8 week self study bootcamp for security professionals

| 0 comments

It is important from time to time that we all revisit terminology. For this reason I have put together the following resources in the hopes of learning something new or at the very least bringing back things that we all have learned in years past. In the course of looking for material, I found a number of wonderful lectures from MIT and other various resources. Each of this lectures are licensed under the Creative Commons license. Each week is made up of related categories and there are typically anywhere from one to four topics for review. In the event you are interested in extending you knowledge beyond this reading material be sure to check out the free online course offerings from Massachusetts Institute of Technology (MIT) later in this post. MIT offers over 2,150 courses, so I am sure you will find something of interest. Week 1 The Domain Name System (DNS) is an hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates easily memorized domain names to the numerical IP addresses needed …

Continue reading

Looking for a password or username cracking wordlist

| 0 comments

Every good white hat needs a number of solid wordlists in order to perform penetration testing. The list can come in very handy when performing brute force attacks. If you have a worlist that you would like to share, why not leave a comment for everyone to enjoy? Passwords, Dictionaries, and Wordlists CrackStation’s Password Cracking Dictionary: The list contains every wordlist, dictionary, and password database leak that I could find on the internet (and I spent a LOT of time looking). It also contains every word in the Wikipedia databases (pages-articles, retrieved 2010, all languages) as well as lots of books from Project Gutenberg. It also includes the passwords from some low-profile database breaches that were being sold in the underground years ago. The format of the list is a standard text file sorted in non-case-sensitive alphabetical order. UNIQPASS: A large password list for use with John the Ripper (JtR) wordlist mode to translate large number of hashes, e.g. MD5 hashes, into cleartext passwords. While we have had good success rate with our standard password list passwords.txt, we found that the list can be made more useful and relevant by including commonly used passwords from the recently leaked databases that …

Continue reading

Ways to protect your identity on the Internet

| 0 comments

At the time of this article I have an IP Address of 89.239.207.81 and I would ask you if you have any idea where my Internet Service Provider (ISP) resides? I live in the United States and at this moment my Internet connection is coming from Denmark. As demonstrated from the Google Map, I am clearly sitting  in Havdrup, Denmark however this is not true, well at least physically. My internet connection resides in Denmark why my physical location is within the United States. Here is the detailed information: IP Address: 89.239.207.81* City: Havdrup State: 20 Country: Denmark Latitude: 55.5333 Longitude: 12.1333 ISP: Danish Broadband a/s What is this voodoo you may ask and why is this important or even useful? What if you could jump from country to country and have a different IP Address assigned without any action on your part? You can, while I was writing I now have an IP Address of 87.98.181.150 which is in France. Who knew that I was such a seasoned international traveler? To tell the truth I do not have a transporter from Star Trek, but maybe one day we all will have one. In the meantime we will have to …

Continue reading

Microsoft Assessment and Planning Toolkit explained

| 0 comments

What does the MAP toolkit do? The Microsoft Assessment and Planning (MAP) Toolkit 8.0 is an inventory, assessment, and reporting tool that helps you assess your current IT infrastructure and determine the right Microsoft technologies for your IT needs. The MAP toolkit uses Windows Management Instrumentation (WMI), Active Directory Domain Services (AD DS), SMS Provider, and other technologies to collect data in your environment and inventories computer hardware, software, and operating systems in small or large IT environments without installing any agent software on the target computers. The download is free, but it has a laundry list of prerequisites: .Net framework, Windows Installer version 4.5, .Net Framework 3.5 SP1, Microsoft Office, machine can’t be a domain controller, and so forth. The installer will also try to download and install SQL Server Express if you don’t already have it on the system. MAP is an ideal assessment and planning tool for the following: Discovery of computers and applications Hardware and software readiness migration Capacity planning for server, desktop and virtualization projects Public and Private Cloud capacity and migration planning Software usage tracking Once you install it in your environment, MAP takes an inventory of the systems found on the network and …

Continue reading

Open source and commericial security tools

| 0 comments

Whether you’re a network administrator, security professional, or an end user, it’s important that you keep your system clean and secure. There are a variety of high quality open source security tools available. Toolkits Network Security Toolkit: This bootable ISO live CD/DVD (NST Live) is based on Fedora. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, geolocation and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines. OSSIM: The most widely used SIEM offering, thanks in no small part to the open source community that has promoted its use. OSSIM provides all of the capabilities that a security professional needs from a SIEM …

Continue reading