Author Archives: Jason Lewis

Todo.txt, a command line todo list

Todo.txt is a shell based todo list manager. It reads and writes to text files, which makes it portable and easy to edit with other tools. I run a copy on my Mac, but you can run it anywhere you … Continue reading

Posted in Tools | Tagged , , , , , | Comments Off on Todo.txt, a command line todo list

The Cybermen are coming!

In a recent AP article, a researcher describes a hypothetical scenario where given $100 million dollars he could build a cyber army in two years. Link here. I found this interesting because the tone of the article suggested that cyber … Continue reading

Posted in Opinion | Tagged , , , , , | Comments Off on The Cybermen are coming!

How to build a covert network with OpenVPN

There are many uses for a covert network, for this hypothetical scenario we are corporate spies and we need to exfiltrate data from our assets inside the target corporations network. I don’t think the concepts here are new, but I … Continue reading

Posted in HowTo | Tagged , , , , , , | Comments Off on How to build a covert network with OpenVPN

Ubuntu LDAP client How To

This works with Ubuntu 10.04 clients using an OSX Snow Leopard OpenLDAP server. It should work with other variants, but I had such a terrible time finding documentation for ubuntu and osx, that I decided to post this.

Posted in HowTo | Tagged , , , , , , | Comments Off on Ubuntu LDAP client How To

EFW NAT Loopback

To allow users on internal interfaces to access the external IP, you need to add a Source NAT rule. This is sometimes referred as NAT Loopback. * Source: Network of your LAN subnet * Destination: GREEN/ORANGE * Service: ANY * … Continue reading

Posted in Configs | Tagged , , , , | Comments Off on EFW NAT Loopback

Network Analysis 2.0: Staying Ahead of the Threat Curve with AIRE

INTRODUCTION Automation, innovation, reaction and expansion (AIRE) are the foundation of the next generation of analysis techniques and tools – Network Analysis 2.0. The importance of data network analysis is often overlooked, but it impacts many areas including cyber defense, … Continue reading

Posted in Papers | Tagged , , , , , , , , , , , | Comments Off on Network Analysis 2.0: Staying Ahead of the Threat Curve with AIRE

Getting an image via tftp at the rommon prompt

* rommon 1 > IP_ADDRESS=192.168.11.11 * rommon 2 > IP_SUBNET_MASK=255.255.255.0 * rommon 3 > DEFAULT_GATEWAY=192.168.11.1 * rommon 4 > TFTP_SERVER=192.168.11.100 * rommon 5 > TFTP_FILE=c2600-io3-mz.122-9.bin * rommon 6 > tftpdnld

Posted in Configs | Tagged , , , | Comments Off on Getting an image via tftp at the rommon prompt

HAPPY FESTIVUS!

All of us here at ManTodd Industries look forward to celebrating Festivus. Below, you can find all the tools you need to make your Festivus Holiday a successful one.

Posted in Uncategorized | Tagged , , , , , , | Comments Off on HAPPY FESTIVUS!

Malware Cleaning

I recently had to clean an infected Windows computer where the malware was impossible to remove while running windows. I couldn’t find a resource that had straight forward instructions on what to do when the malware was so entrenched that … Continue reading

Posted in HowTo | Tagged , | Comments Off on Malware Cleaning