Rip music from YouTube using youtube-dl, ffmpeg, and lame

| 0 comments

In a previous post I wrote about how to Rip DEFCON videos from YouTube and this got me to thinking about music. Is it possible to take a video that contains a music track and extract the audio to MP3 format? Well the answer surprisingly enough is yes. Now before you get to excited, you must understand that doing this clearly violates copyright laws and for that reason, I am writing about this purely from an educational point of view. Everything I am covering here is done on OS X and I used the homebrew package manager to install the required tools to accomplish the task at hand. I also want to state that I ran into a handful of installation issues that were rooted in ownership of various files and folders. I am not going to go into detail about these issues, rather I suggest you search Google as I did and you will very like find a solution, I know I did. The tools you will need are: youtube-dl: a small command-line program to download videos from YouTube.com and a few more sites ffmpeg: the powerful utility to process and convert any kind of video or sound file lame: …

Continue reading

Life in a digital world means little or no privacy

| 0 comments

I want to start 2014 off by looking at security and privacy. One can argue that we are more secure today than we were just a few short years ago, but security comes at a cost and that cost is privacy. During discussions with others that I come into contact with, I am disturbed when I hear the response “if you are doing nothing illegal then you have nothing to worry about”. Obviously these individuals have not idea what privacy means. For those individuals, the Webster Dictionary defines privacy as the state of being alone. For those of you who subscribe to the idea of “if you are doing nothing illegal then you have nothing to worry about” may I have you WiFi and interest account credentials? I bet you then are not so willing to share this private information. The book 1984 was George Orwell’s chilling prophecy about the future and while 1984 has come and gone, Orwell’s narrative is timelier than ever. 1984 presents a startling and haunting vision of the world, so powerful that it is completely convincing from start to finish. No one can deny the power of this novel, its hold on the imaginations of …

Continue reading

Time to go phishing with the Social Engineering Toolkit (SET)

| 0 comments

Social Engineering is a very intriguing art of exploiting trust of others. For the most part people are trusting of one another and because of this trust, a person may be tricked into performing and action even if in the back of their mind the feel something is wrong. Think about for a moment. The act of Social Engineering is not anything new because since the dawn of man there has always been those who carry out a confidence trick, which is also better known as a con game. The difference today is these con games are often carried out via technology. For me personally I question everything and to some degree there are times when I may miss an opportunity because I felt the phone call or email could be a scam. Phishing is the act of attempting to acquire information such as usernames, passwords, credit card details, and money by masquerading as a trustworthy entity in some type of electronic communication, which often makes use of email. I am sure that you have heard of the Nigerian scam or maybe you have even received one of these scam emails yourself. Many email communications look to be from social …

Continue reading

What is ping all about?

| 0 comments

If you have used a computer more than say a single day, I am sure that you are well aware of ping. If not, then you are in for a treat! Well I suppose it may not be a treat in some opinions, but this is an utility that you should take time to learn about and appreciate. Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP response. In the process it measures the time from transmission to reception and records any packet loss from the host you targeted. The results of the test are printed in the form of a statistical summary of the response packets received, including the minimum, maximum, and the mean round-trip times, and sometimes the standard deviation of the mean. Ping does not evaluate or compute the time to establish the connection; it only gives the mean round-trip times of an established connection with an …

Continue reading

20 introductory Nmap command examples for the technology professional

| 0 comments

I’m not going to attempt to cover what Nmap is and what it can do. Rather the author states: Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping). #1 Target a Single Host or IP Address nmap 192.168.173.130 nmap …

Continue reading