Archive for Whatever Category
Western Digital MyCloud NAS does some complex stuff to make itself available via an internet website.
Synopsis: incident flow analysis A student named Eldo Kim has been found guilty of emailing bomb threats to Harvard University buildings to delay final exams. 1. Mr. Kim connects his registered MAC Address to the Harvard wireless network and subsequently to […] ↓ Read the rest of this entry…
Signature giving me problems.: alert udp $HOME_NET 5351 -> $EXTERNAL_NET any (msg:”ET EXPLOIT Possible Malicious NAT-PMP Response to External Network”; dsize:12; content:”|80 00 00|”; offset:1; depth:3; classtype:attempted-admin; sid:2019490; rev:2;) Alert: From 10.0.1.1 (Internal GW) To 224.0.0.1 (?) ET EXPLOIT Possible […] ↓ Read the rest of this entry…
So, sometimes you want to be anonymous on the open internet for some reason. Here are a few steps which can help (But may or may not be a perfect way to stay anonymous. Do your own research if you […] ↓ Read the rest of this entry…
1. Get a Linux computer with metasploit installed. (Or get Kali Linux – AKA Backtrack) 2. Open a root shell and enter #service postgresql start 3. #msfconsole 4. msf >show exploits – to view all contained in the current database […] ↓ Read the rest of this entry…
Just happened to nearly coincide with Blackhat and DefCon at Las Vegas. Meh. That’s what I would have done. Kali Linux 2.0 Released
When a system receives a TCP SYN packet, the TCP stack uses a process called Half-Open Connection or Full-Open Connections slots. There are limited number of Half-open connections and it’s easy to overwhelm the target with a relatively small number […] ↓ Read the rest of this entry…
On Kali Linux (Ubuntu) 1. apt-get install macchanger 2. macchanger –help to see usage 3. ifconfig wlan0 down (Take down interface) 4. # macchanger -r wlan0 Permanent MAC: 00:24:d7:97:75:18 (Intel Corporate) Current MAC: 00:24:d7:97:75:18 (Intel Corporate) New MAC: 0c:cc:88:d6:9e:71 (unknown) […] ↓ Read the rest of this entry…
On Kali Linux (Ubuntu) arpwatch watches for suspicious activity as when IP Addresses change MAC Addresses or vice versa. 1. apt-get install arpwatch 2. In the file /etc/arpwatch, add your interface with subnet info per the samples 3. service arpwatch […] ↓ Read the rest of this entry…