Quantcast
Channel: McGrewSecurity » network
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

Black Ops: The Talks of Dan Kaminsky

Whenever a new sure-fire blockbuster movie sequel comes out, there’s always the attempt to wring some more cash out of the previous entries.  There’ll be a DVD box set that runs about $10 a disc, with...

View Article



Talking about DNS on the Securabyte 1 Podcast

The folks who put on the excellent Securabit podcast have decided to put together a quick and dirty episode-between-episodes on the recent DNS vulnerability.  They’ve decided to call these spontaneous...

View Article

Image may be NSFW.
Clik here to view.

I'm calling it: the new cool-guy word is "Weaponize"

…and I couldn’t be happier.  I’m going to start writing “weaponized code” instead of “exploits”.  This will totally make up for having to give up “reverse-engineering” for “deep analysis” for “legal...

View Article

Image may be NSFW.
Clik here to view.

Web Search Scanner module for Metasploit

The other day I decided that I wanted to become more familiar with the internals of the Metasploit Framework, so with the latest svn of the framework and a couple of books on Ruby, I started digging....

View Article

Man-in-the-middle Fake DNS for Metasploit

On Episode 116 of PaulDotCom Security Weekly, Paul mentioned how it would be nice if one could have a little bit finer control over the behavior of Metasploit’s fake DNS server.  It seemed like an easy...

View Article


Dan Kaminksy's Blackhat USA 2008 slides are now available

Why So Serious – On Dan’s Blog Everything we knew, plus some really neat tricks.

View Article

Audio and video of Kaminsky's DNS talk now available

The kind folks who run Black Hat have gone ahead and released the audio and video of Dan Kaminsky’s talk at Black Hat USA 2008, entitled “Black Ops 2008: It’s The End Of The Cache As We Know It”, or...

View Article

Using SkyGrabber to Hack Unmanned Drones?

There has been a lot of speculation today surrounding this Wall Street Journal article: Insurgents Hack U.S. Drones According to this article, the insurgents were able to capture drone video feeds...

View Article


Network Forensics Puzzle #3 Finalist!

Today, results were posted for Sherri Davidoff and Jonathan Ham’s third network forensics puzzle contest. The puzzles, hosted at forensicscontest.com, are meant to encourage the development of network...

View Article


Image may be NSFW.
Clik here to view.

NBNS Spoofing in Metasploit

Tim Medin, over at the excellent Packetstan blog, just wrote up an excellent post detailing the implementation of a NBNS spoofing module which has been added to the the latest Metasploit trunk: NBNS...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images