Friday, July 31, 2009
(Long Version: http://savannah.inetbridge.net/pgubook/)
I have only had a chance to jump through it quickly but the examples look easy to read and has a bunch of explination surrounding it. Definitely in my 'to read' pile.
Then @craigbalding countered with: @mubix @windex8er cool...but don't forget the original ASM freebie: http://webster.cs.ucr.edu/AoA/index.html (The Art of Assembly)
This should be enough assembly to fill quiet a few weekends.
Monday, July 27, 2009
Thursday, July 23, 2009
Kalgecin has two great tools over at his Google code page.
Crack.pl - md5/sha1cracker, works with dictionaries as well as rainbowtables. Or so it says. I haven’t tested yet.
MetaScanner – Kinda like db_autopwn but a lot more customizable.
Sébastien Raveau posted a great article back in June about all the different ways of getting internet access when that access is restricted. I tweeted about it and talked about it but never put it here, and I always have a hard time re-finding his site (this is my only bookmarking)
Definitely check it out if you haven’t already.
Yes.. people still use Usenet. And this is a great way of accessing those
pirated movies in-depth technical discussions.
Wednesday, July 22, 2009
Metacab is a cabinet file that contains Netcat, Nmap, VNC and other remote administration utilities that need only a Windows command shell, cmd.exe, to install and use. Install and uninstall scripts are included, and work is being completed on antivirus evasion.
By default, CeWL sticks to just the site you have specified and will go to a depth of 2 links, this behavior can be changed by passing arguments. Be careful if setting a large depth and allowing it to go offsite, you could end up drifting on to a lot of other domains. All words of three characters and over are output to stdout. This length can be increased and the words can be written to a file rather than screen so the app can be automated.
Version 2 of CeWL can also create two new lists, a list of email addresses found in mailto links and a list of author/creator names collected from meta data found in documents on the site. It can currently process documents in Office pre 2007, Office 2007 and PDF formats. This user data can then be used to create the list of usernames to be used in association with the password list.
The “Collaborative RCE Tool Library” is an awesome list of tools used for RE, but as with all tools, they can be used in a ton of different ways
Monday, July 20, 2009
This is almost as bad as reading the IA32 Assembly manuals, but it’s a must read and it’s really not that long.
Everything you ever wanted to know about PE files:
Thanks cpwp from the Offensive Security forums for the link
It costs ($49) to get printed, but you can print it yourself. A great reference for anyone that has ever built a computer.
Saturday, July 18, 2009
This site checks your binaries against AV, packed and unpacked, then tells you what the best packer, if any would help you avoid AV. But remember, this means you are uploading your binary to a host that you don’t know.
Ncat adds many capabilities not found in Hobbit's original nc, including SSL support, proxy connections, IPv6, and connection brokering. The original nc contained a simple port scanner, but we omitted that from Ncat because we have a preferred tool for that function
Tim from the PenTest mailing list posted the following references that really delve deep into the Windows hive:
The Windows registry hive format is described here:
Also, some of Brendan Dolan-Gavitt's tools and blog
(http://moyix.blogspot.com/) posts may be helpful in figuring out
what's what in SAM hives.
Friday, July 17, 2009
“Insecure Programming by Example” http://community.corest.com/~gera/InsecureProgramming/
These are great tutorials that you can compile and find your zerodays in them. (oh , then send them to a friend, use ServifyThis to make it a service and have you very own vuln)
Thursday, July 16, 2009
Monday, July 13, 2009
Wednesday, July 8, 2009
Sunday, July 5, 2009
A great project that allows documentation of network assets locally and over the network ;-) (SYDI). It does a lot that the Meterpreter script ‘winenum’ does, and a whole lot more. Most of it really doesn’t help you as an attacker, but it did spark a lot of good ideas, and sometimes you might not have the power of meterpreter at your beck & call.
Can’t believe I never posted this, it’s Moxie’s sslstrip tool from BH DC 2009. Does some amazing things to help MITM ssl sessions.
Thursday, July 2, 2009
One of Garr Reynolds from Presentation Zen’s staples when creating a presentation is to use a unique font. Here is an amazing resource for handwritten fonts, which look GREAT on presentations: