Manage the pain in the rear passwords

| 0 comments

At this time no matter where you turn you likely require a password. For this reason you need a way to manage those passwords in order to prevent others from accessing your private data or worse making it much more difficult for you password to be cracked if a service you use is ever breached. Of course, we all know that no service is ever breached and if you believe that then the safest password for you is Password1. Now if you are old school, you could always use the The Personal Internet Address & Password Log Book. Of course, …

Continue reading

Preparing for DEFCON 23

| 0 comments

It is hard to believe that almost a year has gone by and the desert heat of Las Vegas, NV is calling out to hackers of all ages from all over the world. The annual DEFCON conference is just a little over three weeks away and this year is very likely to bigger and better than the previous year. The change of venue from the Rio over to Paris & Bally’s should be much better. I say this only because last year there was roughly 14,000 attendees and to be honest the Rio was just too crowded for my taste. …

Continue reading

Creating a proxy chain in Linux

| 0 comments

There obviously are time that you may want to make use of a proxy server in order to provide yourself a level of anonymity that you may otherwise no have. Proxies also provide benefits in terms of restricted content that may be filtered with your region or country. Think of it this way, if YouTube is blocked in the Middle East then a proxy may help you to overcome that block. Now to be clear a proxy server also helps to increase performance by storing a copy of frequently used webpages. When a browser requests a webpage stored in the …

Continue reading

Script and automate Kali Linux updates

| 0 comments

While automated updates is debatable and a personal preference, I prefer running on the edge, especially within my sandbox environment. Of course, production environments may benefit from automated updates and only you can make the decision. To perform this automation we will make use of a bash shell and a cron job. The latter will perform the automation job whereas the former will perform the update. All of this is really simple and easily achieved. The bash shell may be altered to your taste. For the purpose of this article, I am not only going to script the updates, but …

Continue reading

Security via obfuscation: MAC Address

| 0 comments

Every network interface card has a unique 48 bit identifier known as a MAC address. This address is burned into the EEPROM on the card, and often is used by networking equipment to track users as they come and go, frequently associating MAC address to a hotel, credit card, credentials, and so on. In fact, even most consumer gear will record the MAC addresses of all computers that have ever issued DHCP requests to them, and these logs usually cannot be purged. When you combine this with the fact that most Cable/DSL service providers will also record your MAC address …

Continue reading