Monday, November 14, 2011

Reversing, exploits, malware analysis and other stuff

A mix of everything

Pentesting stuffs

Vulnerable OS/daemons
damn vulnerable linux: http://www.damnvulnerablelinux.org/
damn vulnerable web application: http://www.dvwa.co.uk/
damn vulnerable web services: http://dvws.secureideas.net/
metasploitable: http://blog.metasploit.com/2010/05/introducing-metasploitable.html
ultimate LAMP: http://www.vmware.com/appliances/directory/189

Recon phase
Secrets of Network Cartography: http://www.networkuptime.com/nmap/index.shtml

Exploits
http://www.exploit-db.com/
http://1337day.com/
http://www.vulnerability-lab.com/
http://www.securityaegis.com/the-big-fat-metasploit-post/
Vasto: Virtualization ASsesment TOolkit - http://vasto.nibblesec.org/
http://www.darkoperator.com/tools-and-scripts/
Breaking FDE: http://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-after-truecrypt.html

Framework
http://www.felipemartins.info/2011/05/pentesting-vulnerable-study-frameworks-complete-list/
http://sourceforge.net/projects/virtualhacking/
http://bailey.st/blog/2010/09/14/pentest-lab-vulnerable-servers-applications-list/

Post-exploitation
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
http://www.room362.com/blog/2011/9/6/post-exploitation-command-lists.html

Physical Security
Lockpicking course by Schuyler Towne http://www.youtube.com/watch?v=VVSL0liiWoc&list=PL66CD42F86F3A1F85&feature=plpp

Information Gathering
Maltego
Shodan
Google Dorks
Metadata
http://sourceforge.net/projects/virtualhacking/

Web app testing
http://michaelhendrickx.com/lilith
http://www.kenahack.com/2011/07/hth-sql-injection.html

Rainbow table
http://www.freerainbowtables.com

Password Lists
http://www.securityaegis.com/a-whole-lotta-passwords/

(my) CTF archive

Forensic stuff

15 incredibly useful (and free) Microsoft tools for IT pros

Source: https://www.networkworld.com/slideshows/2011/071911-microsoft-tools.html

Summary of the tools: (also from the link above)

  1. WSCC – Windows System Control Center - Windows System Control Center is a one-stop downloader for almost 300 maintenance tools from Microsoft's Sysinternals and the ever-popular NirSoft suites.
  2. RichCopy 4.0 - This little Microsoft TechNet invention spares you the headache of learning, checking and retyping command lines.
  3. Microsoft Attack Surface Scanner - Microsoft's Attack Surface Scanner is a sort of checklist that helps you analyze security issues and plug possible vulnerabilities fast.
  4. Microsoft Standalone System Sweeper Tool - In case of a (deep) infection of boot files by viruses or rootkits, there's not much a real-time scanner can do. In that case, MSSSST (yes, that's Microsoft's naming convention at its best) creates a bootable CD, DVD or USB key that hosts an offline copy of Microsoft Security Essentials -– including all the latest signatures downloaded from MS servers beforehand.
  5. NoReplyAll add-in for Outlook 2007 and 2010 - "NoReplyAll" (a Microsoft Research Project) prevents e-mail recipients from forwarding or using "Reply All" to spread your e-mail to other co-workers.

Permutation Oriented Programming

Stumbled upon this post a few month ago


<++BOF>


-=[ Introduction
Many works have been done regarding evasion techniques against Intrusion Detection System (IDS) and Intrusion Prevention System (IPS), but most of them are related to:

 - Packet fragmentation [1]
 - Stream segmentation [1]

 - Byte and traffic insertion [1]
 - Polymorphic shellcode [2]

 - Denial-of-Service [1]
 - URL obfuscation (+ SSL encryption) [3]

 - RPC fragmentation [4]
 - HTML obfuscation [5] and JavaScript obfuscation [6]

 - Etc...

Defcon19 CTF Quals Write-ups

Disclaimer: I didn't write any of these write-ups