796 shaares
27 results
tagged
Security
The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released. R3 focuses on bug-fixes as well as the addition of over 60 new tools – several of which were released in BlackHat and Defcon 2012. A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.
Secure-USB is an easy-to-use portable file encryption software.It implements strong 256-bit AES encryption to encrypt data.
It uses users hashed password as key to encrypt & decrypt data,so it is strictly adviced to decrypt all files before changing password.
It uses users hashed password as key to encrypt & decrypt data,so it is strictly adviced to decrypt all files before changing password.
With daily reports of severe breaches in national cybersecurity and devastating cyber-attacks on government infrastructure, many journalists are in dire need of a manual to enlighten their writing on the subject. Here are my ten(rather cynical) tips to make your cyberwarfare story succeed.
Ce document est une traduction de « Guide to the Secure Configuration of Red Hat Entreprise Linux 5 » produit par la NSA (National Security Agency) avec de légères modifications.
DDoS attacks are the rage this year, atleast in the latter part of the year. There have been numerous instances of successful DDoS attacks just in the past few months. Some of the current DoS/DDoS options seem to be LOIC, HTTP POST DoS and Jester's unreleased XerXes.
This post is about a DDoS technique I spoke about at BlackHat Abu Dhabi that uses two HTML5 features - WebWorkers and Cross Origin Requests. It is a very simple yet effective technique - start a WebWorker that would fire multiple Cross Origin Requests at the target.
This post is about a DDoS technique I spoke about at BlackHat Abu Dhabi that uses two HTML5 features - WebWorkers and Cross Origin Requests. It is a very simple yet effective technique - start a WebWorker that would fire multiple Cross Origin Requests at the target.
An Arabic guide to make a dynamic Socks5 proxy
Je me suis rendu compte récemment que je n’avait encore jamais fait de tutoriel sur ce blog.
J’ai donc décidé de me rattraper aujourd’hui en vous donnant quelques astuces pour surfer sur le net de manière totalement anonyme.
Evidemment ce genre de sujet à déjà été traité 1000 fois sur d’autres blogs, mais un petit rappel ne fait pas de mal et j’ose croire que certains de mes lecteurs pourraient être intéressés par quelque chose d’un peu vulgarisé/simplifié.
J’ai donc décidé de me rattraper aujourd’hui en vous donnant quelques astuces pour surfer sur le net de manière totalement anonyme.
Evidemment ce genre de sujet à déjà été traité 1000 fois sur d’autres blogs, mais un petit rappel ne fait pas de mal et j’ose croire que certains de mes lecteurs pourraient être intéressés par quelque chose d’un peu vulgarisé/simplifié.