If you haven’t heard already about Jasager.. well you probably don’t read this blog, but for those who want to know a bit more about the history of Jasager - Karma on the Fon, where the project is now, and where it’s headed, then buckle up, and hang on while we first travel down memory lane. History: The time was ShmooCon 2006. It was my very first “HACKER” convention. I was there with my buddies from Hak5 and SploitCast.
Well, it’s not the only answer but I will call them that because it’s what worked for me: Sitting a couple rows down from the line so that no one would see me from the bus line I was targeting, I waited for the bus to come. As soon as it came rolling up and quickly moved into a dash for the door, timing it so that I could cut in line to be the 4th on.
Here is the scenerio: There is a line of government, and commerical workers that are in line for the bus. The bus is late, and everyone has had a long day of work. Your target is the first person in line. The line is 75 people long for a bus with a max occupancy of 35 people. Your target is the same sex as you and has headphones in their ears.
So there are all kinds of links that I find and queue up to look at but hate keeping them open in tabs, and they aren’t always in Google Reader and I don’t want to spam to twitter, so Mubix’s Links was born. I setup ScribeFire with a new blogspot account and now, no more tabs, it truely feels like an application of GTD. Plus it allows anyone who is interested to follow along via the blogspot feed.
Now that you have had some time to play around with Community Edition or if you were lucky (or rich) enough, the Full version. We are going to start delving into the the pieces of Maltego and then in Part 5 we rip it apart and put it back together for PT-TAS (Penetration Testing - Transform Application Server). I am going to say “investigation” a lot in the coming paragraphs and parts of this article.
Do what you love, love what you do is what I have been told since I was young, and Gary V takes that puts it in the mirror and makes you look at it with the following video:
Due to a PEBKAC error with the ID 10 T, I have had to retype parts 2 and 3, which were ready to go out the door. In the mean time while I fix myself, here are a couple sites that can keep you busy: Search google for exploits: http://www.exploitsearch.com/ Watch just about any TV show (and some movies) online: http://www.surfthechannel.com/ Play any NES game online:
So we are taking a short break from my 4 part series on Maltego to bring you a guest post on runtime packers done by your friendly neighborhood Security Shoggoth. Packers are one of those mystical tech items out there that for most people sound too complicated to even look into. What SecShoggoth and I aimed for with this post is to have understandable yet technical and I think he did an awesome job:
First lets outline whats to come: Table of Contents: Part 1 - Introduction Part 2 - Entities and Transforms Part 3 - The Human Factor Part 4 - Server Time (CTAS, PTTAS, MALTAS, SQLTAS, SNTAS) Part 5 - Hacks, Tips, and Tricks **EDIT: This and the following posts are also show notes for the **Season 4 premiere** of **Hak5 So Maltego 2 has been released and all I have to show for it are these images stolen from paterva.
So, instead of doing this the right way, which is submitting a bug report to google, I am going to do this the blogger way: Publish article to blog about problem in product Wait for traffic to rise on blog Become giddy at rise in traffic due to outstanding title Watch as traffic falls within days Become angry and write retort (in said blog, still not contacting the company) getting mad about the STILL unfixed problem