Setup Maltego Transforms on BT5r3

January 9th, 2013 2 comments

Aloha,

It’s been a while….:)

One friend of mine ask me to show him how to setup the transforms in Maltego and I said that I will create a fast screen cast . The video has no sound so you don’t have to turn on the volume ;)

Maltego is an open source intelligence and forensics application.
Read more here http://www.paterva.com/web6/products/maltego.php

Read more…

Categories: General Tags:

Microsoft, Adobe Start 2013 with Security Updates

January 9th, 2013 No comments

See on Scoop.itLatest malware information


To jumpstart the new year, both Microsoft and Adobe release their security updates today. Microsoft, in particular, releases seven bulletins to address 12 vulnerabilities while Adobe issues its fix for Adobe Reader and Acrobat.


See on blog.trendmicro.com

Categories: Uncategorized Tags:

cPanel and WHM Multiple Cross Site Scripting … – The Hacker News

January 8th, 2013 No comments

See on Scoop.itPenetration Testing
Product: Cpanel & WHM; Security-Risk: High; Remote-Exploit: yes; Vendor-URL: http://www.cpanel.net; Affected Products: Cpanel’s Latest Version; Solution: Proper input sanitisation. Discovered by: …
See on thehackernews.com

Categories: Uncategorized Tags:

So Soon? Malware Attacks on Windows 8 – Midsize Insider

January 8th, 2013 No comments

See on Scoop.itLatest malware information
So Soon? Malware Attacks on Windows 8Midsize InsiderFor Windows 8, the latest malware takes on the disguise of antivirus protection. According to the TrendMicro’s …
See on midsizeinsider.com

Categories: Uncategorized Tags:

How cyber-criminals are planning to attack in 2013 – Moneyweb.co.za

January 8th, 2013 No comments

See on Scoop.itLatest malware information

How cyber-criminals are planning to attack in 2013Moneyweb.co.zaMicrosoft’s latest operating system, along with all of its predecessors, will also suffer attacks.
See on www.moneyweb.co.za

Categories: Uncategorized Tags:

Vulnerabilities In Java And Adobe Will Be Main Targets For Cybercriminals In 2013 – Dark Reading

January 8th, 2013 No comments

See on Scoop.itLatest malware information

Vulnerabilities In Java And Adobe Will Be Main Targets For Cybercriminals In 2013 Dark Reading Windows 8: Microsoft’s latest operating system, along with all of its predecessors, will also suffer attacks.
See on www.darkreading.com

Categories: Uncategorized Tags:

Ubuntu/Backtrack: Read only filesystem fix

November 2nd, 2012 No comments

Long long time same prob with VMs..
forgot to take a snapshot, it didn’t shutdown correctly, and in next boot stucks in fsck check..
It is a huge problem having lot of ppl with VMs..
Finaly i came to a solution reading lot of forums.. I combined them to a single solution..

Most ppl say that you’ll solve your prob doing this
mount -o remount,rw /

But that didn’t work in my case..

 

I fixed my issue in the followng steps..:

- First of all, while you are in the read-only filesystem, check your boot errors with [code]dmesg |grep mount[/code]
and you may see some msg saying that it remounted your system in read-only mode (like “remount-ro”)
Remember this.. we’ll compare it to the next dmesg after following these steps:

1. Boot with a ubuntu/backtrack live iso

2. Mount the filesystem
mkdir /root/test
mount /dev/sda1 /root/test

3. And edit /etc/fstab of the mounted drive in /root/test/etc/fstab nano /root/test/etc/fstab and change to zero all counters..
Also if there is an error status writing “error=…” and “remount-ro” delete it and replace with “defaults” save the file and exit..

4. Type the following inline bash script to fix all drive errors:
for i in $(ls /dev/sd*);do e2fsck $i -C0;done

..and reboot..
After reboot check errors dmesg |grep mount
If the remount-ro message is missing, you are ok.. :p

That’s it..

[remote exploits] – Poison Ivy 2.3.2 C&C Server Buffer Overflow …

July 23rd, 2012 No comments

See on Scoop.itMetasploit
redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ##. require ‘msf/core’. class Metasploit3 < Msf::Exploit::Remote Rank = …
See on www.allinfosec.com

Categories: Uncategorized Tags:

Sniffing and Securing Cisco Switch traffic

June 6th, 2012 1 comment

ALoha,

This is the first on the series…..about Securing Cisco Devices.!

Cisco Switches must be configured!!!!
This is the reason you bought a Cisco Switch ;)
By default the ports are all configured as dynamic desirable which will cause a trunk to be automatically created if 2 switches with default configuration are connected.
So lets see what a malicious user can get….by sniffing the network.

After that using  few commands specific for the switchport we will limit  the traffic to protect the switch !

The Final Configuration of the port will be :

SW1#show running-config interface fastEthernet 0/18
Building configuration…

Current configuration : 319 bytes
!
interface FastEthernet0/18
 switchport mode access
 no cdp enable
 spanning-tree bpdufilter enable
 spanning-tree bpduguard enable
end

After the above configuration you should not connect another Switch on the interface FastEthernet 0/18. The Configuration is for end devices only.

Links to follow

 

Cryptographp Local File Inclusion / HTTP Response Splitting | Inj3ct0r – exploit database : vulnerability : 0day : shellcode

May 18th, 2012 No comments

See on Scoop.itLast exploits
Cryptographp Local File Inclusion / HTTP Response Splitting by Lu33Y in webapps / 0day | Inj3ct0r 1337 – exploit database : vulnerability : 0day : shellcode ([webapps / 0day] – Cryptographp Local File Inclusion / HTTP Response Splitting
See on 1337day.com

Categories: Uncategorized Tags: