Metasploit is awesome, but some don’t know that their are updates all the time via SVN, and even fewer know of places to get good non-svn modules / scripts. Here are a few of my favorites: https://www.securinfos.info/metasploit/msfxdc.php http://metasploit.com/users/mc/ http://darkoperator.blogspot.com – newly added, check out the CookieMonster script and a host of others: http://pentest.cryptocity.net And of course: http://carnal0wnage.blogspot.com/
I have had the idea for this app for a long time, expressed it a few times, but never really pushed, and I sure that I am not the only one who has thought of or wanted an app like Ear Trumpet by Robin Wood. Well on Jan 21st Sam Buhlig posted to the PaulDotCom mailing list asking for an app to test a firewall that would answer on all ports.
I registered Bobstories.com after listening to PaulDotCom for a while. I have always told stories of this manor, but never quite put a name to “my friend”. Now that he has a name, it is only fitting that he has a domain and a blog. Please, come, register under the name bob_#### with a mailinator address to match, or your own name and email address if you wish. I’ll moderate all posts simply for spam purposes and have them up post haste.
I recently obtained the status Offensive Security Certified Professional. It is one of the best courses I have ever taken. It challenged me to think and learn new skills on the fly. You start the course with a bunch of video files, a huge pdf and an lzm file to get your VPN setup. It is self paced and intense. The topics cover everything from Back|Track basics to the HXDEF rootkit.
First: Using SAMBA to crack Unix passwords Theory: You compromise a unix host during a pentest and grab /etc/shadow and /etc/password. You take the entries for root in both and drop them into a unix host that you control that is set up with SAMBA to sync authentication. You then use windows methods to extract the LM/NTLM hash from SAMBA. Problem: SAMBA doesn’t cache the LM/NTLM hash until the correct one is passed to it.
The Full Disclosure mailing list has a long and illustrious past. It has played host to everything from zero days to politics. One thing that has rung true for a number of years, if not since it’s inception is that it is unregulated (save spam of course). However in recent months it has fallen pray to less and less technical discussions, and more bickering, name calling, and outright trolling. The reason for this post is to let everyone know that has unsubscribed, that a change is coming.
TiVo and DVRs in general have brought TV watching a long way. Some of the innovations that have come of it have made the TV experience better. Commercial skipping is my own personal favorite. But some of the other features are pausing, rewinding, and fast forwarding (after you are behind a bit obviously) and finally recording. Now, recording live TV is nothing new. People have done it since VCRs were invented, and I’m sure much before then.
More information can be found at http://www.podcastersmeetup.com/ But here is the down and dirty: We are sponsored this year by: HP, SunbeltSoftware, DojoSec, and TheAcademyPro / TheAcademyHome solidly so far. The following podcasts will be making an appearance: Hak5 PaulDotCom CyberSpeak Securabit SploitCast Unpersons Phone Losers of America SMBMinute And the schedule goes as such: 1700 - 1800 - Meet and greet, and setup (Everyone involved in the live event please show up as close to this start time as possible) 1800 - 1900 - Live Show (This will probably go over time) 1900 - 1930 - Book signing and transition time 1930 - 2030 - FireTalks (more below) 2030 - 0400 - Food and Drinks on us at local spot.
Sponsors: We have had a lot of great response for everyone on this year’s event! I want to reiterate, this event is for podcasters, bloggers, twitter addicts, and everyone in between. I would also like to announce an update to our sponsor’s lineup: TheAcademyPro.com / TheAcademyHome.com > These are twin sites catering videos to the security pro looking to learn about everything from enterprise gear to Maltego, and the home user trying to start the learning about security and how to secure their own computers without going to you the IT guy in the family.
Table of Contents: Part 1 - Introduction Part 2 - Entities and Transforms Part 3 - The Human Factor Part 4 - Server Time (CTAS, PTTAS, MALTAS, SQLTAS, SNTAS) Part 5 - Hacks, Tips, and Tricks Today we are taking a brief step outside of Maltego and at the end we’ll show how you can use what you have learned to take Maltego to another level. So, without further ado: