Black Ops: The Talks of Dan Kaminsky
Whenever a new sure-fire blockbuster movie sequel comes out, there’s always the attempt to wring some more cash out of the previous entries. There’ll be a DVD box set that runs about $10 a disc, with...
View ArticleTalking about DNS on the Securabyte 1 Podcast
The folks who put on the excellent Securabit podcast have decided to put together a quick and dirty episode-between-episodes on the recent DNS vulnerability. They’ve decided to call these spontaneous...
View ArticleI'm calling it: the new cool-guy word is "Weaponize"
…and I couldn’t be happier. I’m going to start writing “weaponized code” instead of “exploits”. This will totally make up for having to give up “reverse-engineering” for “deep analysis” for “legal...
View ArticleWeb Search Scanner module for Metasploit
The other day I decided that I wanted to become more familiar with the internals of the Metasploit Framework, so with the latest svn of the framework and a couple of books on Ruby, I started digging....
View ArticleMan-in-the-middle Fake DNS for Metasploit
On Episode 116 of PaulDotCom Security Weekly, Paul mentioned how it would be nice if one could have a little bit finer control over the behavior of Metasploit’s fake DNS server. It seemed like an easy...
View ArticleDan Kaminksy's Blackhat USA 2008 slides are now available
Why So Serious – On Dan’s Blog Everything we knew, plus some really neat tricks.
View ArticleAudio and video of Kaminsky's DNS talk now available
The kind folks who run Black Hat have gone ahead and released the audio and video of Dan Kaminsky’s talk at Black Hat USA 2008, entitled “Black Ops 2008: It’s The End Of The Cache As We Know It”, or...
View ArticleUsing SkyGrabber to Hack Unmanned Drones?
There has been a lot of speculation today surrounding this Wall Street Journal article: Insurgents Hack U.S. Drones According to this article, the insurgents were able to capture drone video feeds...
View ArticleNetwork Forensics Puzzle #3 Finalist!
Today, results were posted for Sherri Davidoff and Jonathan Ham’s third network forensics puzzle contest. The puzzles, hosted at forensicscontest.com, are meant to encourage the development of network...
View ArticleNBNS Spoofing in Metasploit
Tim Medin, over at the excellent Packetstan blog, just wrote up an excellent post detailing the implementation of a NBNS spoofing module which has been added to the the latest Metasploit trunk: NBNS...
View Article
More Pages to Explore .....