VMWare Workstation in BackTrack {3, 4} Live
Why? There’s been a number of situations in the past where, even though I’m perfectly happy running BackTrack as a host operating system, it would nonetheless be sweet to run any number of virtualized...
View ArticleUsing the android browser with tor or any socks proxy & privoxy
Update: If all you’re looking to do is use TOR with android, please use this tutorial. The below information is out of date for such uses. Prerequisites: A jailbroken android install. Debian Armel on...
View ArticleSSL or S-S-Hell?
2009’s Beating on SSL, Round One Hot on the heels of the Microsoft Crypto API patch comes another SSL vulnerability. The last round of attacks on SSL relied on a problem with the deployment of SSL on...
View ArticleSwinedroid – the new Snort Monitoring tool for Android
If you’ve ever been on the go when crisis strikes, you know how convenient it is to have a mobile application for dealing with the problems you might face. For instance, I’ve found it really convenient...
View ArticleSwinedroid, Snort Monitoring tool, available on the Android Market
Swinedroid v0.20 has been released is now available on the Android Market. If you haven’t read my previous post about it, here’s the low down. Swinedroid is a remote Snort monitoring application for...
View ArticleRooting a router: Wiretapping dd-wrt / OpenWRT embedded linux firmware
Note: The following post is written partially as a follow-up to the presentation I gave on dd-wrt at the December meeting of the Western North Carolina Linux Users Group. Concept If you’re running...
View ArticleHardening your VPN Setup with iptables
I’ll be heading out to Defcon 19 next month, so I want my VPN connection to be stable and secure. You probably know the situation. You’re at your local coffee shop, using their (hopefully not)...
View ArticleLookbehind / Lookahead Regex in Vim
Here’s a nifty little vim tip for you. I recently had to switch a few variables in PHP from $varname to $somearray[‘varname’]. Since there were quite a few of these replacements to be done, I found it...
View ArticleEnigma Machine in Captain America: The First Avenger
In a nod to the history of cryptography, the folks over at Marvel Studios included a modified replica of the Enigma Machine in one scene for the 2011 film Captain America: The First Avenger. If you...
View ArticleRemote Monitoring of Network Connections with Arduino and LEDs
Using cerealbox to create a colorful visualization of your TCP/UDP connections. Inspiration At Defcon in 2011 I attended a talk by Steve Ocepek over at Spider Labs introducing a neat little project he...
View Article