Here is the scenerio: There is a line of government, and commerical workers that are in line for the bus. The bus is late, and everyone has had a long day of work. Your target is the first person in line. The line is 75 people long for a bus with a max occupancy of 35 people. Your target is the same sex as you and has headphones in their ears.
So there are all kinds of links that I find and queue up to look at but hate keeping them open in tabs, and they aren’t always in Google Reader and I don’t want to spam to twitter, so Mubix’s Links was born. I setup ScribeFire with a new blogspot account and now, no more tabs, it truely feels like an application of GTD. Plus it allows anyone who is interested to follow along via the blogspot feed.
Now that you have had some time to play around with Community Edition or if you were lucky (or rich) enough, the Full version. We are going to start delving into the the pieces of Maltego and then in Part 5 we rip it apart and put it back together for PT-TAS (Penetration Testing - Transform Application Server). I am going to say “investigation” a lot in the coming paragraphs and parts of this article.
Do what you love, love what you do is what I have been told since I was young, and Gary V takes that puts it in the mirror and makes you look at it with the following video:
Due to a PEBKAC error with the ID 10 T, I have had to retype parts 2 and 3, which were ready to go out the door. In the mean time while I fix myself, here are a couple sites that can keep you busy: Search google for exploits: http://www.exploitsearch.com/ Watch just about any TV show (and some movies) online: http://www.surfthechannel.com/ Play any NES game online:
So we are taking a short break from my 4 part series on Maltego to bring you a guest post on runtime packers done by your friendly neighborhood Security Shoggoth. Packers are one of those mystical tech items out there that for most people sound too complicated to even look into. What SecShoggoth and I aimed for with this post is to have understandable yet technical and I think he did an awesome job:
First lets outline whats to come: Table of Contents: Part 1 - Introduction Part 2 - Entities and Transforms Part 3 - The Human Factor Part 4 - Server Time (CTAS, PTTAS, MALTAS, SQLTAS, SNTAS) Part 5 - Hacks, Tips, and Tricks **EDIT: This and the following posts are also show notes for the **Season 4 premiere** of **Hak5 So Maltego 2 has been released and all I have to show for it are these images stolen from paterva.
So, instead of doing this the right way, which is submitting a bug report to google, I am going to do this the blogger way: Publish article to blog about problem in product Wait for traffic to rise on blog Become giddy at rise in traffic due to outstanding title Watch as traffic falls within days Become angry and write retort (in said blog, still not contacting the company) getting mad about the STILL unfixed problem
Original Article: http://sunbeltblog.blogspot.com/2008/09/how-to-make-notepadexe-malicious-file.html Archive.org Saved Page Alex Eckelberry over at Sunbelt got an itch to see which virus vendors were just using packer signatures instead of emulating the defaltion process and detecting the virus inside. This is a shortcut that can yield false positives such as demonstarted in Alex’s experiment, but is done due to the overhead such an undertaking would introduce, I assume, to the client software. I bring this up here because I recently conducted a somewhat similar test, although I admittedly know very little about packers.
Just like it’s LOVELY auto download feature, Google Chrome slipped in a new version. I was testing out some of the latest and greatest posts of exploits for .27 and they were failing to work. Checked my version and low and behold a new version number was displayed. I didn’t upgrade, all done automagically. (Evilgrade anyone?) I wonder what will pop on this new version.