Todo.txt is a shell based todo list manager. It reads and writes to text files, which makes it portable and easy to edit with other tools. I run a copy on my Mac, but you can run it anywhere you have a shell, for example on a VPS that you can access remotely.
Continue reading
Todo.txt, a command line todo list
The government leads in cyber-boring
Mike Subelsky has a great blog post where he writes about why you might not want a government cybersecurity job. I agree with all his points and even have some to add.
Continue reading
The Cybermen are coming!
In a recent AP article, a researcher describes a hypothetical scenario where given $100 million dollars he could build a cyber army in two years. Link here. I found this interesting because the tone of the article suggested that cyber armies like this don’t already exist.
Continue reading
How to build a covert network with OpenVPN
There are many uses for a covert network, for this hypothetical scenario we are corporate spies and we need to exfiltrate data from our assets inside the target corporations network. I don’t think the concepts here are new, but I haven’t seen any decent how to’s for a setup like this.
I’m going to skip some steps that aren’t relevant to the configuration and use of OpenVPN, the reader needs to accept that my corporate target has a compromised host on their network. This includes how the VPN is hidden from the target, how root access is obtained, etc. Those details are left to the reader. I will discuss possible solutions, but not how to implement them. This configuration could just as easily be used to share pictures between family members.
Continue reading
Ubuntu LDAP client How To
This works with Ubuntu 10.04 clients using an OSX Snow Leopard OpenLDAP server. It should work with other variants, but I had such a terrible time finding documentation for ubuntu and osx, that I decided to post this.
Continue reading
EFW NAT Loopback
To allow users on internal interfaces to access the external IP, you need to add a Source NAT rule. This is sometimes referred as NAT Loopback.
* Source: Network of your LAN subnet
* Destination: GREEN/ORANGE
* Service: ANY
* NAT: Auto
Works with Endian Firewall Community 2.3. It probably applies to other similar FWs like IPCop and Smoothwall.
Network Analysis 2.0: Staying Ahead of the Threat Curve with AIRE
INTRODUCTION
Automation, innovation, reaction and expansion (AIRE) are the foundation of the next generation of analysis techniques and tools – Network Analysis 2.0. The importance of data network analysis is often overlooked, but it impacts many areas including cyber defense, cyber intelligence, law enforcement / investigative analysis, and financial and critical infrastructure. Cyber attacks are conducted daily by organized groups around the world, and network analysis is important for maintaining total cyber situational awareness. AIRE enables analysts to make huge strides in data analysis, maintain a competitive advantage and stay one step ahead of attackers.
Continue reading
Getting an image via tftp at the rommon prompt
* rommon 1 > IP_ADDRESS=192.168.11.11
* rommon 2 > IP_SUBNET_MASK=255.255.255.0
* rommon 3 > DEFAULT_GATEWAY=192.168.11.1
* rommon 4 > TFTP_SERVER=192.168.11.100
* rommon 5 > TFTP_FILE=c2600-io3-mz.122-9.bin
* rommon 6 > tftpdnld
Malware Cleaning
I recently had to clean an infected Windows computer where the malware was impossible to remove while running windows. I couldn’t find a resource that had straight forward instructions on what to do when the malware was so entrenched that removing it seemed impossible. My first attempt at cleaning was with the windows computers hard drive connected to a machine running Ubuntu 8.04.1 and a scan with ClamAV. This works ok, but it’s a pain to hook up hard drives and certainly not something the average windows user can do.
Continue reading