveau posted a great article back in June about all the different ways of getting internet access when that access is restricted. I tweeted about it and talked about it but never put it here, and I always have a hard time re-finding his site (this is my only bookmarking)

Definitely check it out if you haven’t already.

Usenet Resource Downloader

Yes.. people still use Usenet. And this is a great way of accessing those pirated movies in-depth technical discussions.


Wednesday, July 22, 2009

InGuardians Tools List

Some of my favorites: SSH_Decoder, Middler, and ServifyThis


A database driven wardriving / wep cracking machine.

Original post:

“New Site”:

Bindshell’s Tools List

Makers of BeEF (Browser Exploitation Framework) have a bunch of other great tools:

Echo Mirage is one I have a lot of fun with. And Dnetj is a REALLY useful setup if you can get it going on some beefy boxes.


Metacab is a cabinet file that contains Netcat, Nmap, VNC and other remote administration utilities that need only a Windows command shell, cmd.exe, to install and use. Install and uninstall scripts are included, and work is being completed on antivirus evasion.

CeWL – Custom Wordlist Generator

By @diginina

By default, CeWL sticks to just the site you have specified and will go to a depth of 2 links, this behavior can be changed by passing arguments. Be careful if setting a large depth and allowing it to go offsite, you could end up drifting on to a lot of other domains. All words of three characters and over are output to stdout. This length can be increased and the words can be written to a file rather than screen so the app can be automated.

Version 2 of CeWL can also create two new lists, a list of email addresses found in mailto links and a list of author/creator names collected from meta data found in documents on the site. It can currently process documents in Office pre 2007, Office 2007 and PDF formats. This user data can then be used to create the list of usernames to be used in association with the password list.

Backdooring OpenSSH by Ithilgore

Reverse Code Engineering Tool Library

The “Collaborative RCE Tool Library” is an awesome list of tools used for RE, but as with all tools, they can be used in a ton of different ways

Core Security Free Tools

Monday, July 20, 2009

Structure of Microsoft PE Files

This is almost as bad as reading the IA32 Assembly manuals, but it’s a must read and it’s really not that long.

Everything you ever wanted to know about PE files:

Thanks cpwp from the Offensive Security forums for the link

Computer Hardware Cheat-Sheet Poster

It costs ($49) to get printed, but you can print it yourself. A great reference for anyone that has ever built a computer.

Saturday, July 18, 2009

Polypack – What packer is your friend?

This site checks your binaries against AV, packed and unpacked, then tells you what the best packer, if any would help you avoid AV. But remember, this means you are uploading your binary to a host that you don’t know.

Ncat – Nmap’s new Netcat

Ncat adds many capabilities not found in Hobbit's original nc, including SSL support, proxy connections, IPv6, and connection brokering. The original nc contained a simple port scanner, but we omitted that from Ncat because we have a preferred tool for that function

In-depth Windows Registry

Tim from the PenTest mailing list posted the following references that really delve deep into the Windows hive:

The Windows registry hive format is described here:
Also, some of Brendan Dolan-Gavitt's tools and blog
( posts may be helpful in figuring out
what's what in SAM hives.

Bypassing Software Restriction Policies

Beating Linux ASLR

Friday, July 17, 2009

Buffer Overflow examples

“Insecure Programming by Example”

These are great tutorials that you can compile and find your zerodays in them. (oh , then send them to a friend, use ServifyThis to make it a service and have you very own vuln)

Offsec LM Cracker

Wednesday, July 8, 2009


They currently have a “Summer Special” for 22.00 a case.

Sunday, July 5, 2009

Paimei – Reverse Engineering Framework

Script Your Documentation Instantly

A great project that allows documentation of network assets locally and over the network ;-) (SYDI). It does a lot that the Meterpreter script ‘winenum’ does, and a whole lot more. Most of it really doesn’t help you as an attacker, but it did spark a lot of good ideas, and sometimes you might not have the power of meterpreter at your beck & call.


Can’t believe I never posted this, it’s Moxie’s sslstrip tool from BH DC 2009. Does some amazing things to help MITM ssl sessions.

WMI interfacing Python Script (nix)

Thanks to Joe McCray of for the link!

Thursday, July 2, 2009


If you haven’t seen this video yet, it’s well worth the 16 minutes of your life (yes it is a bit corny):

Handwritten fronts – Presenters this is for you!

One of Garr Reynolds from Presentation Zen’s staples when creating a presentation is to use a unique font. Here is an amazing resource for handwritten fonts, which look GREAT on presentations: