Quantcast
Channel: Bill's Security Blog
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

Setting up a pen-testing lab-in-a-box

So, I got my hands on a handy, used Dell Latitude 620 with 2GB ram for next-to-nothing. I’m looking for something to do with it… How about, set up a penetration testing platform complete with: safe,...

View Article



Image may be NSFW.
Clik here to view.

Decrypting files using OpenSSL

Background I’m playing with one of the De-ICE pen-testing CD’s, and I came across a file that was encrypted. The problem is, I don’t know: The cipher used to encrypt the file The password used Whether...

View Article

Image may be NSFW.
Clik here to view.

Yet Another Netcat Introduction

Howdy folks! Episode 195 of PaulDotCom Security Weekly prompted me to revisit an old favorite, netcat (many netcat versions exist). On the episode, Ed Skoudis provided an excellent technical segment on...

View Article

Image may be NSFW.
Clik here to view.

Creating a bootable USB thumb drive

I want to get started with BackTrack 4 R2 (BT4R2) on a dedicated laptop. But I don’t think I can burn a DVD reliably, so I need another method. Solution - Bootable USB Thumb Drive This solution may...

View Article

Karmetasploit on BT4R2

Purpose The purpose of this post is to provide quick guidance on getting Karmetasploit running on BT4R2 for my specific environment.  These steps may work for you, but this post is intended, primarily,...

View Article


Fix screen resolution for BackTrack VM under VirtualBox

Revisions: 20110521 - Revised to show the fix for BT5 On BT5 The following worked with no fuss: # Xorg -configure # cp /root/xorg.conf.new /etc/X11/xorg.conf # startx And that’s it! On BT4 Note to...

View Article

Image may be NSFW.
Clik here to view.

Tutorial – remote buffer overflow identification and exploitation

Authors Hakuza and Mooky Purpose This tutorial provides a step-by-step walk-through of the identification of a remotely accessible buffer overflow, information gathering, and the development of a...

View Article

Metasploit module creation

My friend Daniel “Mooky” Robertson provided this brief tutorial on Metasploit module creation. Rather than incorporating it into the remote buffer overflow tutorial, his work deserves its own,...

View Article


Image may be NSFW.
Clik here to view.

SCADA, DCS, and air gaps

When most people talk about SCADA, they are generally including a whole lot of stuff that is not SCADA. In general, true SCADA systems are and must be connected in some way. This is generally because...

View Article


Image may be NSFW.
Clik here to view.

Hands On: Redundant firewalls using CARP and pfsync on OpenBSD 5.0

I recently completed reading the pf FAQ on the OpenBSD website.  I have been doing quite a bit of playing around and thought I would document the testing I performed on creating a redundant firewall...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images