Zer0Byte

Geekiest Techno News

Archive for the ‘InfoSec’ Category

Mozilla’s CEO, New Head of AVG

AVG, the well-known global free security suites has decided to have Mozilla’s former chief executive, Gary Kovacs, be its new commander. After several months of departing from Mozilla as the CEO, Kovacs came to AVG. J.R. Smith, AVG’s previous CEO shifted to a more advisory position with the company this past March. This was decided  [ Read More ]

Offensive security at Florida state University (Training Material Includes Videos and Slide )

This site was created by Prof Xiuwen Liu who teaches Offensive security at Florida state University (FSU). It teaches a wide range of things like Ethics of hacking, code auditing, Reverse engineering, Exploit Dev, Networking and more. It is a great overview of Offensive Security with videos and even has assignments you can do to  [ Read More ]

A simple neat trick to find out someones GEO location by using its MAC address. Backtrack > Exploitation Tools > Wireless Exploitation Tools >WLAN Exploitation >fern-wifi-cracker Now open ToolBox . Now open the geolocatory Tracker. Select the Option Insert Mac Address and insert the Mac Address in the box . Now , after inserting Mac  [ Read More ]

How To Configure Snort on Backtrack 5

About Snort Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. HOW To Start SNORT ON BACKTRACK 5-rc3 Backtrack > Services > Snort Services > snort start SNORT STARTED How To  [ Read More ]

Raspberry Pi + Onion = Onion Pi

Geek Girl (a rare thing ) from MIT (well that explains)  Limor “Ladyada” Fried has created a superb desert with the perfect Ingredients. She has added TOR (The Onion Router ) on Raspberry Pi. According to her “Using it is easy-as-pie. First, plug the Ethernet cable into any Internet provider in your home, work, hotel  [ Read More ]

How the Raspberry Pi USB Malware Scanner Works

This article by “Icarus Cyber Labs” Explains the technical working of their newly created USB Malware Scanner. The core aspect of the malware scanner is a python script that continuously polls for USB devices. The polling is done by continuously checking the output of the “blkid” command in Linux. This can also be accomplished by using the  [ Read More ]

OWASP Top 10 for 2013 is now officially released

According to the new OWASP TOP 10 XSS is still one of the top 3 Vulnerabilities found on websites. The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety  [ Read More ]

Advance Wifi Network Pentesting Notes

Advanced Wireless Network Pentesting Notes First of all make sure to randomize your MAC address and clean your ARP tables, Use an ALPA usb wirless adapter device or whatever 🙂 I- airdump-ng To Sniff The Traffic : All people whom they do pentesting know this part i will not say all how packets works and  [ Read More ]

Let me give you a lil bit of intro about Lahan which  ctrl + C and ctrl + v from its /dev’s website What is Lahana? Lahana is a set of scripts that will take a fresh Ubuntu EC2 Instance and turn it into a brassic, censorship busting beast of beauty. It does this by  [ Read More ]

Linkedin has decided to join the bandwagon of the likes to Google, FB, Dropbox, Twitter(recently) and many other top sites in the two step verification protocol. Though its implementation is in its simpler format like twitter, it would be best for a site with a growing global demand to advance its security . None the  [ Read More ]