Tag Archives: network security

WOPBOT BotNet

A botnet runs on Linux and Linux variant servers, named wopbot that uses the Bash Shellshock bug to auto-infect others. The wopbot botnet is active and scanning the internet for vulnerable systems, including network ranges at the United States Department … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on WOPBOT BotNet

Breaking Wireless WPA2

You’ll need Backtrack with metasploit airmon-ng airodump-ng aireplay-ng aircrack Verify your wireless is up, airmon-ng start wlan0 airodump-ng mon0 Find a BSSID MAC address to become a toe (target of evaluation) Stop the program Gather the MAC address and Channel … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Breaking Wireless WPA2

Six Failures of Target’s Non-Compliance

Ira Winkler, is very well known champion in the security arena who is super busy and he still found time to write this article on ComputerWorld in regards to the 6 Failures of Target. To summarize the article, basically, there … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Six Failures of Target’s Non-Compliance

Mikko Hypponen: How NSA Ruined Our Trust

Airgap, blackpearl, cineplex, xkeyscore, prism, creek, crossbones, cultweave, cybertrans, dishfire, doublearrow, dragonfly, wealthycluster, hightide, skywriter, jollyroger, kingfish, liquidfire, messiah, nightsurf, normalrun, mailorder, pinwale, taperlay, tarotcard, twistedpath, yellowstone. If you have nothing to hide, can you be trusted with secrets? How … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Mikko Hypponen: How NSA Ruined Our Trust

WireShark

Here is a video on using WireShark if you are new to it.

Posted in Security Blog | Tagged , , , , , , | Comments Off on WireShark