<?xml version="1.0" encoding="utf-8"?>
<rss version="0.92">
<channel>
<title>SecuObs.com</title>
<link>http://www.secuobs.com</link>
<description>Observatoire de la securite Internet</description>
<language>fr</language>
<webMaster>webmaster@secuobs.com</webMaster>
 <item><title>New world</title><description>2009-07-07 21:01:27 - kinqpinz.info : kinqpinz is currently undergoing a major rewrite I am developing amassive object-oriented class for dealing with everything here on thesite, mostly to keep things new, and for the challenge It's comingalong nicely, nearing 500 lines as of now, though how much of thisoverhaul you visitors will actually notice is unknown Everythingbeing done thus far is on the back end, though for simplicity's andspeed's sake a great majority of the files I host are being migratedto simple alphabetized browsable directories, without all the glamIt's now one of those joyless and thankless pursuits managinginformation for the ungrateful interwebs land that I will no longerdo, at a time where I could get back to the things that interest me Iam Dave Chappelle, fleeing to Africa What's up to Randy, my brostationed in Saudi Arabia that sends me cool pictures like these Seelink for images, dick</description><link>http://www.secuobs.com/revue/news/117713.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/117713.shtml</guid></item>
<item><title>8 feeds</title><description>Secuobs.com : 2009-07-04 05:49:55 - kinqpinz.info - Enjoy more of my sweat and tears, ye bunch of yahoos * Bash Hackers Wiki* Daniel Miessler * Flyninja * HACKTUX * Liquidmatrix * Rob Wilkerson* spl0it * TwitPwn</description><link>http://www.secuobs.com/revue/news/116883.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/116883.shtml</guid></item>
<item><title>HTTP sploit</title><description>Secuobs.com : 2009-07-02 05:06:03 - kinqpinz.info - I wasn't even going to publish this but what the hell, the vulnerabilityhas been released See link for code</description><link>http://www.secuobs.com/revue/news/116124.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/116124.shtml</guid></item>
<item><title>The pasteybin archive</title><description>Secuobs.com : 2009-07-02 05:06:03 - kinqpinz.info - Is now accessible at the following location:https://kinqpinzinfo/code/pasteybin/tree This is an archive ofpastebincom files leeched using pasteybin running 24/7 in a detachedscreen session Originally I had more files than are there now, butdue to an accidental mass removal via a duplicate removing script goneberzerk, I had to build once again from scratch There are just over92,000 files in the archive, many of them highly entertaining as youwould know if you're in #kinqpinz On top of that hilarity, there'splenty of awesome code samples for building a wide assortment ofapplications in varieties of languages Do note that many of thesamples are likely not fully functional as they're posted on pastebinin order to debug with remote colleagues Nonetheless, great learningmaterial if you take the time to peruse it klaymen is currently inthe works of building his own site which a similar type of interfaceto the pasteybin archive shall hopefully reside, fully MySQLized andsearchable I shall link to that here when - if - it becomesavailable</description><link>http://www.secuobs.com/revue/news/116123.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/116123.shtml</guid></item>
<item><title>Rollin' to July</title><description>Secuobs.com : 2009-07-02 00:20:14 - kinqpinz.info - Last month's entries can be found here</description><link>http://www.secuobs.com/revue/news/116055.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/116055.shtml</guid></item>
<item><title>Re: Google optimizing PHP</title><description>Secuobs.com : 2009-06-26 22:54:14 - kinqpinz.info - This is a quick script I wrote to test the points made in this Googledeveloper video regarding faster|est code execution in PHP Turnsout it's right on point The short of the text and video is that youshould use echo with the comma notation for printing strings to avoidmemory intensive string concatenating routines and single quotes forstrings When PHP encounters double quotes it wants to first find andpopulate variables within that string, then move on to printing it,whereas single quotes move right along Since I'm working on my OOP,here's an easy bench class that uses, in the alleged now proven slowtest, double quotes with nested variables, and single quotes with echoand comma notation for appending variables in the fast test If youwish to try it out, do it from the command line by making this codeexecutable in a file that will accept its first argument, $argv1, asthe main loop amount In short tests, the optimized PHP runs at doublethe speed As the time lengthens, the gap is not so great but stillquite tangible Note the comments in the code's header to see myresults on an old yet good laptop See link for code</description><link>http://www.secuobs.com/revue/news/114259.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/114259.shtml</guid></item>
<item><title>AppSecLive, Bonsai Sec, The Invisible Things,  The Open Group RSS</title><description>Secuobs.com : 2009-06-21 03:29:59 - kinqpinz.info - The AppSecLive, Bonsai Sec, The Invisible Things, and The Open Groupfeeds have been added</description><link>http://www.secuobs.com/revue/news/111991.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/111991.shtml</guid></item>
<item><title>Phrack #66 added to library</title><description>Secuobs.com : 2009-06-19 04:18:46 - kinqpinz.info - permalink # download # Phrack # Issue #66</description><link>http://www.secuobs.com/revue/news/111412.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/111412.shtml</guid></item>
<item><title>Re: Astalavista</title><description>Secuobs.com : 2009-06-19 04:18:46 - kinqpinz.info -  Dear Visitor Dear Member Dear Anti-Sec Group As you may recognize, wedon't offer all our services at the moment On Thursday, 4th of June,we had some "problems" Anti-sec Group attacked us and made somereproaches Some of them are true and we already know them, but themost are not Like we would steal information from milw0rmcom wehave an agreement with str0ke, the owner of milw0rm to publish hisexploits on astalavista The reproache that we are doing it only forthe money is completely wrong Why do we invest in a new communitysystem, in new features and bring up new ideas Because we like it andwe have fun doing it But yes, we also have to earn money, becausethe infrastructure isn't for free and we have also to life fromsomething Or do you work for free And by the way, every thing onastalavistacom is free For some services you have to register, butfor free We guess also Anti-Sec didn't read our logo well, becauseit's written on it "Beta" This means we are only in a testing periodand not all our services are available yet We planned to offer thismonths two new features A new download module with better usablilityand hacking challenges with nearly 300 challenges in differentcategories Our strategy was to offer new services step by step togrow slowly You see, we try to do alot for our new community onastalavistacom We are just at the beginning About astalavistanetThis is the commercial website where you have to pay to get access Wecalled it on the beginning, 8 years ago, member area, because the wordcommunity wasn't very known then on the internet We can say we areone of the pioneers for IT communities Our plan was to merge thesetwo websites together to get a bigger and stronger community Afterthis happened we had think about our strategy and merge it maybeearlier then planed We will use what has happened as a chance tostart a new community system This means we will re-think our existingstrategy Now you have the chance to have influence to our strategy,because we like to offer a service, a community which helps and isuseful for you Write us your ideas This request goes also to theAnti-Sec Group We hope Anti-Sec group can also be constructive notonly be destructive Maybe they would like to participate in our newcommunity Best whises Prozac - head of ASTALAVISTA Prozac, you arespeaking as if there is no audience or band of enraged members whowillingly paid you money to become a member on your forum You do notaddress the very grave aspects of this recent penetration, and that ismost unfortunate Information that the Astalavista group hadaccumulated pertaining to its members, including full names,addresses, credit card numbers and expiration dates, for registrationon their paid Google-driven so-called private community, is now likelyin the hands of attackers The mere fact that user passwords arestored in plain text on Astalavista's database is a real salute to thetype of security business they wish to profit from Shame on you,Astalavista If you wish to conduct business in a manner thatcompletely exempts you from accountability by not disclosing the fulldetails associated with this compromise, especially as it directlyrelates to the sensitive information of your customer base, you willcontinue to be attacked If I hand learned first hand of this incidentfrom an Astalavista staff member in a simple mass mail to all itsmembers, much in the way a corporation profiting from individuals isexpected to do, all would be well Since you have no interest in thelackeys that have supported you and your Astalavista group throughthese years, write your next security breach response in your nativelanguage so that the translators can make better sense of whatever thefuck you just tried to say The reproache that we are doing it onlyfor the money is completely wrong Why do we invest in a new communitysystem, in new features and bring up new ideas Because we like it andwe have fun doing it But yes, we also have to earn money, becausethe infrastructure isn't for free and we have also to life fromsomething Or do you work for free And by the way, every thing onastalavistacom is free For some services you have to register, butfor free Yes, I work for free, and I have fun doing it without theadded benefit of ripping people off This site is 100% free of charge;none of the information on these pages will ever become a paidproduct, taunted in the faces of people on the outside and cherishedonly by those that can pay the cover charge Of course, no mention ismade of Astalavistanet because the same ideals do not stickRegistration is not free; there were no services that worked; worst ofall, there were no ideas About astalavistanet This is the commercialwebsite where you have to pay to get access We called it on thebeginning, 8 years ago, member area, because the word community wasn'tvery known then on the internet We can say we are one of the pioneersfor IT communities Our plan was to merge these two websites togetherto get a bigger and stronger community After this happened we hadthink about our strategy and merge it maybe earlier then planedInstead of doing the responsible thing of apologizing to yourcustomers, this is what we have to linger on Your broken plans for acommunity that's been dead in the water for years I guess you won'tbe merging now This request goes also to the Anti-Sec Group We hopeAnti-Sec group can also be constructive not only be destructive Maybethey would like to participate in our new community  Really</description><link>http://www.secuobs.com/revue/news/111411.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/111411.shtml</guid></item>
<item><title>Remembering Kitty</title><description>Secuobs.com : 2009-06-11 21:03:40 - kinqpinz.info - See link for images</description><link>http://www.secuobs.com/revue/news/108668.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/108668.shtml</guid></item>
<item><title>Rollin' to June</title><description>Secuobs.com : 2009-06-01 23:53:11 - kinqpinz.info - Last month's entries can be found here</description><link>http://www.secuobs.com/revue/news/104573.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/104573.shtml</guid></item>
<item><title>commandlinefu RSS</title><description>Secuobs.com : 2009-05-28 00:34:30 - kinqpinz.info - The commandlinefu feed has been added</description><link>http://www.secuobs.com/revue/news/102398.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/102398.shtml</guid></item>
<item><title>New arsenal files for May 23rd, 2009</title><description>Secuobs.com : 2009-05-24 04:46:33 - kinqpinz.info -  * Alpine 200 o alpine-200tarbz2 + Alpine is a fast, easy to useemail client that is suitable for both the inexperienced email user aswell as for the most demanding of power users Alpine is based on thePine Message System, which was also developed at the University ofWashington Alpine can be learned by exploration and the use ofcontext-sensitive help The user experience is highly customizablethrough the use of the Alpine Setup command Alpine is released underthe Apache License, Version 20 All of the source needed to buildUnix, Windows, and Web-based mail user agents is included * KindleMobilepocket Tools 02 o azw-02tarbz2 + Linked archive includes twoPython scripts: kindlepidpy generates Mobi PID from Kindle serialnumber You can then add this PID at a Mobipocket vendor site andredownload books with Kindle's PID enabled It's possible that somevendors will refuse this PID, as it has an asterisk in place of thetraditional dollar sign Fictionwise works fine; kindlefixpy "fixes"a Mobi book so that it can be read on Kindle It should alreadyinclude Kindle's PID which you need to specify too The script willoutput the fixed book with azw extension * Beautiful Soup 3101 obeautifulsoup-3101tarbz2 + Beautiful Soup is a Python HTML/XMLparser designed for quick turnaround projects like screen-scrapingThree features make it powerful: 1 Beautiful Soup won't choke if yougive it bad markup It yields a parse tree that makes approximately asmuch sense as your original document This is usually good enough tocollect the data you need and run away 2 Beautiful Soup provides afew simple methods and Pythonic idioms for navigating, searching, andmodifying a parse tree: a toolkit for dissecting a document andextracting what you need You don't have to create a custom parser foreach application 3 Beautiful Soup automatically converts incomingdocuments to Unicode and outgoing documents to UTF-8 You don't haveto think about encodings, unless the document doesn't specify anencoding and Beautiful Soup can't autodetect one Then you just haveto specify the original encoding Beautiful Soup parses anything yougive it, and does the tree traversal stuff for you You can tell it"Find all the links", or "Find all the links of class externalLink",or "Find all the links whose urls match "foocom", or "Find the tableheading that's got bold text, then give me that text" Valuable datathat was once locked up in poorly-designed websites is now within yourreach Projects that would have taken hours take only minutes withBeautiful Soup * Burp Suite 1201 o burpsuite-1201tarbz2 + BurpSuite is an integrated platform for attacking web applications Itcontains all of the Burp tools with numerous interfaces between themdesigned to facilitate and speed up the process of attacking anapplication All tools share the same robust framework for handlingHTTP requests, persistence, authentication, downstream proxies,logging, alerting and extensibility Burp Suite allows you to combinemanual and automated techniques to enumerate, analyse, scan, attackand exploit web applications The various Burp tools work togethereffectively to share information and allow findings identified withinone tool to form the basis of an attack using another Key featuresunique to Burp Suite include: detailed analysis and rendering ofrequests and responses; one-click transfer of interesting requestsbetween tools; ability to "passively" spider an application in anon-intrusive manner, with all requests originating from the user'sbrowser; FIPS-compliant statistical analysis of session tokenrandomness; utilities for decoding and comparing application data;support for custom client and server SSL certificates; extensibilityvia the IBurpExtender interface; centrally configured settings fordownstream proxies, web and proxy authentication, and logging; toolscan run in a single tabbed window, or be detached in individualwindows; and, runs in both Linux and Windows * ClientForm 0210 oclientform-0210tarbz2 + ClientForm is a Python module for handlingHTML forms on the client side, useful for parsing HTML forms, fillingthem in and returning the completed forms to the server ClientFormwas developed from a port of Gisle Aas' Perl module HTML::Form, fromthe libwww-perl library, but the interface is not the same *Corkscrew 20 o corkscrew-20tarbz2 + Corkscrew is a tool fortunneling SSH through HTTP proxies Corkscrew has been compiled onAIX, HPUX, Solaris, FreeBSD, OpenBSD, NetBSD, Linux, Win32 Cygwin,and Mac OS X Corkscrew has been tested with the following HTTPproxies: Gauntlet, CacheFlow, JunkBuster, Squid, and Apache'smod_proxy * Dns2tcp 043 o dns2tcp-043tarbz2 + Dns2tcp is anetwork tool designed to relay TCP connections through DNS trafficEncapsulation is done on the TCP level, thus no specific driver isneeded, ie, TUN/TAP Dns2tcp client doesn't need to be run withspecific privileges Dns2tcp is composed of two parts: a server-sidetool and a client-side tool The server has a list of resourcesspecified in a configuration file Each resource is a local or remoteservice listening for TCP connections The client listens on apredefined TCP port and relays each incoming connection through DNS tothe final service * Durzosploit N/A o durzosploittarbz2 +Durzosploit is a JavaScript exploit generation framework that worksthrough the console The goal of this project is to quickly and easilygenerate working exploits for cross-site scripting vulnerabilities inpopular web applications or websites Durzosploit does not findbrowser vulnerabilities; it only is an framework containing exploitsyou can use * dvd::rip 09810 o dvdrip-09810tarbz2 + dvd::rip isa full featured DVD copy program written in Perl It provides an easyto use but feature-rich Gtk+ GUI to control almost all aspects of theripping and transcoding process It uses the widely known videoprocessing swissknife transcode and many other open source toolsdvd::rip itself is licensed under GPL/Perl Artistic License *eAccelerator 0953 o eaccelerator-0953tarbz2 + eAccelerator isa free open source PHP accelerator, optimizer, and dynamic contentcache It increases the performance of PHP scripts by caching them intheir compiled state, so that the overhead of compiling is almostcompletely eliminated It also optimizes scripts to speed up theirexecution eAccelerator typically reduces server load and increasesthe speed of your PHP code by 1-10 times eAccelerator was born inDecember 2004 as a fork of the Turck MMCache project Turck MMCachewas created by Dmitry Stogov and much of the eAccelerator code isstill based on his work eAccelerator stores compiled PHP scripts inshared memory and executes code directly from it It creates locksonly for a short time, while searching for a compiled PHP script inthe cache, so one script can be executed simultaneously by severalengines Files that can't fit in shared memory are cached on diskonly eAccelerator is still under development The latest release,0953, supports PHP 4 and all PHP 5 releases including 52 In olderreleases, the encoder will only work with PHP versions from the 4xxbranch eAccelerator will not work with any other versions of PHP *Erlang R13B o erlang-r13btarbz2 + Erlang is a programming languagedesigned at the Ericsson Computer Science Laboratory Open sourceErlang is being released to help encourage the spread of Erlangoutside Ericsson * Fast-Track 40 o fasttrack-4tarbz2 + For thoseof you new to Fast-Track, Fast-Track is a Python-based open sourceproject aimed at helping penetration testers in an effort to identify,exploit, and further penetrate a network Fast-Track was originallyconceived when David Kennedy was on a penetration test and found thatthere was generally a lack of tools or automation in certain attacksthat were normally extremely advanced and time consuming In an effortto reproduce some of David's advanced attacks and propagate it down tothe team at SecureState, David ended up writing Fast-Track for thepublic Many of the issues Fast-Track exploits are due to impropersanitizing of client-side data within web applications, patchmanagement, or lack of hardening techniques Fast-Track arms thepenetration tester with advanced attacks that in most cases have neverbeen performed before Sit back relax, crank open a can of jolt colaand enjoy the ride * FreeTDS 082 o freetds-082tarbz2 + FreeTDS isa set of libraries for Unix and Linux that allows your programs tonatively talk to Microsoft SQL Server and Sybase databasesTechnically speaking, FreeTDS is an open source implementation of theTDS Tabular Data Stream protocol used by these databases for theirown clients It supports many different flavors of the protocol andthree APIs to access it Additionally FreeTDS works with othersoftware such as Perl and PHP, providing access from those languagesas well If you are looking for a Java implementation, we refer you tothe jTDS project on SourceForge FreeTDS has many possible uses Ithas been used by Unix/Linux webservers to present data stored in SQLServer to the web, to port SQL Server database code from NT to Unix,to import data into SQL Server from a Unix source, and to providedatabase access on platforms such as real-time systems that have nonative drivers The FreeTDS C libraries are available under the termsof the GNU LGPL license; consult the COPYINGLIB file in thedistribution for details * fzem 02252009 o fzem-02252009tarbz2+ fzem is a MUA mail user agent fuzzer that fuzzes MAIL/MIME e-mailheaders as well as how clients handle SMTP, POP and IMAP responsesfzem's purpose is to fuzz MUAs as they process e-mail content andhandle server reponses * httptunnel 305 o httptunnel-305tarbz2+ httptunnel creates a bidirectional virtual data connection tunnelledin HTTP requests The HTTP requests can be sent via an HTTP proxy ifso desired This can be useful for users behind restrictive firewallsIf WWW access is allowed through a HTTP proxy, it's possible to usehttptunnel and, say, telnet or PPP to connect to a computer outsidethe firewall * K9Copy 124 o k9copy-124tarbz2 + K9Copy is asmall utility which allows copying DVD's on Linux Its featuresinclude: the video stream is compressed to make the video fit on a47GB recordable DVD; DVD burning; creation of ISO images; choosingwhich audio and subtitle tracks are copied; title preview videoonly; and, the ability to preserve the original menus * Libnet1121 o libnet-1121tarbz2 + Libnet is a generic networking APIthat provides access to several protocols It is not designed as anall-in-one solution to networking Currently many features that arecommon in some network protocols are not available with Libnet, suchas streaming via TCP/IP We feel that Libnet should not providespecific features that are possible in other protocols If we restrictLibnet to the minimal needed to communicate datagram/packets, thenthis allows it to support more interfaces Libnet supports thefollowing platforms and compilers: Unix gcc -- tested with Linux,FreeBSD and OSF/1, DOS djgpp, and Windows djgpp+RSXNTDJ, Mingw32,or MSVC Other platforms should be fairly easy to support, especiallyif GNU CC and GNU Make will run on them Libnet supports UDP/IP onUnix, Windows, and, provided the Winsock is not version 0 or greater,in a DOS box under Windows It supports IPX in DOS, Windows, and Unix,and serial linking in DOS, Windows, Unix, and BeOS On all platformsthere is a "localhost" driver which is a sort of internal loopbackdevice not for communicating between processes though * md6sum2008-11-2 o md6sum-2008-11-2tarbz2 + A C implementation of the MD6hashing algorithm, written by Jayant Krishnamurthy and Ronald Rivest* Medusa 15 o medusa-15tarbz2 + Medusa is a speedy, massivelyparallel, modular, login brute-forcer for network services created bythe geeks at Foofusnet It currently has modules for the followingservices: CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP NetWare,PcAnywhere, POP3, PostgreSQL, rexec, rlogin, rsh, SMB, SMTP VRFY,SNMP, SSHv2, SVN, Telnet, VmAuthd, VNC, and a generic wrapper module* Nikto 203 o nikto-203tarbz2 + Nikto is an Open Source GPL webserver scanner which performs comprehensive tests against web serversfor multiple items, including over 3,500 potentially dangerousfiles/CGIs, versions on over 900 servers, and version specificproblems on over 250 servers Scan items and plugins are frequentlyupdated and can be automatically updated if desired * pexpect 23 opexpect-23tarbz2 + Pexpect is a Python module for spawning childapplications and controlling them automatically Pexpect can be usedfor automating interactive applications such as ssh, ftp, passwd,telnet, etc It can be used to a automate setup scripts forduplicating software package installations on different servers Itcan be used for automated software testing Pexpect is in the spiritof Don Libes' Expect, but Pexpect is pure Python Other Expect-likemodules for Python require TCL and Expect or require C extensions tobe compiled Pexpect does not use C, Expect, or TCL extensions Itshould work on any platform that supports the standard Python ptymodule The Pexpect interface focuses on ease of use so that simpletasks are easy * Pine 4641i386 o pine-464-1i386tarbz2 + Pinea Program for Internet News and E-mail is a tool for reading,sending, and managing electronic messages Pine was developed by UWTechnology at the University of Washington Though originally designedfor inexperienced email users, Pine has evolved to support manyadvanced features, and an ever-growing number of configuration andpersonal-preference options Pine is available for Unix as well as forpersonal computers running a Microsoft operating system PC-Pine *ppp-pam 02 o ppp-pam-02tarbz2 + A Pluggable Authentication ModulePAM implementing Gibson Research's Perfect Paper Passwords PPP *Psyco 16 o psyco-16tarbz2 + Psyco is a Python extension modulewhich can massively speed up the execution of any Python code *Quassel 041 o quassel-041tarbz2 + Quassel IRC is a modern,cross-platform, distributed IRC client, meaning that one or multipleclients can attach to and detach from a central core -- much likethe popular combination of screen and a text-based IRC client such asWeeChat, but graphical In addition to this uniqe feature, we aim tobring a pleasurable, comfortable chatting experience to all majorplatforms including Linux, Windows, and MacOS X, as well asQtopia-based cell phones and PDAs, making communication with yourpeers not only convenient, but also ubiquitous available And the bestof all: It's free - as in beer and as in speech, since we distributeQuassel under the GPL, and you are welcome to download and see foryourself * Shell In A Box 27 o shellinabox-27tarbz2 + Shell In ABox implements a web server that can export arbitrary command linetools to a web-based terminal emulator This emulator is accessible toany JavaScript and CSS enabled web browser and does not require anyadditional browser plugins * Sniffdet 09 o sniffdet-09tarbz2 +Sniffdet is an open source implementation of a set of tests for remotesniffers detection in TCP/IP network environments It's composed of aflexible and easy to use library and an application to run the testsIt is licensed under the GNU General Public License GPL Sniffdetimplements various tests for the detection of machines running inpromiscuous mode or with a sniffer Besides other general usefunctions, libsniffdet provides the following tests: ICMP test; ARPtest; DNS test; and, LATENCY test The application has a flexibleinterface which allows the customization of every test by using aconfig file, can test multiple machines at the same execution, has aplugin interface for the reports, and runs as an unprivileged user *sqlsus 02 o sqlsus-02tarbz2 + sqlsus is an open source MySQLinjection and takeover tool, written in Perl Via a command lineinterface that mimics a mysql console, you can retrieve the databasesstructure, inject SQL queries, download files from the web server,upload and control a backdoor, clone the databases, and much more Itis designed to maximize the amount of data gathered per server hit,making the best use I can think of of MySQL functions to optimisethe available injection space sqlsus is focused on PHP/MySQLinstallations, and integrates some neat features - some of them reallyspecific to this DBMS It is not, however, and won't ever be a SQLinjection scanner; it starts its job on the next step * sshpass 104o sshpass-104tarbz2 + sshpass is a tool for non-interactivlyperforming password authentication with SSH's so called "interactivekeyboard password authentication" Most users should use SSH's moresecure public key authentication instead * tcpsmash 03 otcpsmash-03tarbz2 + Free and cool CLI network sniffer for Unix-likesystems * txt2regex 08 o txt2regex-08tarbz2 + Txt2regex is aregular expression wizard that converts human sentences to regexes Ina simple interactive console interface, the user answers questions andthe program builds the regexes for more than 20 programs, like Vim,Emacs, Perl, PHP, Python, Procmail, and OpenOfficeorg It is a shellscript 100% written with Bash built-in commands No compilation orextra commands are needed: just download and run * VideoJak 100 ovideojak-100tarbz2 + VideoJak is an IP video security assessmenttool that can simulate a proof-of-concept denial-of-service against atargeted, user-selected video session and IP video phone VideoJak isthe first of its kind security tool that analyzes video codecstandards such as H264 VideoJak works by first capturing the RTPport used in a video conversation and analyzing the RTP packets,collecting the RTP sequence numbers and timestamp values used betweenthe phones Then VideoJak creates a custom video payload by changingthe sequence numbers and timestamp values used in the original RTPpackets between the two phones After the user selects a targetedphone to attack in an ongoing video session, VideoJak delivers thepayload over the learned RTP port against the target This attackresults in severely degraded video and audio quality VideoJak isdesigned in consideration of today's UC infrastructure implementationsin which quality-of-service requirements dictate the separation ofdata and VoIP/video into discrete networks or VLANs Future versionsof the tool will support more exciting features * Vim 72 ovim-72tarbz2 + Vim is an advanced text editor that seeks to providethe power of the de-facto Unix editor vi, with a more complete featureset It's useful whether you're already using vi or using a differenteditor Vim is a highly configurable text editor built to enableefficient text editing It is an improved version of the vi editordistributed with most Unix systems Vim is often called a programmer'seditor, and so useful for programming that many consider it an entireIDE It's not just for programmers, though Vim is perfect for allkinds of text editing, from composing e-mail to editing configurationfiles Vim isn't an editor designed to hold its users' hands It is atool, the use of which must be learned Vim isn't a word processorAlthough it can display text with various forms of highlighting andformatting, it isn't there to provide WYSIWYG editing of typesetdocuments It is great for editing TeX, though Vim is charitywareIts license is GPL-compatible, so it's distributed freely, but we askthat if you find it useful you make a donation to help children inUganda through the ICCF The full license text can be found in thedocumentation * WarVOX 100 o warvox-100tarbz2 + WarVOX is asuite of tools for exploring, classifying, and auditing telephonesystems Unlike normal wardialing tools, WarVOX works with the actualaudio from each call and does not use a modem directly This modelallows WarVOX to find and classify a wide range of interesting lines,including modems, faxes, voice mail boxes, PBXs, loops, dial tones,IVRs, and forwarders WarVOX provides the unique ability to classifyall telephone lines in a given range, not just those connected tomodems, allowing for a comprehensive audit of a telephone systemWarVOX requires no telephony hardware and is massively scalable byleveraging Internet-based VoIP providers A single instance of WarVOXon a residential broadband connection, with a typical VoIP account,can scan over 1,000 numbers per hour The speed of WarVOX is limitedonly by downstream bandwidth and the limitations of the VoIP serviceUsing two providers with over 40 concurrent lines we have been able toscan entire 10,000 number prefixes within 3 hours The resulting callaudio can be used to extract a list of modems that can be fed into astandard modem-based wardialing application for fingerprinting andbanner collection One of the great things about the WarVOX model isthat once the data has been gathered, it is archived and available forre-analysis as new signatures, plugins, and tools are developed Thecurrent release of WarVOX 100 is able to automatically detectmodems, faxes, silence, voice mail boxes, dial tones, and voicesWarVOX is intended for legal security assessment, asset inventory, andresearch purposes only Keep in mind that the laws regulatingautomated dialing can vary by location; it is your responsibility toensure that your local laws and the laws governing the targettelephone range are respected * WeeChat 0261 oweechat-0261tarbz2 + WeeChat Wee Enhanced Environment for Chatis a free IRC client, fast and light, designed for many operatingsystems Its main features are: multi-servers connection with SSL,IPv6, proxy; many GUIs including Curses, wxWidgets, Gtk, and Qt;small, fast, and light; customizable and extensible with plugins andscripts; compliant with RFCs 1459, 2810, 2811, 2812, and 2813;multi-platform GNU/Linux, *BSD, MacOS X, Windows and other; and,100% GPL, free software</description><link>http://www.secuobs.com/revue/news/101114.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/101114.shtml</guid></item>
<item><title>Regex #5</title><description>Secuobs.com : 2009-05-21 00:37:31 - kinqpinz.info - Regular Expressions #5 ¦ My hexadecimal validation keeps failing</description><link>http://www.secuobs.com/revue/news/99720.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99720.shtml</guid></item>
<item><title>It's Tuesday night: why am I offline</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - There is a bomb threat in our apartment building We've since evacuated,relocated the server, and are waiting for some word on what's goingon</description><link>http://www.secuobs.com/revue/news/99225.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99225.shtml</guid></item>
<item><title>Devil-Linux  Trustix Secure Linux</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Added Devil-Linux and Trustix Secure Linux to the ISO page I'll have toadd permalinks for them, too, but for now you can generally followthese links:</description><link>http://www.secuobs.com/revue/news/99224.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99224.shtml</guid></item>
<item><title>Yup, it's why we're the kinqpinz</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I changed the login/logout functions to use ninjitsu AJAX and I'llexplain why On YouTube, I spend a lot of time, no doubt So you'rewatching a video on YouTube and want to add it as a favorite, so youclick the Favorites link and a hidden div appears prompting for yourcredentials WITHOUT reloading the page so you can continue watchingthe video</description><link>http://www.secuobs.com/revue/news/99223.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99223.shtml</guid></item>
<item><title>It works Haha</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Any of you get that last night Stupid Apache security update added itsown index file to the root directory of the site I hadn't noticeduntil this morning</description><link>http://www.secuobs.com/revue/news/99222.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99222.shtml</guid></item>
<item><title>Color Table</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - kinqpinzinfo Color Table</description><link>http://www.secuobs.com/revue/news/99221.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99221.shtml</guid></item>
<item><title>Firefox resource:// hacks</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Hasn't anybody else found these You can access local files using theresource:// scheme just as if you were using file:// - just encodeeach forward slash:</description><link>http://www.secuobs.com/revue/news/99220.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99220.shtml</guid></item>
<item><title>Reverse Engineering a PHP Backdoor o2</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I have to update this because I found someone else who has already done afantastic job of decoding this morbid attack code, referring to thispost regarding this obfuscated code I ran into a wall trying todecode the two randomization functions, this author has got themright Here is his code in its entirety - I'm done with this crapEnjoy</description><link>http://www.secuobs.com/revue/news/99219.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99219.shtml</guid></item>
<item><title>kinqpinzinfo RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Bookmark it while it's hot</description><link>http://www.secuobs.com/revue/news/99218.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99218.shtml</guid></item>
<item><title>Slight makeover and code reduction</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The main two divs in place before this revamp were making things entirelytoo busy Pointles borders; useless margins/pads; extraneousfont/color declarationsseriously, the internals of this site wereinflamed and ready to burst Some changes include</description><link>http://www.secuobs.com/revue/news/99217.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99217.shtml</guid></item>
<item><title>SQL o1</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I think I was going in the wrong direction when I wrote this one The SQLstatement is jacked Thanks, Orion, for the BBS post Moreover, theusername field was expecting the $password variable - WTF Probablypulled another all-nighter that day</description><link>http://www.secuobs.com/revue/news/99216.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99216.shtml</guid></item>
<item><title>Web/AJAX PDF Documentation</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - On the PDFs page you can find some new PDFs pertaining to AJAX andmiscellany Web development Page is now sorted alphabetically</description><link>http://www.secuobs.com/revue/news/99215.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99215.shtml</guid></item>
<item><title>Web/AJAX CHM Documentation</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Bunch of AJAX/Web related literature on the CHM</description><link>http://www.secuobs.com/revue/news/99214.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99214.shtml</guid></item>
<item><title>McGrew Security RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The McGrew Security feed has been added</description><link>http://www.secuobs.com/revue/news/99213.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99213.shtml</guid></item>
<item><title>Phrack o65</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Underground Myth taken from the latest release of Phrack, o65</description><link>http://www.secuobs.com/revue/news/99212.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99212.shtml</guid></item>
<item><title>The ORG / The COM</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I spent a LONG time trying NOT to use the same name for a startup Webdevelopment business, but it just seems to work I like kinqpinz, somefolks don't understand itnames don't matter, anyhow I'veregistered kinqpinzorg to offer up my own take on how sites shouldoperate, not that there is any one way, of course The drabblack/white palette is just temporary if you visit the link - it justhappens to be a mainstay on this domain</description><link>http://www.secuobs.com/revue/news/99211.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99211.shtml</guid></item>
<item><title>Feeds: probably still a mess</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The feeds page is several shades of crap in the versions of IE I can'ttest on, plus smaller resolutions It's pretty sweet on a 1200+display in Firefox, though The links for each feed use an onClickevent that triggers an XMLHttpRequest that fetches the feed info fromthe server, which in turn fetches the actual RSS from whichever remoteserver is requested, returning some result I'll bet I can get awaywith shrinking a few fonts to achieve the desired effect forFF/Konqueror on differing resolutions, but IE doesn't supportposition:fixed in CSS - plus the hacks are too ugly to implement - soget a better browser</description><link>http://www.secuobs.com/revue/news/99210.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99210.shtml</guid></item>
<item><title>A bit early for holiday colors, isn't it</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - That doesn't stop the site from looking like a bowl of holiday spew inLynx</description><link>http://www.secuobs.com/revue/news/99209.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99209.shtml</guid></item>
<item><title>PHP o10</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - PHP o10 uses a basic OOP function to auto-include missing classdefinitions</description><link>http://www.secuobs.com/revue/news/99208.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99208.shtml</guid></item>
<item><title>r00tinblogspot RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Far from r00tin feed has been added</description><link>http://www.secuobs.com/revue/news/99207.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99207.shtml</guid></item>
<item><title>Linux tanks, MS station wagons</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - From Neal Stephenson's In the BeginningWas the Command Line MGBs,Tanks, and Batmobiles</description><link>http://www.secuobs.com/revue/news/99206.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99206.shtml</guid></item>
<item><title>8 tools and maybe future ad space</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - You may have noticed a Google ad or two earlier this afternoon I don'tthink they'll be staying unless it can be done much more tastefullyAnyway, play with some of these new and old toys added to thecollection</description><link>http://www.secuobs.com/revue/news/99205.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99205.shtml</guid></item>
<item><title>kinqpinzcomit's growing</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - So it's kind of cool brainstorming for three completely different sitesthat are all tied together For the longest time I've been needing aplace to drop all of the pictures I've either drawn or made on acomputer Well, kinqpinzcom No, commenting will not be available sothat I do not have to read your criticisms</description><link>http://www.secuobs.com/revue/news/99204.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99204.shtml</guid></item>
<item><title>jQuery blog RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The jQuery feed has been added</description><link>http://www.secuobs.com/revue/news/99203.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99203.shtml</guid></item>
<item><title>Dark SEO RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Dark SEO Programming feed has been added, found viahttp://www0x000000com/i=570</description><link>http://www.secuobs.com/revue/news/99202.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99202.shtml</guid></item>
<item><title>PlayStation 3 core dump - nifty</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - So I'm getting ready to save the universe again in Ratchet et Clank on thePS3 when all of a sudden the game freezes and the machine tells mewhat's on its mind It has been a long time since I've seen a debugscreen on a gaming console - maybe Sega Genesis - so I took apicture</description><link>http://www.secuobs.com/revue/news/99201.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99201.shtml</guid></item>
<item><title>Web devel, pics from Ohio</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I've got the ball rolling on kinqpinzorg, my Web development playgroundSo far I've written up a page on how to use the lightBox jQuery pluginfor image galleries I'm using it right now at kinqpinzcom/work/ formy drawings and such Also if anybody's interested in antique carscheck out this page for photos I took at the antique auto museum inCleveland That's the GalViewII plugin, by the way</description><link>http://www.secuobs.com/revue/news/99200.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99200.shtml</guid></item>
<item><title>Fortune cookie caption contest</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I found this via here, where he shows his submission for this challengeHere's mine</description><link>http://www.secuobs.com/revue/news/99199.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99199.shtml</guid></item>
<item><title>Post not worth posting</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I have moved the HTML color reference page tohttp://kinqpinzorg/9fc3bec2 - looks better there anyway Here aresome random links</description><link>http://www.secuobs.com/revue/news/99198.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99198.shtml</guid></item>
<item><title>EGO MANIAC</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The kinqpinzorg feed has been added Maybe I'm gloating by adding itsince it's my domain but for those of you that like to keep up withboth sites you can quickly do it from one place Right, that's howwe'll justify it</description><link>http://www.secuobs.com/revue/news/99197.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99197.shtml</guid></item>
<item><title>Milw0rmcom source leaked + exploit archive</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Last time I checked I couldn't find more on this, but it appears thatmilw0rmcom's complete source code has been leaked including all PHP,HTML, administrative, forum, and SQL files As a courtesy to theauthors I won't continue to pass it along but did find the downloadlink on Astalavista's membership portal To complement this, here isthe latest exploit archive from Milw0rm</description><link>http://www.secuobs.com/revue/news/99196.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99196.shtml</guid></item>
<item><title>kinqpinzinfo first major release</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - As of today on June 1st, 2008, kinqpinzinfo is releasing its ownsecurity DVD with over 3 gigs of juicy goodness If you're interestedin owning everything from this site plus much more take a look atthe description and consider ordering your own copy</description><link>http://www.secuobs.com/revue/news/99195.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99195.shtml</guid></item>
<item><title>Wired Blog RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Wired's blog feed has been added</description><link>http://www.secuobs.com/revue/news/99194.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99194.shtml</guid></item>
<item><title>Shmoocon speech and having some fun</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - RenderMan at ShmooCon 2008 There is a part in the video where the folksat Gizmodo raid a trade show and start shutting off TVs with a smallhandheld device Great pwnage Here is the full scoop on the pwningdevice and loads of pwning videos</description><link>http://www.secuobs.com/revue/news/99193.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99193.shtml</guid></item>
<item><title>искать</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - With any luck that's Russian for 'search' If you have a hard time tryingto find anything on the site, just use this Google search form Seemsto work well enough and you don't have to bother with being redirectedto Google, it's all done within kinqpinzinfo</description><link>http://www.secuobs.com/revue/news/99192.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99192.shtml</guid></item>
<item><title>Changes to the arsenal pages</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - To keep with the theme of the kinqpinz DVD, the arsenal pages arecategorized into a much more friendly layout Did I mention that thissame directory structure is on the DVD Just checkin' ;D</description><link>http://www.secuobs.com/revue/news/99191.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99191.shtml</guid></item>
<item><title>OWSA-Assistant; make your own live CD</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I've been having some fun changing around the wargames page Myfascination with skulls is morbid, the most awesome one of all existson the kinqpinz swag Have you ever wanted to make your own live CD Ilooked into it before making the kinqpinz DVD, but never quite gotinto it, though I may look into it later on down the road Here's alink discussing how to do it You basically mount a Knoppix distro,edit it to suit your own needs, and burn the changes The BackTrackguys have made a killing with theirs though they've spent so much moretime tweaking their distro than most folks will ever care to Inrelated news, I've stumbled onto another live CD worth mentioningcalled OWSA-Assistant It's a strange breed of live CD in that it'sgeared toward the technically-inept so that they may audit their ownwireless networks, though I don't find the GUI interfaces to becompletely self-explanatory There are plenty of custom tools that areonly available through this distro, all for wireless auditing, but forthe most part it's a BackTrack clone Once I get another PDA Hi,Jessica I'll have a go at the Bluetooth stuff since I can never getBluesnarfer and similar working 'cause of that damned rfcomm0 error *OWSA-Assistant permalink ∞ OWSA-Assistant download</description><link>http://www.secuobs.com/revue/news/99190.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99190.shtml</guid></item>
<item><title>Aircrack-ng 10</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I love the aircrack-ng suite and it just looks to keep getting betterI've updated the hall of arsenal to include this latest releaseHere's a copy/paste from the site discussing the new features</description><link>http://www.secuobs.com/revue/news/99189.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99189.shtml</guid></item>
<item><title>PHP bz2 functions</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I just think this is a cool extension, the fact that you can soeffortlessly create/delete/write to/read from bzip2 filesobviouslymy favorite Linux file compression format if you've been around thesite The snippet below is just from my testing out this example</description><link>http://www.secuobs.com/revue/news/99188.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99188.shtml</guid></item>
<item><title>GovernmentSecurityorg RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I've added three of Government Security's feeds: New Topics, News, andVulnerabilities Register on their forums; they've got some greatstuff I remember back in the day average folks like me were forbiddenfrom registering but now all is open - consume</description><link>http://www.secuobs.com/revue/news/99187.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99187.shtml</guid></item>
<item><title>Hacking the Linksys WRT54G o2</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - This is my second and more descriptive text on the issue of the WRT'ssecurity bypass vuln own2txt</description><link>http://www.secuobs.com/revue/news/99186.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99186.shtml</guid></item>
<item><title>Our Web continues to tangle itself</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Internet is just broken all over the place From what I've beenseeing it's mostly Webmasters and/or developers that don't know how ordon't care to maintain working code Why do I bring this up The otherday I was looking around for an htaccess article that talks about theflags you can use Simple enough, right Nope, and it's extremelyironic in the case of the first and possibly second This was aGoogle result that came back for 'htaccess flags' The HTACCESS ELITEFORUMS server was spitting out 500 Internal Server Errors for having amisconfigured htaccess</description><link>http://www.secuobs.com/revue/news/99185.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99185.shtml</guid></item>
<item><title>Links, videos, pdf, ppt, blackhat toolkit, new browsers</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Johnny Long at Defcon 2008: 'No Tech Hacking' Mati Aharoni's Shmoocon2008 speech Songbird, by the Mozilla camp, that is perfect for LinuxiPod users permalink - download PDF - Catch Me, If You Can: EvadingNetwork Signatures with Web-based Polymorphic Worms Opera 95 issexy Firefox 3 is out permalink - digerati-blackboxtarbz2 -Digerati Marketing's BlackBox toolkit It's too simple to pwn Vista</description><link>http://www.secuobs.com/revue/news/99184.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99184.shtml</guid></item>
<item><title>Amateurish port scanner in PHP</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Yeah, it is When I first set out to learn PHP, not really knowing anyprogramming language in depth, I wanted to write my own port scannerthat was similar to other extremely simplistic ones that I've usedWell, there's nothing to this one, which just checks for open/closedports using fsockopen My inspiration was from an old hackingcommunity hosting a bit of Perl that does the same thing There's ausage function and a scan function It is meant to be run from thecommand line, you'll get output like this on an open port: $/scannerphp kinqpinzinfo 80 + port 80 is open on kinqpinzinfoAnd on a closed port: $ /scannerphp kinqpinzinfo 81 - port 81 isclosed on kinqpinzinfo Now at the very least I can say I wroteonehowever unchallenging it was</description><link>http://www.secuobs.com/revue/news/99183.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99183.shtml</guid></item>
<item><title>YouTube filters + funny image</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - If you have kids, did you know that they can watch any video on YouTuberegardless of whether or not they are old enough Read this YouTube'svideo embeds are to blame The real reason I wanted to mention that,though, is so I can post this picture I took last night It explainsitself Assholes will always find a way to sabotage</description><link>http://www.secuobs.com/revue/news/99182.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99182.shtml</guid></item>
<item><title>Linux feeds</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The three Linux Foundation feeds and the official Linux Kernel MailingList</description><link>http://www.secuobs.com/revue/news/99181.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99181.shtml</guid></item>
<item><title>Wesside-ng: destroys WEP in under 2 minutes</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - As part of my final project for school yahoo, 4 years I've been workingwith the latest release of the aircrack-ng suite Mostly my interestlies in demonstrating how easily attacks are carried out against WEPso there's no better tool than wesside-ng, part of the suite, that iscurrently a p0c that's got some bugs needing ironed out I mostlyexperience random seg faults; on one occasion a partial dump of HTTPheaders were returned, which piqued my interest because reading memorysegments on the host computer and/or router is most curious Anyway,the whole point was to record a video and I've done that $/wesside-ng -i ath1 -v $ROUTER -k 1 -i is the wireless interface -vis the device I'm targeting $ROUTER is an alias for the router's MAC-k ignores acks/tx, which substantially reduces error reporting TheWEP key is cracked after ~22,300 IVs are collected - do note that thekey is just 'bar'</description><link>http://www.secuobs.com/revue/news/99180.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99180.shtml</guid></item>
<item><title>ZDI RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Zero Day Initiative Recent Press feed has been added</description><link>http://www.secuobs.com/revue/news/99179.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99179.shtml</guid></item>
<item><title>Call it the ultimate _physical security_</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Like so many other security bloggers out there I am a big fan of MMA Iam a complete conformist and cannot resist to be like everybody elseMostly I'm into the WEC; the UFC not so much anymore What's up withtheir announcers When a guy throws a kick they exclaim with greatjoy, "Nice kick" When a guy throws a punch they exclaim with greaterjoy, "Nice punch from the, uhboxer" At least the WEC breaks downwhat's going on for people that don't know martial arts fully So thispost is all about these links I want to put up They're mostly justgateways to some of my favorite fighters but there's some other coolstuff like weapons disarmament knives, guns, sticks, drunken stylekung fu, capoeira, ninjitsu, the list goes on My interest lies in thetechniques used to overcome an opponent, be it a computer or Bruno theboxer If you take the time to watch the 'real ninjitsu master' videobelow you may get my jist The instructor uses the least amount ofenergy for countering and successfully overtaking his opponent in anygiven scenario Of course, somewhere in between he throws cards at theother guy to distract him, but you know It works</description><link>http://www.secuobs.com/revue/news/99178.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99178.shtml</guid></item>
<item><title>Google offices in Zurich</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I've been meaning to put this thing up It's a bunch of slides from theZurich Google offices where employees sit in boats duringpresentations, play pool and Guitar Hero, sleep in bean bags, ridedown slides, eat expensive cuisine meals for lunch, and basically pissaway the day because we've all made them so rich</description><link>http://www.secuobs.com/revue/news/99177.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99177.shtml</guid></item>
<item><title>Linus Torvalds on the origins of Linux</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - YouTube vid - https://kinqpinzinfo/lib/2008/jul/o14333ebd</description><link>http://www.secuobs.com/revue/news/99176.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99176.shtml</guid></item>
<item><title>Got Assembly</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I want to get this up so that I can look back and remind myself how easythis is It's an Assembly hello world so for all of you security prosreading this scoffing at this child's play GO TO HELL I've looked ata lot of asm obviously messing with shellcodes or whatever but neverreally sat down with it like I just did now It's what I do when I'vebeen up all night watching OnDemand, eating subs, absorbing largequantities of caffeine and overdosing on Cheetos</description><link>http://www.secuobs.com/revue/news/99175.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99175.shtml</guid></item>
<item><title>New reading section replaces worn out pdf/chm/iso/misc</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - It's like the title says I've removed those sections and have begun workon building my own library of hacking Use the 'library' link on thetop nav to get there; if you are a past visitor you will find themuddled pdf/chm/iso/misc sections are now ordered by categoryirregardless of their file extension I figure I have just enoughthings online ready for immediate download that necessitates thistransition, though I don't make a hearty effort in uploadingeverything I find or read online like some communitiesmostly 'causeI work on projects of my own Busy, busy, busy - anyway, hope youregulars out there enjoy It will probably make it easier on me to addtons of crap</description><link>http://www.secuobs.com/revue/news/99174.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99174.shtml</guid></item>
<item><title>Milw0rm RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I've added the Milw0rmcom feed I'm still surprised at how popular theLinksys papers are: see I'll be releasing another video within thenext week or two I've got to make up some Web exploitation video sothat I can show how to guard against it for my final class project Itcould all be so simple if I wasn't so against creating a lame XSS/SQLtype demonstration There are plenty of them around and even if youdon't know what they're about, their fundamentals can be grasped in notime Anyway, hang out and see what I come up with Welcome to thenewly registered VIPs Cardrian, you've nearly killed the wargames inno time - good job</description><link>http://www.secuobs.com/revue/news/99173.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99173.shtml</guid></item>
<item><title>PHP o11</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - It's been awhile since the last game, hasn't it Well, just because ofthat here is probably the simplest PHP game I figure at least itgives you something to do; at least you can dick around with solvingit creatively PHP o11 » Not bound to one method of solving » worth550 points There are now a total of 6,250 attainable points</description><link>http://www.secuobs.com/revue/news/99172.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99172.shtml</guid></item>
<item><title>A complete RFC collection</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Instead of having to search or manually enter which RFC you'd like toread about on the official site, why not someone take 20 minutes tolink each one and make it public Consider it done A bit of searchand replace in Quanta made it a breeze Since all of the RFCs andtheir descriptions are found athttp://wwwietforg/iesg/1rfc_indextxt, I copied the relevant infofrom that file and used a regexp to find each RFC number, whichconveniently results in each RFC description block, and added thenecessary markup If you happen to use Quanta, I used ^d{4} forfinding "0001", "0002", "0003" and so on Since Quanta's built-inplaceholder 'complete match' sequence is " ", I could construct everyURL in a single line to make the original plain text file come to lifein HTML</description><link>http://www.secuobs.com/revue/news/99171.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99171.shtml</guid></item>
<item><title>Ripping you off at the gas pump</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Just a quick update to put this PDF online I got from my lovelyenchantress Credit Crad Fraud Alert: Heads Up If You "Pay at thePump"</description><link>http://www.secuobs.com/revue/news/99170.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99170.shtml</guid></item>
<item><title>53 files</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I have added 53 new files to the library so go check it out I'm notabout to find where I put everything, so instead have a look at thenew categories, things added to existing categories, and here is alist of what's been added in no particular order 2600tarbz2advanced-linux-programmingnew riderstarbz2ambiguity-in-ajax-lockdown-framework-unveiling-some-contradictory-factsadityak soodpdf anti-forensics-making-computer-forensics-harddum_dumpdfanti-virus-evasion-techniques-and-countermeasuresdebasis mohantypdfbeyond-linux-from-scratchblfs development teampdfblack-security-rootkit-basicstim sheltonpptc++-gui-programming-with-qt3prentice hallpdfcommand-injection-in-xml-signatures-and-encryptionbradley w hillpdfco-programmer's-cookbookallen joneschmeffects-of-worms-on-internet-routing-stabilityido dubrawskypdfgetting-nick-passwords-on-ircbracketttxtgnu-autoconf-automake-and-libtoolnew riderstarbz2gnu-emacs-manual-16th-editionrichard stallmanpdfgtk+-gnome-application-developmenthavoc penningtontarbz2hexediting-to-create-undetectable-trojansanonymouspdfi-bot-taking-advantage-of-robots-powercrossbowertxtirc-basic-commandsl0rd i0ntxt irc-crackingmurtaza imran alitxtirc-manual-brute-forcetristartxtirc-on-your-dime-what-you-really-need-to-know-about-internet-relay-chatciacpdfirc-spoofinghypnosis, haltxt irc-war-demystifiedsnakebytetxtjava-application-development-on-linuxprentice hallpdflearning-perl-writing-exploitswarpboypdflinux-client-migration-cookbook-a-practical-planning-and-implementation-guide-for-migrating-to-desktop-linux-2nd-editionibmpdflinux-device-drivers-3rd-editiono'reillytarbz2linux-shellcoding-referencenexuspdf linux-wormssnakebytetxtmaking-undetectable-trojansanonymouspdfmalicious-codes-in-depthmohammad heidaripdfopen-source-security-tools-practical-applications-for-securitytonyhowlettpdfovertaking-google-desktop-a-security-analysiswatchfirepdfperl-6-essentialso'reillychm perlundergroundtarbz2php-security-writing-safe-codedevilauronpdfplace-valuesanonymoustxtred-hat-enterprise-linux-4-reference-guidered hatpdfreverse-engineering-anti-cracking-techniquesastalavistapdfself-service-linux-mastering-the-art-of-problem-determinationprenticehallpdf slackware-linux-essentialsslackwarepdfsuse-linux-administration-guidefrank bodammer, stefan dirschhtmthe-easiest-linux-guide-you'll-ever-read-an-introduction-to-linux-for-windows-usersscottmorrispdfthe-linux-development-platform-configuring-using-and-maintaining-a-complete-programming-environmentprenticehallpdf unofficial-ubuntu-504-starter-guideubuntutarbz2vim-bookanonymouspdf viruses-and-payloadsbennytxtvirus-predictionsanonymoustxtwindows-alternate-data-streamsraghagtxtwindows-common-autostart-methods187txtwriting-linux-kernel-keyloggerrdtxt writing-nasl-scriptshemilshahpdf writing_shellcodes_in_linuxamitesh singhpdf</description><link>http://www.secuobs.com/revue/news/99169.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99169.shtml</guid></item>
<item><title>How about browsing the zines online</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Well, that's exactly what you get to do Since I really don't have thebandwidth to handle everyone ri pping bunzipped files off my serveranyway, I've rewritten the zine pages so that you may go through t hemonline at your whim download available if necessary Perhaps itdoesn't sound like much but these zines are a large part of ourhacking history, so even if the information in many of them isstagnant in the present, they are still just as valid today as whenthey were initially released They demonstrate fundamentals useful fortoday, countless of code samples to learn from, and tons of hilarityas a large portion of them contain e-mail/IRC snippets massivelyentertaining if you take the time to go through them You may accessthe zines through the library, which is constantly changing right now,so instead you can rely on this permanent link the growing kinqpinzzine collection A note for you leechers I run this domain on a dyinghome user's ISP connection where the upload is capped at like 5K Sobe kind and don't leech multiple files at once Even if yourintentions are pure, you will still become great friends with my buddyiptables, as many already have</description><link>http://www.secuobs.com/revue/news/99168.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99168.shtml</guid></item>
<item><title>Uberkey</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - An x86 keylogger</description><link>http://www.secuobs.com/revue/news/99167.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99167.shtml</guid></item>
<item><title>Dmpe32</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - An executable file information dumper</description><link>http://www.secuobs.com/revue/news/99166.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99166.shtml</guid></item>
<item><title>2 shellcode texts</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - One Byte Frame Pointer Overwrite: Hardcoded Exploits, A Case Study HeapOverflows</description><link>http://www.secuobs.com/revue/news/99165.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99165.shtml</guid></item>
<item><title>OSSIM ISO + its collection of tools</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I hesitate to link to it as my library links are still constantlychanging as I'm updating but I have added the OSSIM ISO to thelibrary As a neat result of this, I have also arranged to makeavailable the tools that are on the live CD for individual downloadThere were one or two that for some reason I either thought to beuninteresting or missing relevant information Many tools were alreadyhere, too So check out the 'Live CD' section here to inform yourselfof and directly download the OSSIM CD in ISO format These are thenifty apps recently added * arpwatch o arpwatch-21a15tarbz2 omonitor MAC/IP pairings * nagios onagios-303-plugins+addonstarbz2 o advanced host and servicemonitoring system This particular file contains all plugins and threeadditional addons * osiris o osiris-423tarbz2 o host intrusiondetection system * pathchar o pathchar-a1-linux-2030tarbz2 oadvanced network statistics for troubleshooting connectivity *tcptrack o tcptrack-130tarbz2 o watch your TCP connections in realtime, similar to top/htop The first kinqpinzinfo DVD has been soldand delivered You can't see me but I'm doing some wicked dance moves</description><link>http://www.secuobs.com/revue/news/99164.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99164.shtml</guid></item>
<item><title>Ethical Hacker RSS; no search; updated stats</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The EthicalHackernet feed has been added I have removed the /searchfunction because Google sucks I read once that some of the greatesttechnological minds at work for Google only focus on advertisements,and it seems to be true, judging from the performance of theirintegrated search platform Bottom line is the search wasn't yieldingresults I will build my own some time The stats page has beencleaned up I had to rewrite it now that I've got the library inplace; also a lot of behind the scenes work went into standardizingand streamlining the code used for monitoring stats So the page ismuch cleaner and works just spiffy for my needs 8:00AM - feedingtime later today or tomorrow I will have up tons of text files</description><link>http://www.secuobs.com/revue/news/99163.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99163.shtml</guid></item>
<item><title>Web 20 o7</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - WWW o7 The data: URI</description><link>http://www.secuobs.com/revue/news/99162.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99162.shtml</guid></item>
<item><title>Carnal 0wnage RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Carnal 0wnage feed has been added</description><link>http://www.secuobs.com/revue/news/99161.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99161.shtml</guid></item>
<item><title>Pathchar</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Took an _extreme_ amount of time for this to happen I just added thistool to the arsenal but until more work is done ping/pathping andtraceroute are your best friends follow link for more</description><link>http://www.secuobs.com/revue/news/99160.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99160.shtml</guid></item>
<item><title>openSUSE, KDE, and Novell feeds</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The following feeds have been added, all of which came from a defaultinstall of Akregator I didn't realize I had until now Enjoy * KDEApps * KDE Dot News * KDE Look * Novell in the News * Novell LinuxDesktop Cool Solutions * Novell Linux Newbies Cool Solutions * NovellOpen PR * openSUSE Linux Cool Solutions * openSUSE News * openSUSESecurity Announcements * Planet KDE</description><link>http://www.secuobs.com/revue/news/99159.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99159.shtml</guid></item>
<item><title>Tao Security RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Robert Bejtlich's Tao Security feed has been added</description><link>http://www.secuobs.com/revue/news/99158.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99158.shtml</guid></item>
<item><title>Aviv Raff RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The feed for Aviv Raff has been added</description><link>http://www.secuobs.com/revue/news/99157.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99157.shtml</guid></item>
<item><title>See what's going on in the world of IT</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - You know my old link section was on its last leg I had slightly over 100links bookmarked in FF the day I set that page up and never reallytouched it since So instead of posting a bunch of outdated links,which most of them were, I've made some changes The links section cannow be found under news As people read through the feeds, the newspage is updated with the latest articles pulled from whichever RSSthey've requested I've visited a few feeds just so the page hassomething on it and to show that everything is randomly displayed tokeep things interesting and not bound to a particular domain, author,publisher, whatever The kinqpinz news portal</description><link>http://www.secuobs.com/revue/news/99156.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99156.shtml</guid></item>
<item><title>RFC layout makeover and plans for news</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Firefox absolutely was CHOKING on my RFC section I blame the markupsince the plain text was fine - though having all 5,280 RFCs on onepage made just editing the page itself complicated Opera blazedthrough the page in no time, an axe through butter But since FFsucks, I know that others will suck more once they get there so theRFCs are broken down into sections now You can view ~499 at once,plus I've tried grouping everything into a more legible and faster tonavigate/skim way Hope more people catch wind of this and make useView the RFCs Also, even though I've already rewritten the newssection since making it public, I feel more work is necessary Ideallywhat I'd like to see is the ability to quickly browse all of thelatest entries; I'm thinking about some AJAX calls for loading remotecontent so that my visitors never have to leave the site to read anarticle; more feeds never hurt either I'm considering either a PEARextension for advanced data structures or a jQuery library to presentthe information available Oh well, it's all there no matter what Idecide Suggestions Lern yurself sumtin', foo</description><link>http://www.secuobs.com/revue/news/99155.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99155.shtml</guid></item>
<item><title>'Nother month; dying cat; new geetar; myasa; Metasploit RSS; random</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I figure that since I have to tell you where to look for last month'sjuicyness, I may as well go on about what's going on outside thisfreakish Internet We have a new kitty named мясо, Russian for meatYeah Keep it to yourself Our other cat is deathly ill; had herforever, like 13 years Found her as a stray, fed her from a bottle asa kitten, had her ever since I bought a classical electric acousticguitar Soon I hope to be working with Audacity to lay some tracksdown but first I have to understand SUSE's problem with my sound cardOnce in a while I get hold of XP and draw strange things with mytablet * Want a kinqpinz wallpaper 1900x1200 * How about мясо1900x1200 I'm about done with my 4 year degree so deciding on whatto do with myself is proving troublesome I have inclinations leaningtowards government worktaking a sharp blade to evil-doers Or Webdevelopment Rock star That's mostly it As for this place, Ireplaced Metasploit's RSS with the blog feed due to the 404 I maketweaks all the time so just check around for new stuff The month ofJuly is here</description><link>http://www.secuobs.com/revue/news/99154.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99154.shtml</guid></item>
<item><title>Princeton PhD hackers</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The materials are online from Princeton's RAM encryption key attack Youturn off your computer and walk away, no matter the encryption you'reusing, they will git yo' shit What I've done is bunzipped the sourcecode of the five tools they've written and included the white paperfor more information * coldboot Princeton encryption key attack kito coldboottarbz2 o contains bios_memimage, efi_memimage, aeskeyfind,rsakeyfind, and aesfix * Lest We Remember: Cold Boot Attacks onEncryption Keys</description><link>http://www.secuobs.com/revue/news/99153.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99153.shtml</guid></item>
<item><title>Dan Kaminsky DNS Bug: nifty video</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - This is a great video though I'm not sure who to credit Anyway it'sDan's DNS bug exploited in msfconsole as per usual, but the cool thingis that the video goes further by showing how to garner a shell afterpoisoning the DNS server The victim tries updating Java through a GUIinterface to javasuncom, where the cache is poisoned and serving anevil record The attacker can even insert their own text through theJava update toolslicker than snot * Dan Kaminsky DNS CachePoisoning Attack o play video o download video</description><link>http://www.secuobs.com/revue/news/99152.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99152.shtml</guid></item>
<item><title>9 additions to the kinqpinz arsenal</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - * DBAN Darik's Boot et Nuke ¦ dban-107_i386tarbz2 ¦ secure harddrive destruction CD image * digsig ¦ digsig-15-revtarbz2 ¦Linux kernel module ELF executable RSA signature verification * dsi ¦dsi-03tarbz2 ¦ Linux cluster security framework * fail2ban ¦fail2ban-083tarbz2 ¦ bans excessive remote login attempts *graphviz ¦ graphviz-2202tarbz2 ¦ visual data representation *pandora fms ¦ pandorafms-131-coretarbz2 ¦ advanced monitoringsystem * quanta ¦ quanta-359tarbz2 ¦ development environment forWeb coders * slurm ¦ slurm-136tarbz2 ¦ resource managementutility * webdot ¦ webdot-216tarbz2 ¦ CGI script for convertingdot scripts into Web-friendly images</description><link>http://www.secuobs.com/revue/news/99151.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99151.shtml</guid></item>
<item><title>Nav tweak; an Assembly zine; programming for hackers; MACs; counterterrorism; oh, my</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I've added the library navigation above, as you see I didn't like allthe clicking involved to get to an ezine Anyway here are a fewadditions to the library Assembly Programming Journal zine **download An Introduction to Programming for Hackers MAC addresslistings by manufacturer The Counterterrorism Handbook: Tactics,Procedures, et Techniques</description><link>http://www.secuobs.com/revue/news/99150.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99150.shtml</guid></item>
<item><title>arsenal jQuery; YAML; ttyrpld</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * jQuery 126min o jquery-126mintarbz2 o awesome JS framework *TTYRPLD 251 o ttyrpld-251tarbz2 o Linux key/screen logger * YAMLYet Another Multicolumn Layout 306_080609 o yaml-306_080609tarbz2o XHTML/CSS flexible layout framework</description><link>http://www.secuobs.com/revue/news/99149.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99149.shtml</guid></item>
<item><title>feeds HelpNetSecurity, Holistic Infosec, PacketStorm,  USB Hacks</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Help Net Security * Holistic Infosec * Packet Storm SecurityAdvisories * Packet Storm Security Exploits * Packet Storm SecurityHeadlines * Packet Storm Security Tools * USB Hacks</description><link>http://www.secuobs.com/revue/news/99148.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99148.shtml</guid></item>
<item><title>PHP filesize functions</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Far too often professionals in the technological field use excessiveverbage to make a seemingly straightforward topic far too complicatedthan is necessary The same is often true, at least in this case, oftheir programming abilities This is where we insert the snidecomment about my own abilities Forget it, it's not important Theability to speak succinctly is a unique talent, no matter the languageor medium I've had English majors as instructors that tore my writtenpapers apart, while at the same time their lectures were off-topic orrarely got the point across Program code is amazing to me andalthough I am always working on my skills, I find solice in the leastamount of input for the greatest output Following I have three commonroutines that show a progression of programming capability, rangingfrom amateurish to professional Web people use functions like theseall the time The final output is typically identical though theimplementations can differ greatly as this example illustrates It isa bit of source code that I originally found in The PHP Anthology, abook I paid entirely too much for actually didn't download, go meThe egos from these so-called "world-class developers", the authors,tout their egos up a bit with this text taken directly from the book:Five world-class developers guide you through the remarkablecapabilities of PHP using countless examples of best- practiceprogramming Right, let's put it to the test, em Since PHP'sfilesize function returns nothing useful for humans, we use anotherroutine to format the final result for some tangible application,namely "162kB", rather than "1661" Check out this BEST PRACTICEPROGRAMMING routine function fileSizeUnit $size  { if $size =1073741824  { $size=number_format  $size / 1073741824 ,2 ;$unit='GB'; } elseif $size = 1048576  { $size=number_format $size / 1048576 ,2 ; $unit='MB'; } elseif $size = 1024  {$size=number_format  $size / 1024 ,2 ; $unit='KB'; } elseif $size= 0  { $unit='B'; } else { $size='0'; $unit='B'; } return array'size'=$size,'unit'=$unit ; } It's a mess, returning an array thatover-complicates my usage of its output The sheer number ofcomparisons is ridiculous Nearly every value is hard-coded and allover the place, making quick edits a fucking nightmare So because Ineeded a function like this back when I bought the book I resorted tothe resources available in the PHP manual online The usercontributions can sometimes be spectacular Here is a perfect reasonof why this is so function get_size $size  { $bytes=array'B','KB','MB','GB','TB' ; foreach $bytes as $val  { if $size 1024  { $size=$size / 1024; } else { break; } } return round $size,2$val; } This function begins to illustrate the only requirement forformatting the size passed to it: divide until less than 1,024Nothing else to do but assign a string value from the handy array thatis easily understood I was very happy with this until I stumbledacross this, which appeared some time later function bytestostring$size,$precision = 0  { $sizes=array'YB','ZB','EB','PB','TB','GB','MB','kB','B' ; $total=count $sizes ;while $total-- etet $size  1024  $size /= 1024; return round$size,$precision $sizes$total; } With this routine there is theadded complexity of using precision for how defining close you wish toround the returned value, and yet it is miles ahead of other routinesI've gone through There are more but these three functions stood outthe most to me You can see here that the final result is identicalexcept for the returned array from the Anthology freaks %/filesizesphp fileSizeUnit: Array size = 157 unit = KBget_size: 132KB bytestostring: 132kB I've been going back overthings I wrote when beginning PHP and starting from scratch, so Iappreciate the obsession and desire put into perfecting code I don'ttake credit for any of these functions - the authors are acknowledgebelow where you can download these things and jack around with 'emfilesizesrgb o/usr/bin/php 157 unit = KB get_size: 132KBbytestostring: 132kB */ function fileSizeUnit $size  { /* PHPAnthology: "Five world-class developers guide you through theremarkable capabilities of PHP using countless examples of best-practice programming" */ if $size = 1073741824  {$size=number_format  $size / 1073741824 ,2 ; $unit='GB'; } elseif$size = 1048576  { $size=number_format  $size / 1048576 ,2 ;$unit='MB'; } elseif $size = 1024  { $size=number_format  $size /1024 ,2 ; $unit='KB'; } elseif $size = 0  { $unit='B'; } else {$size='0'; $unit='B'; } return array 'size'=$size,'unit'=$unit ; }function get_size $size  { /* marcel-hergerdt dot de */ /*http://us3phpnet/manual/en/functionfilesizephp */ $bytes=array'B','KB','MB','GB','TB' ; foreach $bytes as $val  { if $size 1024  { $size=$size / 1024; } else { break; } } return round $size,2$val; } function bytestostring $size,$precision = 0  { /*php-manual at gone dot nl */ /*http://us3phpnet/manual/en/functionfilesizephp */ $sizes=array'YB','ZB','EB','PB','TB','GB','MB','kB','B' ; $total=count $sizes ;while $total-- etet $size  1024  $size /= 1024; return round$size,$precision $sizes$total; } $f="/filesizesphp"; print"fileSizeUnit: " fileSizeUnit filesize $f  ; print "get_size: "get_size filesize  $f  ; print "bytestostring: "bytestostringfilesize  $f ,2 ; print ""; </description><link>http://www.secuobs.com/revue/news/99147.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99147.shtml</guid></item>
<item><title>Free Software Foundation; GNU Other news</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - These are three feeds from the Free Software Foundation They also maketwo others available from GNUorg but my parser doesn't like them IfI can get around that I'll get them up, too * Free SoftwareFoundation Blogs * Free Software Foundation Jobs in Free Software *Free Software Foundation News After tonight's class I am officially agraduate My four year degree is in computer security I'll beactively seeking work in the coming weeks so if you are a recruiterplease have a look around the site and get in touch with me I'm inColorado I'd also like to mention how completely awesome Quanta isAfter sitting down to tweak my settings I found an option I've beenlooking for in all my other editors: auto-bracketing Useful forcompleting any open , , {}, "", and '' Also in the awesomecategory is openSUSE 11 and madwifi's ath5k wireless driver that hasSIGNIFICANTLY improved the performance of my Netgear card The APsaround me simply didn't have a chance, thanks, aircrack-ng ;</description><link>http://www.secuobs.com/revue/news/99146.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99146.shtml</guid></item>
<item><title>sponger</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Introducing sponger, a YouTube video leecher There are plenty of similartools available for Windows platforms but very few _functional_ onesfor Linux, especially command line versions This is a script writtenin PHP that downloads as many playlists or videos as you wish fromYouTube This is what to expect % /spongerphp sponger a youtubevideo leecher https://kinqpinzinfo/ -v Video mode Supply as manyvideo URLs to be leeched http://wwwyoutubecom/watchv=xxxxxxxxxxx-p Playlist mode Supply as many playlist URLs to be leechedhttp://wwwyoutubecom/view_play_listp=xxxxxxxxxxxxxxxxhttp://wwwyoutubecom/view_play_listp=xxxxxxxxxxxxxxxxetpage=x %/spongerphp -v   http://wwwyoutubecom/watchv=T8cf7tPoN5o  http://wwwyoutubecom/watchv=H8oQBYw6xxc  http://wwwyoutubecom/watchv=FFOEZh1Lbbg  http://wwwyoutubecom/watchv=1Vjng9zClNw  http://wwwyoutubecom/watchv=9-azBDt0kik  http://wwwyoutubecom/watchv=ckP8msIgMYE SPONGER Video modeSPONGER Downloading 6 total videos SPONGER 0YouTube_-_Pulpos:_suave_inteligencia_Octopus_intelligenceflvT8cf7tPoN5o LEECHED SPONGER 1YouTube_-_The_Indonesian_Mimic_Octopusflv H8oQBYw6xxc LEECHEDSPONGER 2 YouTube_-_Giant_Octopus_Eats_Sharks_at_AquariumflvFFOEZh1Lbbg LEECHED SPONGER 3YouTube_-_Frogfish_attack_shrimp_-_Pejesapo_cazando_camaronflv1Vjng9zClNw LEECHED SPONGER 4YouTube_-_Octopus_escaping_through_a_one_inch_holeflv 9-azBDt0kikLEECHED SPONGER 5 YouTube_-_octopusflv ckP8msIgMYE LEECHEDSPONGER Sponged in 37110035991669 seconds time % /spongerphp -phttp://wwwyoutubecom/view_play_listp=397EFC42D210D5E3 SPONGERPlaylist mode SPONGER Downloading 6 total videos in _sponger firstpage 397EFC42D210D5E3 SPONGER 0_sponger-YouTube_-_Pulpos:_suave_inteligencia_Octopus_intelligenceflvLEECHED SPONGER 1_sponger-YouTube_-_The_Indonesian_Mimic_Octopusflv LEECHED SPONGER2 _sponger-YouTube_-_Giant_Octopus_Eats_Sharks_at_AquariumflvLEECHED SPONGER 3_sponger-YouTube_-_Frogfish_attack_shrimp_-_Pejesapo_cazando_camaronflvLEECHED SPONGER 4_sponger-YouTube_-_Octopus_escaping_through_a_one_inch_holeflvLEECHED SPONGER 5 _sponger-YouTube_-_octopusflv LEECHEDSPONGER Sponged in 37278487205505 seconds time % In video mode youspecify the video URL in the form ofhttp://wwwyoutubecom/watchv=xxxxxxxxxxx In playlist mode youspecify the playlist URL in the form ofhttp://wwwyoutubecom/view_play_listp=xxxxxxxxxxxxxxxx thoughsponger can still download the video/playlist if they are not in thisform your shell dislikes unescaped ampersands so long as you do "et"for extraneous URL parametershttp://wwwyoutubecom/watchv=xxxxxxxxxxxetfeature=xhttp://wwwyoutubecom/view_play_listp=xxxxxxxxxxxxxxxxetpage=xsponger can be found on my code page</description><link>http://www.secuobs.com/revue/news/99145.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99145.shtml</guid></item>
<item><title>Web 20 #8</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Web 20 #8 + HTTP Basic Authentication</description><link>http://www.secuobs.com/revue/news/99144.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99144.shtml</guid></item>
<item><title>arsenal tsocks</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * tsocks 18 o tsocks-18tarbz2 o SOCKS proxy server</description><link>http://www.secuobs.com/revue/news/99143.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99143.shtml</guid></item>
<item><title>video Animator vs Animation</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Animator vs Animation o play video o download</description><link>http://www.secuobs.com/revue/news/99142.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99142.shtml</guid></item>
<item><title>video Surfjack</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Hijack Gmail HTTPS connections with surfjacking o download</description><link>http://www.secuobs.com/revue/news/99141.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99141.shtml</guid></item>
<item><title>PFSense DHCP Vuln</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Behind Enemy Lines o white paper for PFSense DHCP script injectionvulnerability * video demo o play video o download</description><link>http://www.secuobs.com/revue/news/99140.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99140.shtml</guid></item>
<item><title>Site was down</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Or actually still is as I write this but will be back tomorrow morningafter I replace my modem that took a major crap on me this weekendLast month's entries can be found here</description><link>http://www.secuobs.com/revue/news/99139.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99139.shtml</guid></item>
<item><title>arsenalPHPIDS; sharefuzz; SPIKE; SSIDAttack; Yasm</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * PHPIDS 052 ¦ phpids-052tarbz2 ¦ PHP IDS for WAFs * Sharefuzz10 ¦ sharefuzz-10tarbz2 ¦ an aging fuzzer still worth discovering* SPIKE 28 ¦ spike-28tarbz2 ¦ advanced fuzzer presented atBlackHat * SSIDAttack 002 ¦ ssidattack-002tarbz2 ¦ used forwireless code injection * Yasm 071 ¦ yasm-071tarbz2 ¦ the NASMsuccessor</description><link>http://www.secuobs.com/revue/news/99138.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99138.shtml</guid></item>
<item><title>feeds Stefan Esser</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Stefan Esser's feed has been added</description><link>http://www.secuobs.com/revue/news/99137.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99137.shtml</guid></item>
<item><title>feeds 2600</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The 2600: The Hacker Quarterly feed has been added</description><link>http://www.secuobs.com/revue/news/99136.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99136.shtml</guid></item>
<item><title>arsenal mod_evasive; reDuh</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * mod_evasive 1101 | mod_evasive-1101tarbz2 | Apache module forthwarting brute-force/DoS/DDoS attacks * reDuh 02 |reduh-02tarbz2 | for exploiting Web-based holes to the fullestextent</description><link>http://www.secuobs.com/revue/news/99135.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99135.shtml</guid></item>
<item><title>video DNS global infection in HD</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Global breakout in HD of Kaminsky's DNS bug | download | from Dan'sblog</description><link>http://www.secuobs.com/revue/news/99134.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99134.shtml</guid></item>
<item><title>library Guerrilla warfare; PHP hacking; Linux rogue AP; SHA; MIT banned presentation; HTML attack</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Anatomy of a Subway Hack banned presentation ¦ download *Comparative Analysis of the Hardware Implementations of Hash FunctionsSHA-1 et SHA-512 ¦ download * Linux Rogue Access Point How-To ¦download * PHP: Hackers Paradise ¦ download * Psychological Operationsin Guerrilla Warfare ¦ download * The Extended HTML Form AttackRevisited ¦ download</description><link>http://www.secuobs.com/revue/news/99133.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99133.shtml</guid></item>
<item><title>library Samurai 01 Live CD</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I can't vouch for how useful it is compared to BT3 so try it out, drawyour own conclusions, and I've provided the list of apps from theauthor's site * Samurai 01 - download Samurai comes with a host ofuseful applications These include many of the regular Linux tools butalso include: * Burp Suite, a web application attacking tool *DirBuster, an application file and directory enumeration and bruteforcing tool from OWASP * Fierce Domain Scanner a target ennumerationutility * Gooscan an automated Google querying tool that is useful forfinding CGI vulnerabilities without scanning the target directly, butrather querying Google's caches * Grendel-Scan, just released, an opensource web application vulnerability testing tool * HTTP_Print a webserver fingerprinting tool * Maltego CE, an open source intelligenceand forensics application that does data mining to find informationfrom the internet and link it together great for background researchon a target * Nikto, an open source web server scanner * Paros, oneof my favorite, Java based, cross platform, web application auditingand proxy tools * Rat Proxy, a semi-automated, passive web applicationsecurity audit tool * Spike Proxy, an extensible web applicationanalyzer and vulnerability scanner * SQLBrute, a SQL injection andbrute forcing tool * w3af and the GUI, a web application attack andaudit framework * Wapiti, a web application security auditor andvulnerability scanner * WebScarab, an HTTP application auditing toolfrom OWASP * WebShag, a web server auditing tool * ZenMap, a NMAPgraphical front end Additionally Samurai includes several utilitiesthat aren't available from the GUI menu These include: * dnswalk, aDNS query and zone transfer tool * httping, a ping like utility forHTTP requests * httrack, a website copying utility * john the ripper,a password cracking program * netcat, a TCIP/IP swiss army knife *nmap, a port scanner and OS detection tool * siege, an HTTP stresstester and benchmarking tool * snarf, a lightweight URL fetchingutility and many others Of course, all of these tools could easily beinstalled on your own Linux based machine, but having a live CD withthe tools installed and pre configured is quite nice Samurai alsocomes with Wine installed, which is handy if you want to run somewindows based tools off of the distribution</description><link>http://www.secuobs.com/revue/news/99132.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99132.shtml</guid></item>
<item><title>arsenal Cheops-ng; Stunnel</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Cheops-ng 023 | cheops-ng-023tarbz2 | active network recon tool* Stunnel 425 | stunnel-425tarbz2 | network connection encryptionvia SSL libraries</description><link>http://www.secuobs.com/revue/news/99131.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99131.shtml</guid></item>
<item><title>SEPTEMBER 23RD</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I can't believe your site doesn't sat happy birthday momgeeze HAPPYBIRTHDAY, MOM ;</description><link>http://www.secuobs.com/revue/news/99130.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99130.shtml</guid></item>
<item><title>feeds Evil Mad Scientists</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Evil Mad Scientist Laboratories feed has been added</description><link>http://www.secuobs.com/revue/news/99129.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99129.shtml</guid></item>
<item><title>library MySQL tut; UNIX regexp ref; Bash intro; Neal Stephenson, shhh</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Bash Programming Introduction How-To ¦ download ¦ * In theBeginningWas the Command Line ¦ download ¦ * MySQL Tutorial ¦download ¦ * Searching for Files on UNIX ¦ download ¦</description><link>http://www.secuobs.com/revue/news/99128.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99128.shtml</guid></item>
<item><title>PHP syntax highlighting in enscript</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The GNU util enscript is a tool for converting bits into PostScriptformat, though it is also excellent for highlighting code rendered inHTML I've been using it to convert my wargames with code samples Bydefault, enscript does not support PHP though this is quicklyremedied The pertinent data from this page is used below as well asthe provided st highlighting definition file for PHP: phpst Add afew rules to /usr/share/enscript/hl/enscriptst and you, too, can makepurty PHP/HTML documents Add the following two lines in their definedblocks /usr/share/enscript/hl/enscriptst  namerules/php|php3$/ php; /usr/share/enscript/hl/enscriptst startrules /^php/ php; and you're done So rules are now inplace for PHP/PHP3 extensions and will be highlighted according to theopening PHP tag, " " exit 65 fi enscript --pretty-print=$1 --color--language=html $2 -o $3 -t "$2"</description><link>http://www.secuobs.com/revue/news/99127.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99127.shtml</guid></item>
<item><title>feeds TS/SCI Security</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The TS/SCI Security feed has been added</description><link>http://www.secuobs.com/revue/news/99126.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99126.shtml</guid></item>
<item><title>library New legal/law section</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - A new section has been added to the library for legal and law issuesBelow is a list of important acts and regulations for the US andabroad concerning computers and technology These documents are spreadacross the net and can be difficult to come by in one place theLibrary of Congress, for example, only serves up files for downloadwhen they're available, so I shall build my own collection Take yourtime to go through them  read everything  let it marinate *Chemical Weapons Convention | download * Children's Online PrivacyProtection Act of 1998 COPPA | download * Computer Fraud et Abuse Actof 1986 | download * Computer Misuse Act of 1990 | download * DataProtection Act of 1998 | download * Digital Millennium Copyright Actof 1998 | download * E-Government Act of 2002 | download * FederalInformation Security Management Act of 2002 FISMA | download * GNUGeneral Public License Version 30 | download * GNU Lesser GeneralPublic License Version 30 | download * No Electronic Theft Act of1997 NET | download * Regulation of Investigatory Powers Act of 2000| download * Telecommunications Act of 1996 | download * UniformComputer Information Transactions Act of 1999 UCITA | download * USAPatriot Act of 2001 | download</description><link>http://www.secuobs.com/revue/news/99125.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99125.shtml</guid></item>
<item><title>kinqpinzinfo shall be down</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Temporarily, at least until the server meets its new home I haven'tdecided just when I'm pulling the plug or how long it will take toestablish a connection back to the net at the new place Suffice it tosay that on Tuesday and Wednesday we are moving and the usual politicsinvolved with maintaining a spiffy website from home will be evidentSee you cyber freaks on the other side ;</description><link>http://www.secuobs.com/revue/news/99124.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99124.shtml</guid></item>
<item><title>2 new library categories ;</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I'm far too sore from moving to link up all the documents from these twonew sections, so just go check them out * Cryptography * MathematicsSome of the content may overlap a bit so keep abreast To be honestneither of these fields are of great interest to me and only existhere due to the request from a very special person Mathematicsnew-fibonacci-and-lucas-primesdubner, kellerpdfon-euclid's-algorithm-and-the-computation-of-polynomial-greatest-common-divisorswsbrownpdf sieve-of-eratosthenesyoder, smithpdfthe-fibonacci-sequenceredwoodscccauspdf Cryptographya-mathematical-theory-of-communicationce shannonpdfa-method-for-obtaining-digital-signatures-for-public-key-cryptosystemsrivest,shamir, adlemanpdf cryptography-and-computer-privacyhorstfeisteltarbz2 new-directions-in-cryptographydiffie, hellmanpdfsecure-communications-over-insecure-channels-based-on-short-authenticated-stringssergevaudenaypdf variant-key-matrix-cipher-systemhorst feisteltxt Lastmonth's entries can be found here</description><link>http://www.secuobs.com/revue/news/99123.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99123.shtml</guid></item>
<item><title>arsenal Bashish; DenyHosts; OpenStego; projectM</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Bashish 207 | bashish-207tarbz2 | fancy shell prompt changingmagic * DenyHosts 26 | denyhosts-26tarbz2 | block repeated failedremote access attempts to SSH services * OpenStego 050 |openstego-050tarbz2 | stego tool that supports password-basedcrypto and plugins * projectM 120 | projectM-120tarbz2 | musicvisualization libraries - this is just the core, download thecorresponding library for your music player from the official site</description><link>http://www.secuobs.com/revue/news/99122.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99122.shtml</guid></item>
<item><title>feeds Coding Horror; Stack Overflow</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Coding Horror and Stack Overflow feeds have been added</description><link>http://www.secuobs.com/revue/news/99121.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99121.shtml</guid></item>
<item><title>givesomeheadphp = HTTP HEAD requests  PHP sockets</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Okay, so this was more of an experiment for me in learning PHP socketsthat led to writing up another tool I sat down tonight lookingthrough the documentation online, both on PHPnet and what others havedone with them, and the reality is scarce Not a lot of people seem tobe using socket functionality with PHP since they don't really have tofor common tasks Really, I could have released this silly scriptwithout using sockets but now I can say that I understand them betterbecause I have employed them Besides, now with them in place it wouldnot be difficult to add in strange options with some low-level packetcrafting voodoo givesomehead - perform HEAD requests for all thelucky johns This is nothing groundbreaking - just another approach todetermining a particular Web server's response headers The same canbe done with netcat, sbd, socat, telnet, and the like What is nice isthat for anybody else interested in seeing live and functionaldemonstrations of PHP sockets, they now have one more resource fordoing just so Let's see what it does You can begin by runningagainst a single server to view its headers in response to "HEAD /HTTP/11" % /givesomeheadphp kinqpinzinfo givesomehead -perform HEAD requests for all the lucky johns https://kinqpinzinfo/kinqpinzinfo 249255173 HTTP/11 403 Forbidden Date: Sat, 18 Oct2008 08:58:18 GMT Server: oct0pus Connection: close Content-Type:text/html; charset=iso-8859-1 That's all good and well We see somevaluable information pertaining to the server - but say you want tofingerprint more than one server Spiffy % for i in kinqpinzinfokinqpinzorg kinqpinzcom; do /givesomeheadphp $i; done givesomehead- perform HEAD requests for all the lucky johns kinqpinzinfo249255173 HTTP/11 403 Forbidden Date: Sat, 18 Oct 2008 08:06:49GMT Server: oct0pus Connection: close Content-Type: text/html;charset=iso-8859-1 givesomehead - perform HEAD requests for all thelucky johns kinqpinzorg 249255173 HTTP/11 401 AuthorizationRequired Date: Sat, 18 Oct 2008 08:06:49 GMT Server: oct0pusWWW-Authenticate: Basic realm="KINQPINZORG IS BEING COMPLETELYREWRITTEN RETURN LATER THIS WEEK" Vary:accept-language,accept-charset,Accept-Encoding Accept-Ranges: bytesConnection: close Content-Type: text/html; charset=iso-8859-1Content-Language: en givesomehead - perform HEAD requests for all thelucky johns kinqpinzcom 249255173 HTTP/11 200 OK Date: Sat, 18Oct 2008 08:06:49 GMT Server: oct0pus Set-Cookie:KINQPINZ=aB0HaSfVjSBhol-wHI9nfVXuWlyW_XRR7-Ay654QmTbabC639brWZXmKtxWX3xEo;expires=Sat, 18 Oct 2008 09:06:49 GMT; path=/; secure; HttpOnlyExpires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store,no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cacheVary: Accept-Encoding Connection: close Content-Type: text/html Usinga terminal to do this rather than implementing an if-elseif-else orcase-switch-default in PHP truly allows me to be as lazy as possible -the Doritos and bean dip beckon, man So I think we can agree thatverbose output is not the way to go when fingerprinting multipleboxes Perhaps we simply wish to check their server and/or serverversion where applicable % for i in kinqpinzinfopacketstormsecurityorg astalavistacom milw0rmcom; do/givesomeheadphp $i; done|grep Server Server: oct0pus Server: ApacheServer: LiteSpeed Server: Apache Okay, but if you run against morethan a few servers you quickly lose track of what corresponds to whatLet's fix that % for i in kinqpinzinfo packetstormsecurityorgastalavistacom milw0rmcom; do /givesomeheadphp $i | grep Server |echo "$i is running "`gawk '{print $2}'`; done kinqpinzinfo isrunning oct0pus packetstormsecurityorg is running Apacheastalavistacom is running LiteSpeed milw0rmcom is running ApacheAhhh  that's better gawk is awesome by the way, so much to stilldiscover Most if not all servers respond differently to HEAD,particularly using HTTP/11, so why not see what it says about ourrequest % for i in kinqpinzinfo kinqpinzorg kinqpinzcom; do/givesomeheadphp $i; done|grep HTTP HTTP/11 403 Forbidden HTTP/11401 Authorization Required HTTP/11 200 OK As you can see,kinqpinzinfo rejects HEAD; kinqpinzorg is currently undermaintenance so an authorization dialog is in place; and, kinqpinzcomreally has nothing to complain about The same can be done here forclarity when it comes to making sense of the output % for i inkinqpinzinfo packetstormsecurityorg astalavistacom milw0rmcom; do/givesomeheadphp $i | grep HTTP | echo "$i responded with "`gawk'{print $1 " " $2}'`""; done kinqpinzinfo responded with HTTP/11403 packetstormsecurityorg responded with HTTP/11 200astalavistacom responded with HTTP/11 200 milw0rmcom respondedwith HTTP/11 200 I'm still stuck on this whole "use Linux foreverything possible rather than relying on third party tools" kicksince writing about Fort Knox Hopefully this helps to gain someground using PHP sockets and even if it doesn't, a couple more linesin Bash or the PHP source itself is all it would take to turn thissucker into a true blue security testing utility: fuzzer, scanner,brute-force, denial-of-service - yahoo * givesomehead | examples andoutput | source</description><link>http://www.secuobs.com/revue/news/99120.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99120.shtml</guid></item>
<item><title>arsenal Code::Blocks; Fluxbox; Logstalgia; LZMA Utils; SDL</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Code::Blocks 802-src - codeblocks-802-srctarbz2 - a feature-richeditor and development environment * Fluxbox 111 -fluxbox-111tarbz2 - the best lightweight X window manager *Logstalgia 091 - logstalgia-091tarbz2 - a pong-like simulatorfor viewing Apache log files * LZMA Utils 4327 -lzma-4327tarbz2 - the latest in compression, expect to see more ofthis there is a tar patch similar to bz2/gz * Simple DirectmediaLayer SDL 1213 - sdl-1213tarbz2 - libraries for hardwareaccess plus more</description><link>http://www.secuobs.com/revue/news/99119.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99119.shtml</guid></item>
<item><title>library PHP sockets; exploitation challenges; regular expressions; Linux reference; Unicode; IRC</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Abusing PHP Sockets for Fun et Profit - download * Buffer Overflows etFormat String Challenges - download * Regular Expression PocketReference - download * Sed et Awk - download * Socket Reference -download * TCP/IP Internetworking With Gawk - download * TrackingHackers on IRC - download * Unicode Fun - download</description><link>http://www.secuobs.com/revue/news/99118.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99118.shtml</guid></item>
<item><title>An update on things</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I am starting work and jumping on the live CD bandwagon to create a fullybootable openSUSE Linux environment for kinqpinzinfo My success withthe DVD I have for sale is lackluster, therefore I am on the fence asto whether or not I will continue trying to sell it If I opt not to,this live CD I am creating will be a platform of all the toolsavailable on this site as well as the full videos and texts in oneconvenient bootable diskette: for free Likely this shall be my courseof action, pending space requirements, because I think more of us canbenefit from another dedicated live CD It will be an interestingproject, indeed I have received numerous positive remarks from mypeers and no doubt this addition can only be another plus for thekinqpinz camp I have a plethora of additions, mostly in the form oflibrary texts, to add My main focus as of late has been in the worldof Web design I'm searching around for clients and interestingprojects that I can benefit from, financially and technically Contactme if you've got one I'm still debating on whether or not I want toinclude my Web development tutorials and such here, as this has mostlybeen a place for literature, programming dissection, tools, andstrange security musings I took the server down the other day andadded a bit of additional storage, thus adding to my overall storagescheme, which borders on the absurd It is partly because of this thatI have slowly been acquiring various rainbow tables and precomputingmy own tables for use with genpmk for cracking WPA/WPA2 I don't knowif anything will ever become of this but I'm still semi-curious inhosting a hash cracking utility, or at the very least a sort ofindexer available for cross-referencing hash to plain text and viceversa My overall satisfaction with the computing world mostly relieson having the ability to do whatever it is I set out to do, no matterthe sophistication These days I'm mostly working on accomplishingthat, by working with anything I can get my hands on and trying asmuch as possible Forums are always a great catalyst for seeking newprojects до свидания, ебёна мать</description><link>http://www.secuobs.com/revue/news/99117.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99117.shtml</guid></item>
<item><title>arsenal Afick; Angry IP Scanner; Blender; Crapto1; CSSHTTPRequest; Eterm; Feh; LibAST;  XSS-Proxy</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Another File Integrity Checker AFICK 2121 # afick-2121tarbz2 +Afick is a security tool, very close from the well known tripwire Itallows to monitor the changes on your files systems, and so can detectintrusions It's designed to be quick and portable For now, it hasbeen tested on Windows XP, 2000 with ActiveState's ActivePerl, LinuxRedHat 71, 73, Linux Fedora core 1, 6, 7, Linux mandrake 82,91, 92, 2005, 2006, 2007, 2008, Linux Suse Enterprise server 80,Linux Debian Woody, sarge, etch, Knoopix, Linux Slackware 91, HPTru64 Unix 51B, HPUX 11, and AIX 520, though it should work on anycomputer with Perl and its standard modules * Angry IP Scanner30-beta3 # angryipscanner-30-beta3tarbz2 + Angry IP Scanner orsimply ipscan is an open-source and cross-platform network scannerdesigned to be fast and simple to use It scans IP addresses and portsas well as has many other features It is widely used by networkadministrators and just curious users around the world, includinglarge and small enterprises, banks, and government agencies It runson Linux, Windows, and Mac OS X, possibly supporting other platformsas well * Blender 248-for-python-25 #blender-248-for-python-25tarbz2 + Blender is the free open source3D content creation suite, available for all major operating systemsunder the GNU General Public License for Windows 2000, XP, Vista, MacOS X PPC and Intel, Linux i386, Linux PPC, FreeBSD 54 i386,SGI Irix 65, and Sun Solaris 28 sparc * Crapto1 05 #crapto1-05tarbz2 + This project provides an implementation of thecrypto1 cipher This code implements the cryptography needed, todecrypt captured communications between crypto1 based tags andreaders And even recover the shared secret * CSSHTTPRequest N/A #csshttprequesttarbz2 + CSSHttpRequest CHR is a method forcross-domain AJAX using CSS for transport Similar to JavaScript, thisworks because CSS is not subject to the same-origin policy thataffects XMLHttpRequest Like JSONP, CSSHttpRequest is limited tomaking GET requests Unlike JSONP, untrusted third-party JavaScriptcannot execute in the context of the calling page * Eterm 095 #eterm-095tarbz2 + Eterm is a color vt102 terminal emulatorintended as a replacement for xterm It is designed with a freedom ofchoice philosophy, leaving as much power, flexibility, and freedom aspossible in the hands of the user It is designed to look good andwork well, but takes a feature-rich approach rather than one ofminimalism while still maintaining speed and efficiency Eterm workson Solaris, Linux, HP-UX, AIX, FreeBSD, and just about any otherflavor of UNIX out there It works on any window manager/desktopenvironment, including AfterStep, BlackBox, 4DWM, CDE, KDE, GNOME,fvwm, and even twm, although it is designed to work and integrate bestwith Enlightenment * Feh 134 # feh-134tarbz2 + Feh is an imageviewer at heart, though it does other cool stuff including simpleimage viewing, multiple image viewing slideshow, multiple imageviewing in multiwindows, image viewing in fullscreen, image list mode,loadable/unloadable listing, recursive file opening, sorting of thefilelist, saving/loading filelists, loading images via HTTP, reloadingafter delay, montage creation, collage creation, index print creation,thumbnail browser, in-place editing, background setting, dynamiczooming, panning, rotation, smooth/sharpen, key or mouse control,context menus, and caption overlays * Library of Assorted SpiffyThings LibAST 07 # libast-07tarbz2 + As its name suggests,LibAST is a collection of various functions, macros, etc, which doall sorts of spiffy stuff * XSS-Proxy 0012 #xss-proxy-0012tarbz2 + XSS-Proxy is a tool for leveraging crosssite scripting XSS flaws to hijack victim browsers and allows abi-directional interactive control channel between attacker, victimbrowser, and an XSS vulnerable site</description><link>http://www.secuobs.com/revue/news/99116.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99116.shtml</guid></item>
<item><title>Rollin' to November</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Last month's entries can be found here</description><link>http://www.secuobs.com/revue/news/99115.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99115.shtml</guid></item>
<item><title>Feed update</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I have rewritten the feeds page using the jQuery facebox plugin Thishelps me in maintaining cross-browser compliance and a bit of acleaner effect than what I previously had It took a bit of work asthe facebox plugin does not natively implement $post, so a small workaround was implemented, which, now after looking at it, is not asdifficult as my night's work would suggest Anyway, I'll likely do aquick intro to this on webninjakinqpinzorg Cheers</description><link>http://www.secuobs.com/revue/news/99114.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99114.shtml</guid></item>
<item><title>library EmErgE's MultiISO DVD</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * EmErgE's MultiISO DVD o download + MultiISO LiveDVD is an integratedlive DVD technology which combines some of the very popular live CDISOs already available on the Internet It can be used for securityreconnaissance, vulnerability identification, penetration testing,system rescue, media center and multimedia, system recovery, etc It'san all-in-one multipurpose LiveDVD put together There's something init for everyone I hope you enjoy it MultiISO LiveDVD Version 10consists of Back|Track 3, Damn Small Linux DSL 425, GeeXboX 11,Damn Vulnerable Linux Strychnine 14 edition, Knoppix 511, MPentoo20061, Ophcrack 122 remastered to contain SSTIC04-5k 720MB tablesets, Puppy Linux 301, and last but not least Byzantine OSi586-20040404</description><link>http://www.secuobs.com/revue/news/99113.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99113.shtml</guid></item>
<item><title>arsenal Hadoop; Pyrit; Synergy; THC IPv6 Attack Toolkit</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Hadoop 0182 o hadoop-0182tarbz2 + The Apache Hadoop projectdevelops open-source software for reliable, scalable, distributedcomputing * Pyrit N/A o pyrittarbz2 + Pyrit takes a step ahead inattacking WPA-PSK and WPA2-PSK, the protocol that today de-factoprotects public WIFI-airspace The project's goal is to estimate thereal-world security provided by these protocols Pyrit does notprovide binary files or wordlists and does not encourage anyone toparticipate or engage in any harmful activity This is a researchproject, not a cracking tool Pyrit's implementation allows to createmassive databases, pre-computing part of the WPA/WPA2-PSKauthentication phase in a space-time-tradeoff The performance gainfor real-world-attacks is in the range of three orders of magnitudewhich urges for re-consideration of the protocol's securityExploiting the computational power of GPUs, this is currently by farthe most powerful attack against one of the world's most used securityprotocols Pyrit is free software - free as in freedom Everyone caninspect, copy or modify it and share derived work under the GNUGeneral Public License v3 * Synergy 131 o synergy-131tarbz2 +Synergy lets you easily share a single mouse and keyboard betweenmultiple computers with different operating systems, each with its owndisplay, without special hardware It's intended for users withmultiple computers on their desk since each system uses its ownmonitors Redirecting the mouse and keyboard is as simple as movingthe mouse off the edge of your screen Synergy also merges theclipboards of all the systems into one, allowing cut-and-paste betweensystems Furthermore, it synchronizes screen savers so they all startand stop together and, if screen locking is enabled, only one screenrequires a password to unlock them all Learn more about how it worksSynergy is open source and released under the GNU Public LicenseGPL * THC IPv6 Attack Toolkit 06 othc-ipv6-attack-toolkit-06tarbz2 + THC is proud to be the first whoare releasing a comprehensive attack toolkit for the IPv6 protocolsuite It comprises of state-of-the-art tools for alive scanning,man-in-the-middle attacks, denial-of-service, etc, which exploitinherent vulnerabilities in IPv6 Included is a fast and easy to usepacket crafting library to create your own attack tools</description><link>http://www.secuobs.com/revue/news/99112.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99112.shtml</guid></item>
<item><title>library ASM Linux programming; C sockets; ARP amplification</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Attacking the Code: Source Code Auditing - download * Linux AssemblyLanguage Programming - download * TCP/IP Sockets in C: Practical Guidefor Programmers - download * The Art of ARP Amplification - download *The Assembly Programming Master Book - download</description><link>http://www.secuobs.com/revue/news/99111.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99111.shtml</guid></item>
<item><title>feeds Apokalyptik; JBrownSec</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Apokalyptik and JBrownSec feeds have been added</description><link>http://www.secuobs.com/revue/news/99110.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99110.shtml</guid></item>
<item><title>arsenal browserfuzzer; domainraider; eggdrop; mptrey; mysqlfuzzer; pdffuzzer; samhain; sshfuzz; tftpdaemonfuzzer;  zerodayfuzzer</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Browserfuzzer N/A o browserfuzzertarbz2 + Browserfuzzer is a Webbrowser fuzzing tool targeting HTML and JavaScript * Domain RaiderN/A o domainraidertarbz2 + Domain Raider is a brute-forcing utilityto find a target's sub-domains * Eggdrop 1619 oeggdrop-1619tarbz2 + Eggdrop is the world's most popular OpenSource IRC bot, designed for flexibility and ease of use, and isfreely distributable under the GNU General Public License GPL Somefeatures of Eggdrop include: designed to run on Linux, *BSD, SunOs,Windows, Mac OS X, etc; eExtendable with Tcl scripts and/or Cmodules; support for the big five IRC networks Undernet, DALnet,EFnet, IRCnet, and QuakeNet; the ability to form botnets and sharepartylines and userfiles between bots Some benefits of Eggdropinclude: the oldest IRC bot still in active development Eggdrop wascreated in 1993; established IRC help channels and web sitesdedicated to Eggdrop; thousands of premade Tcl scripts and C modules;and best of allit's FREE * mpTREY N/A o mptreytarbz2 + mpTREY isa MP3 fuzzing utility written in Perl that manipulates tags *mySQLFUZZer N/A o mysqlfuzzertarbz2 + Quick little MySQL fuzzingutility that creates sockets and fuzzers on the fly * pdffUZZ N/A opdffuzzertarbz2 + A PDF fuzzing utility written in Perl * Samhain250 o samhain-250tarbz2 + The samhain open source host-basedintrusion detection system HIDS provides file integrity checking andlogfile monitoring/analysis, as well as rootkit detection, portmonitoring, detection of rogue SUID executables, and hidden processesIt has been designed to monitor multiple hosts with potentiallydifferent operating systems, providing centralized logging andmaintenance, although it can also be used as standalone application ona single host Samhain is a multiplatform application for POSIXsystems Unix, Linux, Cygwin/Windows * SSHFuZZ N/A o sshfuzztarbz2+ SSHFuZZ is an SSH Fuzzing utility written in Perl that usesNet::SSH2 * TFTP Daemon Fuzzer N/A o tftpdaemonfuzzertarbz2 + ATFTP daemon fuzzing utility written in Perl * Zeroday Fuzzer 20-betao zerodayfuzzer-20-betatarbz2 + Zeroday Fuzzer is a network fuzzerthat supports many protocols and can do generic fuzzing as well It istrivial to add protocols to fuzz, just copy and modify the protocolsalready implemented</description><link>http://www.secuobs.com/revue/news/99109.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99109.shtml</guid></item>
<item><title>foothold - a Web leveraging utility</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - foothold is a Web-based PHP shell that allows for remote administrationon backdoored servers The script is currently capable of spitting outdetailed information relating to the victim's platform: PHP version,modules, include path, and configuration, DNS and socket information,server name, administrator, and signature, current script uid/gid +current user, available disk space, MySQLclient/server/protocol/database information, so forth You can try torestore safe mode to its default off state by uncommenting either ofthese lines at the top of the script // ini_restore "safe_mode" ;// ini_set "safe_mode","off" ; I left these out as they did not seemto make a difference on my setup YMMV Was fun to write, I enjoyedmyself foothold's intended use requires it to be running under anInternet-reachable directory - I only point this out as most of myscripts are CLI * foothold # download</description><link>http://www.secuobs.com/revue/news/99108.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99108.shtml</guid></item>
<item><title>Arsenal RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Welcome to the kinqpinz Hall of Arsenal RSS</description><link>http://www.secuobs.com/revue/news/99107.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99107.shtml</guid></item>
<item><title>arsenal FWBuilder 301, Hprobe 10, libfwbuilder 301,  Metasploit 32</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * FWBuilder 301 o fwbuilder-301tarbz2 + Firewall Builder is a GUIfirewall configuration and management tool that supports iptablesnetfilter, ipfilter, pf, ipfw, Cisco PIX FWSM, ASA and Ciscorouter extended access lists Firewall Builder uses an object-orientedapproach, it helps administrators maintain a database of networkobjects and allows policy editing using simple drag-and-dropoperations Being truly vendor-neutral, Firewall Builder can generateconfiguration file for any supported target firewall platform from thesame policy created in its GUI This provides for both consistentpolicy management solution for heterogeneous environments and possiblemigration path Policy compiler for PIX, which recently has beenreleased under GPL, allows Firewall Builder to function as asophisticated policy management software for Cisco PIX firewall withaccess to all functions of PIX including the newest features added inv7x Policy compiler for Cisco IOS access lists adds support forrouter access lists and turns Firewall Builder into a completesolution for multi-tiered network security Firewall Builder allowsfor management of multiple firewalls using the same network objectdatabase Change made to an object is immediately reflected in thepolicy of all firewalls using this object The administrator onlyneeds to recompile and install policies on actual firewall machinesBuilt-in interactive installer uses SSH to communicate with thefirewall and can automatically copy a generated policy and activateit Installer supports batch mode of operation and can update policyon multiple firewalls in one session In Firewall Builder,administrators work with an abstraction of firewall policy and NATrules; software effectively "hides" specifics of particular targetfirewall platform and helps administrator focus on implementation ofsecurity policy Backend software components, or policy compilers, candeduct many parameters of policy rules using information availablethrough network and service objects and therefore generate fairlycomplex code for the target firewall, thus relieving administratorsfrom having to remember all its details and limitations Policycompilers can also run sanity checks on firewall rules and make suretypical errors are caught before the generated policy is deployed *Hprobe 10 o hprobe-10tarbz2 + Hprobe is a packet generator with abuilt-in sniffer using libpcap It can generate many types ofnetwork probes to scan hosts and networks, and automatically analyzesthe responses Written in C for the Linux platform * libfwbuilder301 o libfwbuilder-301tarbz2 + The libraries necessary forcompiling Firewall Builder * Metasploit 32 o metasploit-32tarbz2+ The Metasploit Project announced today the free, world-wideavailability of version 32 of their exploit development and attackframework The latest version is provided under a true open sourcesoftware license BSD and is backed by a community-based developmentteam Metasploit runs on all modern operating systems, includingLinux, Windows, Mac OS X, and most flavors of BSD Metasploit has beenused on a wide range of hardware platforms, from massive Unixmainframes to the iPhone Users can access Metasploit using thetab-completing console interface, the Gtk GUI, the command linescripting interface, or the AJAX-enabled web interface The Windowsversion of Metasploit includes all software dependencies and aselection of useful networking tools Refer tohttp://metasploitcom/documents/RELEASE-32txt for detailedinformation regarding Metasploit version 32</description><link>http://www.secuobs.com/revue/news/99106.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99106.shtml</guid></item>
<item><title>News RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The news page has been cleaned up a bit, currently showing the latest 50headlines from the tickers I host, and now has its own RSS This RSSwill update every hour Check your address bar for the feeds availableas there are now three the link below likely won't subscribe you butis the full path required to add into your syndicator *kinqpinzinfo News RSS</description><link>http://www.secuobs.com/revue/news/99105.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99105.shtml</guid></item>
<item><title>arsenal FileP N/A, Flam3 2717, Fuzzbox 03, H225regreject N/A, H323 injection files N/A, iSEC forensics fuzzing tools N/A, ProxMon 1018, Pyvnc2swf 093, Qosmic 142, RTP injection files N/A, </title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * FileP N/A o fileptarbz2 + FileP is a python-based file fuzzer Itgenerates mutated files from a list of source files and feeds them toan external program in batches * Flam3 2717 o flam3-2717tarbz2+ Fractal flames are algorithmically generated images and animationsThe software was originally written in 1992 and released as opensource, AKA free software Since then it has developed a lot It hasbeen incorporated into many graphics programs and ported to mostoperating systems The shape of each image is specified by a longstring of numbers - a genetic code of sorts You can create your ownflames with the Apophysis interactive designer for Windows, Qosmicfor Linux, or Oxidizer for Mac OS X, or Apophysis-Jcross-platform in Java Or you can use the Electric Sheepdistributed screen saver to join the collective evolution of animatedfractal flames * Fuzzbox 03 o fuzzbox-03tarbz2 + Fuzzbox is amulti-codec media fuzzer * H225regreject N/A o h225regrejecttarbz2+ H225regreject is a tool is used to disconnect H323 calls It firstmonitors the network in order to determine if a call is taking placeOnce a call has been identified, it then injects a Registration Rejectpacket into the call * H323 injection files N/A oh323-injection-filestarbz2 + H323 injection files can be used withnemesis, a packet injection tool, for a variety of attacks on H323networks Attack files include replay attacks and denial-of-service *iSEC forensics fuzzing tools N/A o isec-forensic-toolstarbz2 + Thisis a collection of scripts that can be used to generate fuzzed files,fuzzed file systems, and file systems containing fuzzed files Thesecan be used to test the robustness of forensics tools and examinationsystems * ProxMon 1018 o proxmon-1018tarbz2 + ProxMon is anextensible Python based framework that reduces testing effort,improves consistency, and reduces errors Its use requires limitedadditional effort as it processes the proxy logs that you’re alreadygenerating and reports discovered issues In addition to penetrationtesting, ProxMon is useful in quality assurance, developer testing andregression testing scenarios Key features include: automatic valuetracing of set cookies, sent cookies, query strings and postparameters across sites; proxy agnostic; included library ofvulnerability checks; active testing mode; cross-platform; open sourcelicense; and, an easy to program extensible python framework *Pyvnc2swf 093 o pyvnc2swf-093tarbz2 + Pyvnc2swf is across-platform screen recording tool It captures screen motion viaVNC protocol and generates a Shockwave Flash SWF movie Pyvnc2swfsuite comes with three Python programs: vnc2swfpy, the recorder,editpy, the movie editor only functional for movies created withvnc2swf, and playpy, a simple movie viewer * Qosmic 142 oqosmic-142tarbz2 + Qosmic is a graphical interface for creating,editing, and rendering flam3 fractal images The Electric Sheepscreensaver has been gaining popularity, and Qosmic was developed toprovide a Qt interface for people interested in creating andcontributing sheep There are a few GNU/Linux distributions that havepre-built packages, so you should check if one exists for yourdistribution first * RTP injection files N/A ortp-injection-filestarbz2 + RTP injection files can be used withnemesis, a packet injection tool, for a variety of attacks on VoIPnetworks using RTP Attacks files include flood, BYE, anddenial-of-service * RTPInject N/A o rtpinjecttarbz2 + RTPInject isa minimal-setup prerequisites attack tool that injects arbitrary audiointo established RTP connections This program is written primarily todemonstrate the vulnerability of the underlying media layer for VoIPnetworks The tool identifies active conversations, enumerates themedia codec in use, and allows for the injection of an arbitrary audiofile that is automatically transcoded into the necessary formatrequired Point, click, and RTPinject * Sniffy 011 osniffy-011tarbz2 + The sniffy project allows you to trace/log thedata of any pseudo terminal on the system Due to the way the terminalworks, such a terminal trace provides complete information of whathappened on the terminal screen and sniffy is able to display/replaythis information The sniffy project consist of a kernel module ableto connect/hook onto a pseudo terminal; a program able to displaycontent of any pseudo terminal on fly; a daemon process tracing thepseudo terminal content into the file; and, a replay program allowingto replay any stored pseudo terminal session The usage of pseudoterminals in applications like SSH/telnet/X terminals, makes thesniffy project quite attractive It could be obviously used forvarious purposes One of the most sane usage could be SSH accesssession monitoring of some guarded server Any action on such a serverthrough the SSH is then documented and could be replayed * Vnak N/A ovnaktarbz2 + Vnak combines a number of attacks against multipleprotocols in to one easy to use Python tool Its aim is to be the onetool a user needs to attack multiple VoIP protocols The followingVoIP protocols and attacks are currently supported by Vnak: IAXAuthentication Downgrade, Known Authentication Challenge, CallHangup, Call Hold/Quelch, Registration Reject, H323 RegistrationReject, and SIP Registration Reject, Call Reject, KnownAuthentication Challenge * Vnc2swf 050 o vnc2swf-050tarbz2 +Vnc2swf is a cross-platform screen recording tool for ShockWave Flashswf or Flash Video flv format * VoIPER 007 o voiper-007tarbz2+ VoIPER is a VoIP security testing toolkit incorporating several VoIPfuzzers and auxilliary tools to assist the auditor It can currentlygenerate over 200,000 SIP tests and H323/IAX modules are indevelopment * WSBang 01 o wsbang-01tarbz2 + WSBang is aPython-based tool used to perform automated security testing of SOAPbased web services Features include: takes URL of WSDL as input;fuzzes all methods and parameters in the service; identifies allmethods and parameters, including complex parameters; fuzzesparameters based on type specified in WSDL; and, reports SOAPresponses and faults * WSMap 010 o wsmap-010tarbz2 + WSMap is aPython-based tool that helps penetration testers find web serviceendpoints and discovery files Features include: parses WebScarab logsto find testing targets; tests URLs and implies URLs found in log;and, tests for WSDL and DISCO web service discovery formats</description><link>http://www.secuobs.com/revue/news/99104.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99104.shtml</guid></item>
<item><title>Rollin' to December</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Last month's entries can be found here</description><link>http://www.secuobs.com/revue/news/99103.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99103.shtml</guid></item>
<item><title>arsenal rxvt 264, VMware Server 200-122956-i386,  VNCrush N/A</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * rxvt 264 o rxvt-264tarbz2 + rxvt is a colorr vt102 terminalemulator intended as an xterm replacement for users who do not requirefeatures such as Tektronix 4014 emulation and toolkit-styleconfigurability As a result, rxvt uses much less swap space -- asignificant advantage on a machine serving many X sessions * VMwareServer 200-122956-i386 o vmware-server-200-122956-i386tarbz2 +The free VMware Server is based upon VMware’s proven virtualizationtechnology With this robust yet easy to use software you canaccelerate server provisioning by building a virtual machine once anddeploying it multiple times; easily evaluate software in ready-to-runvirtual machines without installation and configuration; simplify ITtesting of patches, new applications and operating systems by allowingsystems administrators to test in a secure virtual machine environmentand be able to roll back to a clean state by using the snapshotfeature; re-host legacy operating systems such as Windows 2000,Windows NT Server 40 and Windows 2003 in a virtual machine running onnew hardware and operating system; and, leverage pre-built,ready-to-run virtual appliances that include virtual hardware,operating system and application environments from the VirtualAppliance Marketplace * VNCrush N/A o vncrushtarbz2 + VNCrush is aVNC server fuzzing utility</description><link>http://www.secuobs.com/revue/news/99102.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99102.shtml</guid></item>
<item><title>arsenal Blendigo 109, Climm 063, Indigo Renderer Linux-109-2,  ISR-evilgrade 100</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Blendigo 109 o blendigo-109tarbz2 + Blendigo is the Blenderexporter to facilitate rendering in Indigo * Climm 063 oclimm-063tarbz2 + Climm is a very portable text-mode ICQ clone -it is known to compile under Linux, BSD, AIX, HPUX, Windows, AmigaOSand with restrictions, BeOS Originally written by Matthew D Smith, agreat part of Climm has been rewritten by Rüdiger Kuhlmann, inparticular the support for the new version 8 of the OSCAR protocolthat became necessary, the internationalization, the file transfer andsome restructuring of the code * Indigo Renderer Linux-109-2 oindigo-linux-109-2tarbz2 + Indigo Renderer is a free,physically-based unbiased render engine Employing advanced featuressuch as Metropolis Light Transport, spectral light simulation, avirtual camera model, physical sky and more, Indigo Renderer canachieve much more realistic results than traditional globalillumination ray-tracers Indigo is free for commercial andnon-commercial use * ISR-evilgrade 100 oisr-evilgrade-100tarbz2 + ISR-evilgrade is a modular frameworkthat allow us to take advantage of poor upgrade implementations byinjecting fake updates Via modules, it implements the structureneeded to emulate a false update of specific applications/systemsISR-evilgrade needs the manipulation of the victim DNS traffic</description><link>http://www.secuobs.com/revue/news/99101.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99101.shtml</guid></item>
<item><title>DiabloHorn RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The DiabloHorn feed has been added Whazzah</description><link>http://www.secuobs.com/revue/news/99100.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99100.shtml</guid></item>
<item><title>arsenal Ack 186, Airgraph-ng N/A, Bochs 237, Complemento 04b, Fgdump 210, Iroffer 13b11, PSSH 143,  PWGen 206</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Ack 186 o ack-186tarbz2 + Ack is a tool like grep, aimed atprogrammers with large trees of heterogeneous source code Ack iswritten purely in Perl, and takes advantage of the power of Perl'sregular expressions * Airgraph-ng N/A o airgraph-ngtarbz2 +Airgraph-ng's purpose is to graph the text file that is created whenyou run airodump-ng with the -w option The idea is that we areshowing the relationships of the clients to the APs, so don't beshocked if you see only one mapping as you may only have captured oneclient * Bochs 237 o bochs-237tarbz2 + Bochs is a portable x86PC emulation software package that emulates enough of the x86 CPU,related AT hardware, and BIOS to run Windows, Linux, *BSD, Minix, andother OS's, all on your workstation * Complemento 04b ocomplemento-04btarbz2 + Complemento is a collection of tools forpentesters: LetDown is a powerful TCP flooder; ReverseRaider is adomain scanner that uses wordlist scanning or reverse resolutionscanning; and, HTTSquash is an HTTP server scanner, banner grabber,and data retriever * Fgdump 210 o fgdump-210tarbz2 + Fgdump, thesuccessor to pwdump, is a tool for mass password auditing of Windowssystems * Iroffer 13b11 o iroffer-13b11tarbz2 + Iroffer is asoftware program that acts as a file server for IRC It is similar toan FTP or WEB server, but users can download files using the DCCprotocol of IRC instead of a web browser Unlike similar programs,Iroffer is not a script; it is a standalone executable writtenentirely in C from scratch with high transfer speed and efficiency inmind Iroffer has been found to transfer over 50MB/s over a gigabitEthernet connection * PSSH 143 o pssh-143tarbz2 + This packageprovides parallel versions of the OpenSSH tools Included in thisdistribution are parallel ssh pssh, parallel scp pscp, parallelrsync prsync, parallel nuke pnuke, and parallel slurp pslurp *PWGen 206 o pwgen-206tarbz2 + PWGen is a small, GPL'ed passwordgenerator which creates passwords that can be easily memorized by ahuman</description><link>http://www.secuobs.com/revue/news/99099.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99099.shtml</guid></item>
<item><title>My Back|Track 4 submission</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Check it out, this is my submission for the contest currently being heldget your submissions in before 12/31 for Back|Track 4 graphics I'veonly made a wallpaper but think it came out quite well Contest link</description><link>http://www.secuobs.com/revue/news/99098.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99098.shtml</guid></item>
<item><title>Library rewrite</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - OKAY So I had a lot of files just piling up in the beginning, when thissite all started, that I simply wished to put online Quickly thatgrew into a healthy stockpile which had to be categorized Okay, fineDid that Quickly that became exceedingly inconvenient as it was apain in the ass to maintain/update Not to mention the link structurewas just wrong Now things are good The library now incorporates allof its original content along with the videos, live CDs, and brandspankin' new RFC section The kinqpinz Library I have gone throughall of my previous posts in an attempt to correct links that are now,as of this rewrite, out of date If you find a broken link somewhere,do let me know - I can't keep track Did I mention the new RSS Youcan now search by number or description any of the 5,280 RFCsavailable If you can't find a file in the arsenal, library, or anRFC, use this page that can export all of the currently availablefiles in their corresponding category to plain text, XML, and JSON Iwill likely build a search function in the future but do enjoy havingthese secondary formats available Greets</description><link>http://www.secuobs.com/revue/news/99097.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99097.shtml</guid></item>
<item><title>Assessing SBD</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - With the inclination to demo many of the more interesting utilities inthe arsenal, here is the beginning Let's see what we can learn fromsecurity tools, their capabilities, lack thereof, robustness,efficiency, so forth The first to be put under the microscope is SBDSBD is a Netcat-clone, designed to be portable and offer strongencryption It runs on Unix-like operating systems and on MicrosoftWin32 Sbd features AES-128-CBC + HMAC-SHA1 encryption by ChristopheDevine, program execution -e option, choosing source port,continuous reconnection with delay, and some other nice features OnlyTCP/IP communication is supported Source code and binaries aredistributed under the GNU General Public License You may find it inthe arsenal here and download it here Since you're much more likelyto find an administrator capable of detecting a popular binary likeNetcat, SBD just may prove to be the better tool of choice in anynumber of scenarios, many of which are depicted below Not only is itstotal compiled footprint of ~48K miniscule, its built-in, on bydefault encryption capabilities are first class in evading activeintrusion detection and prevention systems, stateful firewalls, andother common security-aware networking equipment found today Firsthave a look at the help page to gain a better understanding of thecurrently supported options This is sbd version 137 % /sbd -h sbd137 Copyright C 2004 Michel Blomgren $Id: sbdc,v 137 2005/08/2122:40:47 shadow Exp $ This program is free software; you canredistribute it and/or modify it under the terms of the GNU GeneralPublic License as published by the Free Software Foundation; eitherversion 2 of the License, or at your option any later versionconnect tcp: sbd -options host port listen tcp: sbd -l -p port-options options: -l listen for incoming connection -p n choose portto listen on, or source port to connect out from -a address choose anaddress to listen on or connect out from -e prog program to executeafter connect eg -e cmdexe or -e bash -r n infinitelyrespawn/reconnect, pause for n seconds between connection attempts-r0 can be used to re-listen after disconnect just like a regulardaemon -c on|off encryption on/off specify whether you want to usethe built-in AES-CBC-128 + HMAC-SHA1 encryption implementation byChristophe Devine - http://wwwcr0net:8040/ or not default is: -c on-k secret override default phrase to use for encryption secret mustbe shared between client and server -q hush, quiet, don't printanything overrides -v -v be verbose -n toggle numeric-only IPaddresses don't do DNS resolution if you specify -n twice, originalstate will be active ie -n works like a on/off switch -m togglemonitoring snooping on/off only used with the -e option snoopingcan also be turned on by specifying -vv -v two times -P prefix addprefix + a hardcoded separator to all outbound data this option ismostly only useful for sbd in "chat mode" to prefix lines you sendwith your nickname -H on|off highlight incoming data with a hardcodedcolor escape sequence for eg chatting default is: -H off -Vprint version banner and exit include that output in your bug reportand send bug report to michelblomgren@tigerteamse unix-like OSspecific options: -s invoke a shell, nothing else if sbd is setuid 0,it'll invoke a root shell -w n "immobility timeout" in seconds foridle read/write operations and program execution the -e option -Don|off fork and run in background daemonize default: -D off Therelease I currently have available same version tested must first becompiled There is no /configure, and assuming you're running a *nixvariant, the following suffices: % make unix rm -f sbd sbdexe *ocore gcc -Wall -Wshadow -O2 -o sbd pelc aesc sha1c doexecc sbdc-s In file included from doexecc:4: doexec_unixh: In function'doexec': doexec_unixh:164: warning: pointer targets in passingargument 2 of 'pel_recv_msg' differ in signedness doexec_unixh:199:warning: pointer targets in passing argument 2 of 'pel_send_msg'differ in signedness In file included from sbdc:238: misch: Infunction 'get_revision': misch:150: warning: pointer targets inpassing argument 1 of 'strstr' differ in signedness In file includedfrom sbdc:239: readwriteh: In function 'readwrite': readwriteh:223:warning: pointer targets in passing argument 2 of 'pel_send_msg'differ in signedness readwriteh:230: warning: pointer targets inpassing argument 2 of 'pel_send_msg' differ in signednessreadwriteh:250: warning: pointer targets in passing argument 2 of'pel_recv_msg' differ in signedness In file included from sbdc:254:socket_codeh: In function 'sbd_listen': socket_codeh:247: warning:pointer targets in passing argument 3 of 'accept' differ in signednesssocket_codeh:291: warning: pointer targets in passing argument 3 of'getsockname' differ in signedness And if you wish to install: % sudomake install root's password: install -m 755 -d /usr/local/bin install-c -m 755 sbd /usr/local/bin/ % You can of course automate all of thisfor purposes of trying out some of these simple demonstrations belowby using the following line: % wget --no-check-certificatehttps://kinqpinzinfo/arsenal/s/sbd-137tarbz2 etet tar xjvfsbd-137tarbz2 etet rm sbd-137tarbz2 etet cd sbd-137 etet make unixCleaning up after make and uninstalling is just as simple: % sudo makeuninstall root's password: rm -f /usr/local/bin/sbd % make clean rm -fsbd sbdexe *o core % Obviously the coolest thing about sbd SBD incaps of course being the name, and sbd in lowercase the binary itselfis its AES-CBC-128 + HMAC-SHA1 encryption, pulling the nooseexceptionally tight for any potential eavesdropper To get an idea ofwhy the encryption support is so handy, first let's do the usualclient/server depiction For accepting local or remote connections,the server launches the following: % /sbd -l localhost -p 1234 andthe client uses: % /sbd localhost 1234 This is adequate forestablishing your own custom encrypted communication tunnel as sbd'sencryption mechansim is on by default Now that we've established theconnection, we can look into how any packet sniffing routines betweenyou and your listener will pick up on the conversation - with andwithout encryption To draw a comparison, I used the same test for sbdand netcat while reviewing the pertinent output in tcpdump: startserver; client connects; client sends text "Client"; server sendstext "Server"; close connection with ^C Netcat On the server: %netcat -lvv localhost -p 1234 and the client connects: % netcatlocalhost 1234 server sees this: connect to 127001 fromlocalhostlocaldomain 127001 11082 client sends "Client",sever sends "Server", close connection: Client Server sent 8, rcvd8 % all the while tcpdump watches, capturing the plain textconversation with ease: % tcpdump -Ai lo tcpdump: verbose outputsuppressed, use -v or -vv for full protocol decode listening on lo,link-type EN10MB Ethernet, capture size 96 bytes 00:15:21942268 IPlocalhostlocaldomain11083  localhostlocaldomainsearch-agent: S1602597460:16025974600 win 32792Elocalhostlocaldomain11083: S 1613748982:16137489820 ack 1602597461win 32768 Elocalhostlocaldomainsearch-agent:  ack 1 win 257E4@@%+K_U`/ {2{2 00:15:23332778IP localhostlocaldomain11083  localhostlocaldomainsearch-agent: P1:98 ack 1 win 257 E localhostlocaldomain11083:  ack 9 win 256E48@@T+K`/_G {4+{4+ 00:15:24996610IP localhostlocaldomainsearch-agent  localhostlocaldomain11083: P1:98 ack 9 win 256 Elocalhostlocaldomainsearch-agent:  ack 9 win 257E4@@#+K_`/ {5{5 00:15:26612547IP localhostlocaldomainsearch-agent  localhostlocaldomain11083: F9:90 ack 9 win 256 E4:@@T+K`/_j{7_{5 00:15:26612728 IP localhostlocaldomain11083 localhostlocaldomainsearch-agent: F 9:90 ack 10 win 257E4@@"+K_`/ {7_{7_ 00:15:26612739IP localhostlocaldomainsearch-agent  localhostlocaldomain11083: ack 10 win 256 E4;@@T+K`/_^ {7_{7_ 10packets captured 20 packets received by filter 0 packets dropped bykernel % SBD All you see is gibberish: % tcpdump -Ai lo tcpdump:verbose output suppressed, use -v or -vv for full protocol decodelistening on lo, link-type EN10MB Ethernet, capture size 96 bytes00:13:41653118 IP localhostlocaldomain11081 localhostlocaldomainsearch-agent: S 32099133:320991330 win 32792Elocalhostlocaldomain11081: S 40266690:402666900 ack 32099134 win32768 Ev@ zz00:13:41653155 IP localhostlocaldomain11081 localhostlocaldomainsearch-agent:  ack 1 win 257 E4@@+Ifkg zz 00:13:41653276 IPlocalhostlocaldomain11081  localhostlocaldomainsearch-agent: P1:4140 ack 1 win 257 E@@ +IfkPzz Mrx5S- 00:13:41653284 IPlocalhostlocaldomainsearch-agent  localhostlocaldomain11081: ack 41 win 256 E4@@+Ifkfgs zz00:13:41653435 IP localhostlocaldomain11081 localhostlocaldomainsearch-agent: P 41:9352 ack 1 win 257Eh@@ +Iffkzzu$1B{75BV 00:13:41653442 IPlocalhostlocaldomainsearch-agent  localhostlocaldomain11081: ack 93 win 256 E4@@+Ifkg zz00:13:41653631 IP localhostlocaldomainsearch-agent localhostlocaldomain11081: P 1:5352 ack 93 win 256Eh@@o+Ifk zzU00:13:41653661 IP localhostlocaldomain11081 localhostlocaldomainsearch-agent:  ack 53 win 257 E4@@+Ifkg  zz 00:13:43171691 IPlocalhostlocaldomain11081  localhostlocaldomainsearch-agent: P93:12936 ack 53 win 257 EX@@ +IfkLzZz~'aGDKR/|b 00:13:43208179 IPlocalhostlocaldomainsearch-agent  localhostlocaldomain11081: ack 129 win 256 E4@@+Ifkc zdzZ00:13:45483623 IP localhostlocaldomainsearch-agent localhostlocaldomain11081: P 53:8936 ack 129 win 256 EX@@}+IfkLzzZPdD2HYQ9K 00:13:45483646 IPlocalhostlocaldomain11081  localhostlocaldomainsearch-agent: ack 89 win 257 E4@@ +Ifl_H zz00:13:55370939 IP localhostlocaldomainsearch-agent localhostlocaldomain11081: F 89:890 ack 129 win 256E4@@+IflU zDz 00:13:55371037IP localhostlocaldomain11081  localhostlocaldomainsearch-agent: F129:1290 ack 90 win 257 E4@@ +IflKzDzD 00:13:55371061 IP localhostlocaldomainsearch-agent localhostlocaldomain11081:  ack 130 win 256E4"@@+IflK zDzD 16 packetscaptured 32 packets received by filter 0 packets dropped by kernel %Below are common examples for how sbd can be used How about with anencryption key of your choice Use -k on the client and server: server% /sbd -l localhost -p 1234 -k sbd client % /sbd localhost 1234 -ksbd Using an agreed upon key is handy enough, and quite obvious when aclient uses the wrong key: server % /sbd -l localhost -p 1234 -k sbdauthentication failed aes-cbc-128 client % /sbd localhost 1234 -kfoo authentication failed aes-cbc-128 How about an ad-hoc chat roomUse -P for your chat prefix, and -H to differentiate speakers: server% /sbd -l localhost -p 1234 -k sbd -P " " -H on # : Client Serverclient % /sbd localhost 1234 -k sbd -P "# " -H on Client  : ServerSame thing, with verbosity: server % /sbd -l localhost -p 1234 -k sbd-P " " -H on -vv listening on port 1234 connect to 127001:1234from 127001:22099 localhostlocaldomain # : Client Serverclient % /sbd localhost 1234 -k sbd -P "# " -H on -vv connecting tolocalhost localhostlocaldomain 127001 on port 1234 connectedto 127001:1234 Client  : Server Some other options include theversion banner sbd lacks a man page: % /sbd -V sbd 137 CopyrightC 2004 Michel Blomgren $Id: sbdc,v 137 2005/08/21 22:40:47 shadowExp $ This program is free software; you can redistribute it and/ormodify it under the terms of the GNU General Public License aspublished by the Free Software Foundation; either version 2 of theLicense, or at your option any later version And how aboutlaunching a command upon connection, similar to netcat -e server %/sbd -l localhost -p 1234 -k sbd -H on -vv -e /bin/bash listening onport 1234 connect to 127001:1234 from 127001:22103localhostlocaldomain executing: /bin/bash whoami meathive iduid=1000meathive gid=100users groups=100users client % /sbdlocalhost 1234 -k sbd -H on -vv connecting to localhostlocalhostlocaldomain 127001 on port 1234 connected to127001:1234 whoami meathive id uid=1000meathive gid=100usersgroups=100users Unfortunately it does not appear that you can usethe above command execution trick with the prefix option How aboutinvoking a shell Depending on the setuid of the sbd binary, a rootshell can be spawned as is demonstrated below % /sbd -s -vv invokingshell % exit exit % % su Password: % chown root:root /sbd % chmod +s$ chmod +s /sbd % l $ l /sbd -rwsr-sr-x 1 root root 481762008-12-19 23:10 /sbd* % exit exit % whoami meathive % /sbd -s -vvinvoking shell % whoami root % You can have a persistent sbdcontinuously respawn itself after each connection, as well server %/sbd -r0 -l localhost -p 1234 -vv listening on port 1234 connect to127001:1234 from 127001:19326 localhostlocaldomain listeningon port 1234 connect to 127001:1234 from 127001:19327localhostlocaldomain listening on port 1234 connect to127001:1234 from 127001:19328 localhostlocaldomain listeningon port 1234 ^C % client % /sbd localhost 1234 ^C % /sbd localhost1234 ^C % /sbd localhost 1234 ^C % The easiest thing to do in thatcase, however, is to simply daemonize sbd server % /sbd -l localhost-p 1234 -D on client % /sbd localhost 1234 -vv connecting tolocalhost localhostlocaldomain 127001 on port 1234 connectedto 127001:1234 server % netstat -an|grep 1234 tcp 0 0127001:1045 127001:1234 ESTABLISHED tcp 0 0 127001:1234127001:1045 ESTABLISHED % Killing the daemonized sbd: server % kill`pidof /sbd` Any connected clients on the now dead server will see: %/sbd localhost 1234 -vv connecting to localhostlocalhostlocaldomain 127001 on port 1234 connected to127001:1234 Terminated % How about a secure file transfer tunnelserver % /sbd -l localhost -p 1234 -vv outfile listening on port1234 client % echo "in"infile % /sbd localhost 1234 -vv</description><link>http://www.secuobs.com/revue/news/99096.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99096.shtml</guid></item>
<item><title>arsenal catdoc 0942, Jhead 284, JPEGfuzr N/A,  MP3Info 085a</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * catdoc 0942 o catdoc-0942tarbz2 + catdoc is program which readsone or more Microsoft Word files and outputs text contained insidethem to standard output Therefore it does same work for doc files,as the Unix cat command for plain ASCII files catdoc is nowaccompanied by xls2csv, program which converts Excel spreadsheets intoa comma-separated value file, and catppt, a utility to extract textualinformation from PowerPoint files * Jhead 284 o jhead-284tarbz2 +Jhead is a command line driven program for manipulating the non-imageparts of Exif flavor JPEG files that most digital cameras produceJhead can extract camera settings from Exif image files; set and/oradjust the Exif time field; manipulate extract, replace, regenerateExif integral thumbnails; transplant Exif image header from one JPEGto another; edit JPEG comment fields; automatically rotate imagesupright using jpegtran according to 'orientation' tag; managerunning programs on large batches of JPEGs and restore Exif headerinformation afterwards; and, display embedded GPS info if present *JPEGfuzr N/A o jpegfuzrtarbz2 + JPEGfuzr is a Perl implementation offuzzing JPEG metadata through the Image::MetaData::JPEG extension Itsupports 40 metadata tags and fuzzes all, one by one, using the fuzzdata supplied Who may be interested in JPEGfuzr Securityresearchers, software vendors, programmers, curious eyes, or basicallyanyone that wants to research the JPEG file format or find bugs inJPEG implementations * MP3Info 085a o mp3info-085atarbz2 +MP3Info is a little utility used to read and modify the ID3 tags ofMP3 files MP3Info can also display various technical aspects of anMP3 file including playing time, bit-rate, sampling frequency, andother attributes in a pre-defined or user-specifiable output format</description><link>http://www.secuobs.com/revue/news/99095.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99095.shtml</guid></item>
<item><title>arsenal EDB 096, Firefox 305, HTML Purifier 320, libssh2 018, Ncat 010rc3, Nmap 476, RSHatter N/A, UCSniff 100, Wings 3D 09904a, wxWidgets 289,  Xymon 422-RC1</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * EDB 096 o edb-096tarbz2 + The EDB debugger features an intuitiveGUI interface, the usual debugging operationsstep-into/step-over/run/break, conditional breakpoints, debuggingcore is implemented as a plugin so people can have drop inreplacements, basic instruction analysis, view/dump memory regions,effective address inspection, the data dump view is tabbed, allowingyou to have several views of memory open at the same time and quicklyswitch between them, plugins, and, importing of symbol maps * Firefox305 o firefox-305tarbz2 + The Web is all about innovation, andFirefox 3 sets the pace with dozens of new features, including thesmart location bar, one-click bookmarking and blindingly fastperformance Firefox has security, speed and new features that willchange the way you use the Web Don’t settle for anything less * HTMLPurifier 320 o htmlpurifier-320tarbz2 + HTML Purifier is astandards-compliant HTML filter library written in PHP HTML Purifierwill not only remove all malicious code better known as XSS with athoroughly audited, secure yet permissive whitelist, it will also makesure your documents are standards compliant, something only achievablewith a comprehensive knowledge of W3C's specifications Tired of usingBBCode due to the current landscape of deficient or insecure HTMLfilters Have a WYSIWYG editor but never been able to use it Lookingfor high-quality, standards-compliant, open-source components for thatapplication you're building HTML Purifier is for you * libssh2 018o libssh2-018tarbz2 + libssh2 is a library implementing the SSH2protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH,SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX,SECSH-NUMBERS, and SECSH-PUBLICKEY * Ncat 010rc3 oncat-010rc3tarbz2 + Ncat is a reimplementation of the currentlysplintered and reasonably unmaintained Netcat family Ncat will dopretty much everything that all the other Netcat's do; however it doesthis all in one place Plus it has the added benefit of spanky newfeatures and ongoing development Ncat was designed with the originalNetcat interface in mind Rather than replacing the old Netcatinterface with a brand new and subsequently more convoluted set ofoptions, the Ncat interface was intentionally kept clean and simple touse, as in the original product Ncat is a subset of features from theoriginal Netcat but with a complete overhaul and rewrite, along withcompletely new features and also a combination of other well receivedfeatures of other Netcat products, such as IPv6 support, SSL support,etc Under the hood of Ncat, there is IPv4, IPv6 support as well assupport for TCP and UDP in both listen and connect modes There isalso SSL support for both listen and connect operations, too As wellas a new 'Connection Brokering' feature which enables two or morehosts to connect that previously were unable to directly communicatewith each other * Nmap 476 o nmap-476tarbz2 + Nmap NetworkMapper is a free and open source utility for network exploration orsecurity auditing Many systems and network administrators also findit useful for tasks such as network inventory, managing serviceupgrade schedules, and monitoring host or service uptime Nmap usesraw IP packets in novel ways to determine what hosts are available onthe network, what services application name and version those hostsare offering, what operating systems and OS versions they arerunning, what type of packet filters/firewalls are in use, and dozensof other characteristics It was designed to rapidly scan largenetworks, but works fine against single hosts Nmap runs on all majorcomputer operating systems, and both console and graphical versionsare available * RSHatter N/A o rhsattertarbz2 + RSHatter is an RSHprotocol fuzzing utility * UCSniff 100 o ucsniff-100tarbz2 +UCSniff is an exciting new VoIP security assessment tool thatleverages existing open source software into several useful features,allowing VoIP owners and security professionals to rapidly test forthe threat of unauthorized VoIP eavesdropping Written in C, andinitially released for Linux systems, the software is freely availablefor anyone to download, under the GPLv3 license Some useful featuresof UCSniff that have been combined together into a single package:allows targeting of VoIP users based on corporate directory and/orextensions; automatically re-creates and saves entire voiceconversations to a single file that can be played back by mediaplayers; support for G722 and G711 u-law compression codecs;automated VLAN hop and discovery support; a VoIP sniffer combined witha man-in-the-middle redirection tool; monitor mode; and, sniffs entireconversation if only one phone is in source VLAN * Wings 3D 09904ao wings-09904a-linuxtarbz2 + Wings 3D is a subdivision modelerwith an user interface that is easy to use for both beginners andadvanced users * wxWidgets 289 o wxWidgets-289tarbz2 +wxWidgets lets developers create applications for Win32, Mac OS X,GTK+, X11, Motif, WinCE, and more using one code base It can be usedfrom languages such as C++, Python, Perl, and C#/NET Unlike othercross-platform toolkits, wxWidgets applications look and feel nativeThis is because wxWidgets uses the platforms own native controlsrather than emulating them Its also extensive, free, open-source, andmature * Xymon 422-RC1 o xymon-422-RC1tarbz2 + The Hobbitmonitor now Xymon is a system for monitoring of hosts and networks,inspired by the Big Brother system It provides real-time monitoring,an easy web-interface, historical data, availability reports, andperformance graphs</description><link>http://www.secuobs.com/revue/news/99094.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99094.shtml</guid></item>
<item><title>library Whole lotta AMD love</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * x86 Assembly Language Reference Manual in category assembly - download* AMD Athlon64 et AMD Opteron Processors Thermal Design Guide incategory docs - download * AMD Athlon64 FX 60 Processor CompetitivePerformance Guide in category docs - download * AMD Athlon64 ProcessorCompetitive Performance Guide in category docs - download * AMDAthlon64 Processor Power et Thermal Data Sheet in category docs -download * AMD Family 11H Processor Power et Thermal Data Sheet forNotebooks in category docs - download * AMD Functional Data Sheet: 754Pin Package in category docs - download * AMD Functional Data Sheet:939 Pin Package in category docs - download * AMD Functional DataSheet: 940 Pin Package in category docs - download * AMD I/OVirtualization Technology Specification in category docs - download *AMD NPT Family 0FH Desktop Processor Power et Thermal Data Sheet incategory docs - download * AMD Processor Performance Evaludation Guidein category docs - download * AMD Processor Recognition for ProcessorsPrior to AMD Family 0FH Processors in category docs - download * AMDSocket 940 Design Specification in category docs - download * AMDSocket 940 Qualification Plan in category docs - download</description><link>http://www.secuobs.com/revue/news/99093.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99093.shtml</guid></item>
<item><title>kinqpinz grafeek</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I've noticed some broken links now that the revamped library is up Theyshall be remedied promptly and the changes will reflect in the RSSPlease enjoy these official kinqpinz graphics</description><link>http://www.secuobs.com/revue/news/99092.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99092.shtml</guid></item>
<item><title>YouTubing it up</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - http://wwwyoutubecom/meathive I have been working on a lot of graphics,all of which can be found in my gallery On top of that, I reallyenjoy the speed painting videos on YouTube; Nico Di Mattia is a goodplace to start searching if you're interested in learning more So I'mdoing my own, so far I have three two available at the moment asYouTube doesn't like me adding Slipknot tracks to my clips I'vealso submitted a second Back|Track 4 wallpaper the rejected clip ;which you can check out below - the contest is about over so I'mexcited to see what they choose Feel free to subscribe to my YouTubechannel as I plan on releasing many more kickass renders See ya</description><link>http://www.secuobs.com/revue/news/99091.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99091.shtml</guid></item>
<item><title>4 more feeds</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The following four feeds have been added: * Ivan Ristic * AlexPapadimoulis * The Codist * The Daily WTF</description><link>http://www.secuobs.com/revue/news/99090.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99090.shtml</guid></item>
<item><title>Rollin' to '09</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Last month's entries can be found here EDIT: library links that weren'tworking should be okay now, stupid scripting glitch The fixed linkswon't reflect in the RSS as I mentioned since the problem was minor Iwill continue to keep an eye on busted URLs</description><link>http://www.secuobs.com/revue/news/99089.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99089.shtml</guid></item>
<item><title>arsenal Kindle Mobipocket Tools 01, jmIRC 095,  MultiInjector 03</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Kindle Mobipocket Tools 01 o kindle-mobipocket-tools-01tarbz2 +These scripts allow one to read legally purchased Secure Mobipocketbooks on Amazon Kindle * jmIRC 095 o jmirc-095tarbz2 + A completerewrite of the mobile Java IRC client WLIrc jmIRC aims to be moreresponsive and use less memory maintaining the current GUI and looks* MultiInjector 03 o multiinjector-03tarbz2 + MultiInjector is anautomatic SQL injection and defacement tool MultiInjector does all ofthe following: receives a list of URLs as input; recognizes theparameterized URLs from the list; fuzzes all URL parameters toconcatenate the desired payload once an injection is successful;automatic defacement - you decide on the defacement content, be it ahidden script, or just pure old cyber graffiti fun; OS commandexecution - remote enabling of XP_CMDSHELL on SQL server, subsequentlyrunning any arbitrary operating system command lines entered by theuser; configurable parallel connections exponentially speed up theattack process - one payload, multiple targets, simultaneous attacks;and, optional use of an HTTP proxy to mask the origin of the attacks</description><link>http://www.secuobs.com/revue/news/99088.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99088.shtml</guid></item>
<item><title>library new files for January 2nd</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * A Failure to Learn from the Past in category virii ¤ download * AllEscapes in category ascii ¤ download * BIOS and Kernel Developer'sGuide for AMD Family 11H Processors in category docs ¤ download * BIOSand Kernel Developer's Guide for AMD NPT Family 0FH Processors incategory docs ¤ download * Builder's Guide for AMD Athlon64Processor-Based Desktops and Workstations in category docs ¤ download* Compiler Usage Guidelines for AMD64 Platforms in category docs ¤download * CPUID Specification in category docs ¤ download * HackerFAQ in category docs ¤ download * How to Attack a WEP/WPA ProtectedWireless Network in category docs ¤ download * Introduction to 80x86Assembly Language and Computer Architecture in category assembly ¤download * Jargon File in category misc ¤ download * Low Profilesocket S1 Design Specification in category docs ¤ download * MobileAMD Athlon64 Processor 3400+ Competitive Performance Guide in categorydocs ¤ download * Performance Guidelines for AMD Athlon64 and AMDOpteron ccNUMA Multiprocessor Systems in category docs ¤ download *Quanta+ User Manual in category docs ¤ download * Raised Hacklez incategory virii ¤ download * Reconstructing Binaries to C for Beginnersin category c ¤ download * Reversing: Secrets of Reverse Engineeringin category docs ¤ download * Revision Guide for AMD Athlon64 and AMDOpteron Processors in category docs ¤ download * Revision Guide forAMD Family 11H Processors in category docs ¤ download * Revision Guidefor AMD NPT Family 0FH Processors in category docs ¤ download * SocketAM2 Design Specification in category docs ¤ download * SoftwareOptimization Guide for AMD Family 10H Processors in category docs ¤download * Thermal Interface Material Comparison: Pads Vs Grease incategory docs ¤ download * The Story of Mel: A Real Programmer incategory misc ¤ download</description><link>http://www.secuobs.com/revue/news/99087.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99087.shtml</guid></item>
<item><title>sponger update</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I noticed that sponger stopped working after discovering Google changedaround their video server's response headers The script's now workingand will continue to do so if the video headers keep shuffling around* sponger - a youtube video leecher | download</description><link>http://www.secuobs.com/revue/news/99086.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99086.shtml</guid></item>
<item><title>arsenal Adeona 021, jscompact 111, KVM 82, YUI Compressor 242,  Zero Wine 001</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Adeona 021 o adeona-021tarbz2 + Adeona is the first open sourcesystem for tracking the location of your lost or stolen laptop thatdoes not rely on a proprietary, central service This means that youcan install Adeona on your laptop and go — there's no need to rely ona single third party What's more, Adeona addresses a critical privacygoal different from existing commercial offerings It isprivacy-preserving This means that no one besides the owner or anagent of the owner's choosing can use Adeona to track a laptopUnlike other systems, users of Adeona can rest assured that no one canabuse the system in order to track where they use their laptop Adeonais designed to use the open source OpenDHT distributed storage serviceto store location updates sent by a small software client installed onan owner's laptop The client continually monitors the currentlocation of the laptop, gathering information such as IP addressesand local network topology that can be used to identify its currentlocation The client then uses strong cryptographic mechanisms to notonly encrypt the location data, but also ensure that the cipher textsstored within OpenDHT are anonymous and unlinkable At the same time,it is easy for an owner to retrieve location information Using Adeonaonly requires downloading and installing a small software client, andis free to use * jscompact 111 o jscompact-111tarbz2 +jscompact is a text-mode program designed to compact JavaScript codeand thereby speed download times It does this primarily by removingwhitespace, and by changing variable names within functions to singlecharacter values, eg, 'mybiglongvariablename' becomes 'a' For siteswith large external JavaScript libraries, this can be a big win,especially for users with a slow connection The utility is handy forcompacting and to a degree obfuscating JavaScript immediately priorto releasing it into production No specific size reduction claims aremade Your mileage will vary based on the input code jscompact useslibjs SpiderMonkey from the Mozilla project, and thus fullyunderstands the JavaScript and is able to do a better job thancompactors built using regular expressions or similar kludges Thisprogram is written in C, and should compile/run on any platform thatMozilla will compile on However, at this time jscompact will notbuild on Windows without some patches to the libjs source code So itis recommended to use it on a unix-like OS jscompact cannot processJavaScript embedded within an HTML file: it expects to be givenJavaScript as input, and spits JavaScript back out as output * KVM 82o kvm-82tarbz2 + KVM for Kernel-based Virtual Machine is a fullvirtualization solution for Linux on x86 hardware containingvirtualization extensions Intel VT or AMD-V It consists of aloadable kernel module, kvmko, that provides the core virtualizationinfrastructure and a processor specific module, kvm-intelko orkvm-amdko KVM also requires a modified QEMU, although work isunderway to get the required changes upstream Using KVM, one can runmultiple virtual machines using unmodified Linux or Windows imagesEach virtual machine has private virtualized hardware: a network card,disk, graphics adapter, etc The kernel component of KVM is includedin mainline Linux, as of 2620 KVM is open source software * YUICompressor 242 o yuicompressor-242tarbz2 + The YUI Compressor isa JavaScript compressor which, in addition to removing comments andwhite-space, obfuscates local variables using the smallest possiblevariable name This obfuscation is safe, even when using constructssuch as 'eval' or 'with' although the compression is not optimal inthose cases The YUI Compressor is also able to safely compress CSSfiles The decision on which compressor is being used is made on thefile extension js or css * Zero Wine 001 o zerowine-001tarbz2+ Zero Wine is a malware behavior analysis tool Simply upload yoursuspicious PE file Windows executable through the Web interface andlet it analyze the behavior of the process</description><link>http://www.secuobs.com/revue/news/99085.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99085.shtml</guid></item>
<item><title>Concerning the coding challenges</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I have found a renewed interest in my wargames tonight, particularly thecoding section I have been doing a lot of cleanup to keep codemaintenance at an absolute minimal on my end I've also built in afeature whereby after completing a coding challenge there are onlytwo but I shall get more up as soon as possible you can view thesubmissions from other members Now, I really am dependent upon mylittle community here to submit their source code used for completingthe coding wargames in order for this to work, otherwise you're stuckwith only my answers and that's just plain snobbish Anyway, if youhave beaten either of the two challenges I currently have online, thelinks are below for your perusal - log in to see them Those of youwho have beaten them, would you mind shooting me a message with yoursolution Or if you no longer have the solution to challenge yourselfagain and send one in It's early in the game so once I can crank outa good quantity of challenges the submissions from various VIPs willbe quite interesting and informative Hope to hear from you For thosewho have beaten them only: * Coding #1 Solutions * Coding #2 Solutions</description><link>http://www.secuobs.com/revue/news/99084.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99084.shtml</guid></item>
<item><title>Coding #3</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Coding #3 # Smiles, frowns, and encodings Oh, my</description><link>http://www.secuobs.com/revue/news/99083.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99083.shtml</guid></item>
<item><title>Crypto #3</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Crypto #3 ¦ Iterating Base64</description><link>http://www.secuobs.com/revue/news/99082.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99082.shtml</guid></item>
<item><title>UNIX Bash Scripting RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The UNIX Bash Scripting feed has been added</description><link>http://www.secuobs.com/revue/news/99081.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99081.shtml</guid></item>
<item><title>My community - update - UPDATE</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - ircsecuritychatorg #kinqpinz, EDIT: SILC has proved to be a major painin the ass Thanks to klaymen and BSDGurl for helping reinforce thatI've updated the room information which will simply beircsecuritychatorg, channel #kinqpinz</description><link>http://www.secuobs.com/revue/news/99080.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99080.shtml</guid></item>
<item><title>arsenal Anope 180,  GeSHi 1082</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Anope 180 o anope-180tarbz2 + Anope is a set of IRC Servicesdesigned for flexibility and ease of use * GeSHi 1082 ogeshi-1082tarbz2 + GeSHi started as an idea to create a genericsyntax highlighter for the phpBB forum system, but has beengeneralized to this project GeSHi aims to be a simple but powerfulhighlighting class, with the following goals: support for a wide rangeof popular languages; easy to add a new language for highlighting;and, highly customizable output formats GeSHi aims to do this all asquickly as possible Many customizable features of GeSHi facilitateincreased speed, and you can easily find a balance between the amountof highlighting done and the speed in which it is done</description><link>http://www.secuobs.com/revue/news/99079.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99079.shtml</guid></item>
<item><title>JavaScript #3</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - JavaScript #3 | jQuery obfuscation</description><link>http://www.secuobs.com/revue/news/99078.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99078.shtml</guid></item>
<item><title>Coding #4</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Coding #4 | Five MD5s five chars long</description><link>http://www.secuobs.com/revue/news/99077.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99077.shtml</guid></item>
<item><title>JavaScript #4</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - JavaScript #4 | JavaScript obfuscation</description><link>http://www.secuobs.com/revue/news/99076.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99076.shtml</guid></item>
<item><title>JavaScript #5</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - JavaScript #5 | jQuery obfuscation #2</description><link>http://www.secuobs.com/revue/news/99075.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99075.shtml</guid></item>
<item><title>HiR Information Report  Rails for PHP Developers RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The HiR Information Report and Rails for PHP Developers feeds have beenadded</description><link>http://www.secuobs.com/revue/news/99074.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99074.shtml</guid></item>
<item><title>Wargames revamp</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The wargames page has undergone another major rewrite It took a lot ofpatience to get the lettering and compositions up to par but I'm veryhappy with the result Anyway, this is me, staying current, and I hopeyou like it</description><link>http://www.secuobs.com/revue/news/99073.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99073.shtml</guid></item>
<item><title>Crypto #4</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Crypto #4 - Name the hash</description><link>http://www.secuobs.com/revue/news/99072.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99072.shtml</guid></item>
<item><title>library New files for January 19th, 2009</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Advanced Rails in category ruby ¦ download * Agile Web DevelopmentWith Rails in category ruby ¦ download * Best of Ruby Quiz in categoryruby ¦ download * Design Patterns in Ruby in category ruby ¦ download* Enterprise Integration With Ruby in category ruby ¦ download *Everyday Scripting With Ruby for Teams, Testers, and You in categoryruby ¦ download * Ferret in category ruby ¦ download * From Java toRuby: Things Every Manager Should Know in category ruby ¦ download *Learn to Program in category ruby ¦ download * On the Diffusion MatrixEmployed in the Whirlpool Hashing Function in category cryptography ¦download * Practical Attacks Against WEP et WPA in category docs ¦download * Practical Ruby for System Administration in category ruby ¦download * Practical Ruby Projects: Ideas for the Eclectic Programmerin category ruby ¦ download * Pro Active Record Databases With Ruby etRails in category ruby ¦ download * Programming Ruby in category ruby¦ download * Rails Cookbook in category ruby ¦ download * RailsRecipes in category ruby ¦ download * Ruby Cookbook in category ruby ¦download * Ruby for Rails in category ruby ¦ download * Ruby PocketReference: A Quick Guide to Ruby in category ruby ¦ download * TheRails Way in category ruby ¦ download * The Ruby Programming Languagein category ruby ¦ download * The Ruby Way in category ruby ¦ download* x86 Registers in category docs ¦ download</description><link>http://www.secuobs.com/revue/news/99071.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99071.shtml</guid></item>
<item><title>Crypto #5</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Crypto #5 ¦ Name the encryption</description><link>http://www.secuobs.com/revue/news/99070.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99070.shtml</guid></item>
<item><title>Coderrr RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Coderrr feed has been added</description><link>http://www.secuobs.com/revue/news/99069.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99069.shtml</guid></item>
<item><title>Rootsecure RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Rootsecure feed has been added</description><link>http://www.secuobs.com/revue/news/99068.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99068.shtml</guid></item>
<item><title>Korupt RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Korupt feed has been added</description><link>http://www.secuobs.com/revue/news/99067.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99067.shtml</guid></item>
<item><title>arsenal BitchX 11-final, newLISP 1001,  XChat 286</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * BitchX 11-final o bitchx-11-finaltarbz2 + BitchX is a popular IRCclient that supports built-in ANSI color, ease of use, built-innotify, protection, bot, and shit lists, built-in mass commands andtools, extended set of DCC commands and built-in CDCC offering,built-in link looker, extended scripting functionality, includingfunctions found nowhere else, huge installed user base, an abundanceof scripts, and a dedicated help channel #BitchX on EFNET, and abuilt-in screen client, allowing you to detach and re-attach to an IRCsession * newLISP 1001 o newlisp-1001tarbz2 + newLISP is aLisp-like, general-purpose scripting language It has all the magic oftraditional LISP but is easier to learn and use newLISP is friendly,fast, and small Most of the functions you will ever need are alreadybuilt in newLISP runs on most OS platforms * XChat 286 oxchat-286tarbz2 + XChat is an IRC chat program for both Linux andWindows It allows you to join multiple IRC channels chat rooms atthe same time, talk publicly, private one-on-one conversations, etc</description><link>http://www.secuobs.com/revue/news/99066.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99066.shtml</guid></item>
<item><title>PHP #12</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - PHP #12 | A multi-phase ncurses nightmare</description><link>http://www.secuobs.com/revue/news/99065.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99065.shtml</guid></item>
<item><title>Artful Code RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Artful Code feed has been added</description><link>http://www.secuobs.com/revue/news/99064.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99064.shtml</guid></item>
<item><title>arsenal Adito 091, BOON 10, C Code Analyzer 08, chkrootkit 048, Kawa 191, PHPNTetris 13,  phpsh N/A</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * Adito 091 o adito-091tarbz2 + Adito is a Web-based SSL VPNserver Adito is written in Java and has a browser-based AJAXinterface Adito allows easy and safe access to most intranet serviceswith just a Web browser Adito was originally forked fromSSL-Explorer * BOON 10 o boon-10tarbz2 + BOON is a tool forautomatically finding buffer overrun vulnerabilities in C source codeBuffer overruns are one of the most common types of security holes,and we hope that BOON will enable software developers and codeauditors to improve the quality of security-critical programs * CCode Analyzer 08 o cca-08tarbz2 + The C Code Analyzer CCA is astatic analysis tool for detecting potential security problems in Csource code CCA tries to spot only the errors that can actually causeproblems Not every strcpy is a security problem No code annotationsor tweaking is required - it's fully automatic It's not realisticthat an auditor has to crawl through thousands of LOC telling theanalyzer 'watch this, watch that' It's possible to extend the set ofdangerous functions, malloc wrappers, etc, though CCA integratesseamlessly into existing development platforms The Eclipse platformhas been chosen as completion to the command line tool It uses a Cintermediate language to run its analysis on It should parse all GCCand MSVC code with no substantial problems CCA is licensed under aBSD license Current features are fully automatic user input tracer,memory leak detection, multiple/dangling free detection, array out ofbound accesses, potential buffer overflow detection, and clipsefrontend plugin * chkrootkit 048 o chkrootkit-048tarbz2 +chkrootkit is a tool to locally check for signs of a rootkit * Kawa191 o kawa-191tarbz2 + Kawa is a framework written in Java forimplementing high-level and dynamic languages, compiling them intoJava bytecodes * PHPNTetris 13 o phpntetris-13tarbz2 + A PHPTetris implementation written with ncurses * phpsh N/A ophpshtarbz2 + phpsh is an interactive shell for PHP that featuresreadline history, tab completion, and quick access to documentationIt was developed at Facebook and ironically, is written mostly inpython It is open source and released under a modified BSD licenseIf you don't have --with-readline and --with-libedit compiled intoyour PHP binary but you do have Python24 installed, you may find thisuseful</description><link>http://www.secuobs.com/revue/news/99063.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99063.shtml</guid></item>
<item><title>Rollin' to Feb '09</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Last month's entries can be found here</description><link>http://www.secuobs.com/revue/news/99062.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99062.shtml</guid></item>
<item><title>Laughing at a Facebook hack</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Facebook Hacker Requests Money From User's Friends Hacker Changed Woman'sLogin, Password On Social Networking Sitehttp://wwwmsnbcmsncom/id/29031714/ This story about a hijackedFacebook page attempts to make a news story out of nothing and is anepic fail WINSTON-SALEM, NC - There were concerns on Wednesday forpeople using online social networking Web sites after scam artistswere accused of taking over profiles and going after Internetcontacts These days, it's easier to ask who doesn't have a MySpace orFacebook page I'm not asking, I find it's the easiest I wonder whois having these concerns It's certainly not Facebook's majority userbase, as the information they've signed up with in registering istestament to the fact that they are willing to abdicate every aspectof their private information, sans financial, to chat it up with oldhigh school buddies Carolyn Fuller said she surfs the net We allsurf the net, I suppose Carolyn Fuller wants some sort ofaccreditation for it Perhaps the US Mint can start embossingcustomized 'I Surf the Net' merit badges in an effort to appease toher delicate personality One Triad woman said she shut her Facebookpage down after she became the victim of an internet scam But shestopped going to one of the most popular social network pages "MyFacebook page was hijacked or hacked," Fuller said It's one of thenewest scams to hit the internet Hackers somehow took over Fuller'sFacebook page and posed as her online Carolyn Fuller's Facebook pagewas not hacked Carolyn Fuller's account was hacked Morespecifically, the authentication credentials used to access saidaccount Carolyn Fuller's Facebook page just happens to be a majorpart of Carolyn Fuller's Facebook account that was hacked, but to besure it is not all Facebook has going for itself: just look at allthose customized ads to pilfer Though Carolyn Fuller's situation maybe unique to her, this is not in fact one of the newest scams on theInternet It's just a convenient scare tactic used by the media tofurther suppress its league of unthinking subscribers "I had noknowledge what was going on," she said Log in much "Apparently theperson who hacked it was sending internal messages to my Facebookfriends" The semantics at play here attempt to mask that the hackersimply sent out private messages - a main attraction of the site, mindyou - to the people most readily available under that account Yougenerally have to be accepted as a friend in order to talk to someoneon Facebook, so it's irrational to hack Carolyn Fuller's account tosend messages to unknown people she never accepted Laura Neelonreceived one of those fake messages from Fuller "She said, 'I reallyneed your help,'" Neelon said "There's a status, it said, 'CarolynFuller needs help urgently'" "It said we were robbed at gunpoint inthis small town in England and we have no money and couldn't check outof the hotel because our credit cards were stolen and please send $850via Western Union," Fuller said Neelon said she admits the messageappeared legitimate "It really did," she said "Whoever this personwas in her account knew her husband's name" "They knew my children'snames, my dog's name," Fuller said "It's really frightening" Theindividuals involved in this situation are clearly cave people Howcan you not expect to be held accountable for the content you chooseto put online about yourself The information people so frequentlydivulge and readily give away online is astounding, and all of it canbe used against them Carolyn Fuller take heed: When it comes tosocial networking web sites, people tell all -- who they are, whatthey like to do and what's happening at that exact moment Amusingstory, and I love how at the end some random Internet security expertmakes the suggestion to frequently change username/passwords toprevent future evil doing Well, you simply can't change usernamesthrough most registration systems It's simply never built into thesystem as often as password resets are Oh, and excellent grammar,chief: Internet security experts suggest changing web site logins andpasswords frequently to protect the user "Simply those two pieces ofinformation just allows the cyber criminal access to your circle offriends, your direct connections and, from there, the sky's thelimit," said Jeff Debrosse, of ESET Fuller said she lost control ofher web page once the scammer hacked it I thought we went over thatFacebook eventually shut down the page only after she got on herhusband's Facebook and e-mailed explaining the problem So the usergets screwed in any event, as Facebook couldn't possibly differentiatebetween Carolyn Fuller speaking under the guise of her husband'saccount and the criminal acting upon her behalf How are they to knowThe hacker has the same identifying information Facebook would use toauthenticate Carolyn I'm sure that with enough hackers blindly takingpot shots on easy username/password combinations, all of Facebookcould be brought down, as well as every other social networking siteIt's simply a matter of falsifying an illegal intrusion then reportingit to the proper individuals, and in the proper way, which must beconsistent and seem trustworthy enough</description><link>http://www.secuobs.com/revue/news/99061.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99061.shtml</guid></item>
<item><title>Welcome to the dark side</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - A dark style option has been added for the site that can be toggled onand off via the "Dark Light" links in the top left corner Right nowsome of the source code will be difficult to read - I'm working onthat ;</description><link>http://www.secuobs.com/revue/news/99060.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99060.shtml</guid></item>
<item><title>Log this</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - As crunch bites: Don't neglect the logs Quocirca's Straight Talking:Flushing out vulnerabilitieshttp://softwaresiliconcom/security/0,39024655,39391737,00htm Thisarticle about the importance of logging in computer and networkenvironments by Fran Howarth piqued my curiosity because even thoughthe words 'straight talking' are in its title, to really get to thepoint of this fiasco one must wait until the ninth paragraph It isnot until then that logging is actually referred to, and up to thatpoint mostly the same type of e-columnist dribble we're used to Letme break this down Managing risk, compliance and security areobjectives that still need to be achieved even while organisationsrush to cut costs In case you forgot that business is about makingand not losing, money Fran will let us know when this changesNothing on logging The insider threat in particular has always beena key challenge for organisations and, with staff being made redundantin droves these days, access rights to sensitive company informationmust be revoked quickly The external threat is getting worse as well,as hackers are increasingly targeting corporate networks for financialgain In January 2009 security technology vendor McAfee estimated thatdata theft and breaches cost businesses worldwide approximately $1trin lost intellectual property and expenditures for cleaning up thedamage caused This perpetuation is the real threat that's gettingworse I'd say the actuality is quite flat across the charts - fearthe fired employee, not the hacker Here's how you save moneyregarding the one trillion lost in intellectual property and damagecontrol: stop cleaning it up Nothing on logging All organisationsshould take note In an economic downturn, businesses switch focusfrom acquiring customers to retaining them Any security breach wheredata is lost could damage their reputation and cause customers to jumpship This is always the case: in a recession, and when the cloudsrain gold nuggets Where's the logging Failure to adequately protectinformation and ensure its integrity has not been compromised couldalso lead to organisations being unable to comply with a growingroster of regulations requiring higher data security standardsincluding: the Payment Card Industry Data Security Standard PCI DSS;e-discovery requests, which are commonplace in the US and becomingmore so in Europe; and security breach disclosure legislation, whichis expected to be enacted in the near future by the EU That doesn'tmean anything, move on Closer to logging Because of these factors,protecting data is now one of the top business-driven issues forimproving security and managing risk It's coming In order to provethat security controls are effective and to be able to comply withpotential litigation requests, organisations need to put in place aneffective system for policing information governance, including theability to organise, retrieve and analyse information, as well as toreport on the effectiveness of controls over information access foraudit purposes and for responding to litigation requests such ase-discovery People like to use big words to sound important WhatFran meant to say was logging exists for a reason, use it, but shedoesn't mention it yet This means establishing a system ofelectronics records management across the organisation, covering alldata stores and including both structured data, such as databases, andunstructured information, such as emails and documents The systemmust cover the entire lifecycle of electronics records - includingwhen they are generated, backed up and archived - and must ensure theintegrity of all records is maintained "Due to this untimely andalbeit critical and sensitive nature of what prior circumstances Iaforementioned in my previous remarks, it is of the utmost importanceto erect electronic circuitry monitoring facilities across allelectronic circuitry within your myriad of interconnected circuitryfor the purposes of later investigating, troubleshooting, monitoring,and cleansifying the information pertaining to structured data,databases, UNSTRUCTURED data, other synonyms I've Googled, to ensurethe effectiveness the networking and information technologicalinfrastructure have regarding information access and informationalintegrity" Can I work from home now, too That in itself is adaunting enough challenge But then there are the computer-generatedlog files Log files provide granular information about activities bythe hardware and software on your network, such as which machine triedto gain access to a particular server, at what time and on which dateAnalysis of these log files allows an administrator to compareactivities against expected norms and policies LOGGING Log files maycontain critical information that can throw to light anomalies,whether they are misconfigurations, inappropriate actions byindividuals or evidence of other system vulnerabilities They are thebasis for proving the chain of information custody for governancepurposes, in answering litigation requests, and in performingforensics to find out why something happened Log files may containcritical information, indeed Often, they don't And more than often,they are quite useless The higher up you are on the corporate latter,the more you may push for and appreciate pretty computer generated logreports Work in the mud or get a lot of break-ins and you know theirtrue worth Collecting, storing and recovering log data is a hardtask They are largely undecipherable to humans I can make my catlook like she's reading the log data if I move the mouse across thescreen in just such a fashion as to entice her to stay and look busycontaining line after line of repetitive computer-generated codeYour mom Among the problems are that logs are generated in a varietyof inconsistent formats and must be enriched before they can usefullybe indexed and searched Like, with Vitamin B A quick check againstthree of my own personal logs yields over 30,000 lines of potentialsecurity vulnerabilities, the majority of which, if not all, isabsolutely useless Good luck with that; your administrators, not eventhe sysadmin jr undergrads, are looking at everything Although logfiles provide important information about the security posture ofelectronic networks, log file management and analysis is a problemlargely overlooked in many organisations Log files are big Thismakes them hard to read Some do it manually Your mom does itmanually Booyah while others use homegrown systems Automated logmanagement and analysis is a better way for organisations to discoverand respond to security vulnerabilities that could compromisesensitive data So, pardon if this was already asked, but who analyzesthe logs generated from the automated log management system Byincluding log files in information governance plans, organisations cantake control of data in all forms to minimise risk across theorganisation Some regulations place a lot of emphasis on logs Forexample, the PCI DSS regulation requires that adequate controls are inplace for log management, including collection, review, retention anddestruction of those logs The controls are for show, like convincingpassengers on an airplane that their plummet into the ocean is littlemore than a mid-Summer's day splash to escape the heat Withcompliance, cost control and security key objectives this year,organisations should look closely at the effectiveness of their logmanagement It may seem like a mundane issue but log files can helpflush out vulnerabilities, shield organisations from risk and helpthem meet broader compliance objectives So my problem with thearticle is its arrogance and utterly sad overuse of snobbish words andphrasing This very same story can be summarized as, Log files containongoing attack strings neatly manicured and timestamped to thecomputer's liking and not your own, but will help you identify whereyour network environment may make better use of protection mechanisms,so use 'em and don't lose 'em When you wish to write a story of anygreater length, my suggestion is to at least include a yellow brickroad and ruby slippers</description><link>http://www.secuobs.com/revue/news/99059.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99059.shtml</guid></item>
<item><title>Nion  SSLFail RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Nion and SSLFail feeds have been added</description><link>http://www.secuobs.com/revue/news/99058.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99058.shtml</guid></item>
<item><title>Cursed sponger - update</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Second update: fixed YouTube has added an X-Content-Type-Options:nosniff header to their server that prevents programmaticallydownloading videos unless you're disguised as a browser Well, nowsponger is Revised code shown below Update: YouTube has eitherchanged their linking system or is simply blocking me from all of thetrial runs I've been doing So currently sponger isn't working butI'll look into it A new feature can come of this: proxy support Madea lot of changes to my sponger script that's used for downloadingvideos and playlists from YouTube I've added curses support - apersonal learning experience I went through a couple window/colordesigns before settling on simply making the sponger console resemblethat of a Linux terminal Check out the screenshot to see what I meanThe image helps to show some of the added functionality where thescript doesn't necessarily exit automatically when it encountersthings it doesn't like In this case, I intentionally busted theplaylist name so that sponger had to create its own - same will happenfor videos where their name is not readily available Your PHP installmust be compiled with Ncurses support Also added are a few filesizeroutines, so for each video leeched you'll receive an update on eachvideo's size and their combined total Leech away</description><link>http://www.secuobs.com/revue/news/99057.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99057.shtml</guid></item>
<item><title>WMSPPS forked redux</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I'm just discovering the PHP process control functions and in testingtheir usage against my world's most simplistic PHP port scanners, gotan unexpected result: The forked scanner takes 11x longer to completethan its linear counterpart Obviously all the overhead of forking aprocess for each port to scan is the culprit and a bit overkill forsomething so simple In any event, I'm working on a forked version ofsponger but first have to overcome the hump of doing it with ncursesHere are the two scripts, the first forks and the second doesn't Notethe final completion time at the top of each</description><link>http://www.secuobs.com/revue/news/99056.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99056.shtml</guid></item>
<item><title>Air Force One</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - My brother-in-law protects the president Beat that</description><link>http://www.secuobs.com/revue/news/99055.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99055.shtml</guid></item>
<item><title>arsenal fakeroute 02, Firemole 02, Ping Tunnel ptunnel 070, SSL Sniff 05,  Three Proxy 3proxy 053k</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * fakeroute 02 o fakeroute-02tarbz2 + This is a hack that makes yourmachine appear to UNIX traceroute to be anywhere on the InternetSpecifically, you can define a route to append to the real route thatany arbitrary host on the Internet would see * Firemole 02 ofiremole-02tarbz2 + Firemole is a Firefox extension that allows youto make SSL-encrypted connections to a proxy server, thus eliminatingthe need to encrypt that link using SSH tunnels This is useful if youwant encrypted sessions, but don't want to have to worry aboutmaintaining an SSH tunnel Or maybe you'd like to give others accessto a proxy server without giving them SSH access Firemole supportssimultaneous access to multiple proxy servers, each of which can beconfigured with regular expressions to match URLs So you can have aproxy server that Google search requests are automatically directed toas well as a proxy server that work URLs are automatically directedto Or you can configure Firemole to proxy some URL patterns but letother traffic pass without being proxied * Ping Tunnel ptunnel 070o pingtunnel-070tarbz2 + Ptunnel is an application that allows youto reliably tunnel TCP connections to a remote host using ICMP echorequest and reply packets, commonly known as ping requests andreplies At first glance, this might seem like a rather useless thingto do, but it can actually come in handy in some cases The followingexample illustrates the main motivation in creating ptunnel: You're onthe go, and stumble across an open wireless network The network givesyou an IP address, but won't let you send TCP or UDP packets out tothe rest of the Internet, for instance to check your mail What to doBy chance, you discover that the network will allow you to ping anycomputer on the rest of the Internet With ptunnel, you can utilizethis feature to check your mail, or do other things that require TCPPtunnel is not a feature-rich tool by any means, but it does what itadvertises So here is what it can do: tunnel TCP using ICMP echorequest and reply packets; connections are reliable lost packets areresent as necessary; handles multiple connections; acceptablebandwidth 150 kb/s downstream and about 50 kb/s upstream are thecurrently measured maximums for one tunnel, but with tweaking this canbe improved further; and, authentication, to prevent just anyone fromusing your proxy To make all of this work you will need one computeraccessible on the Internet that is not firewalled or at least allowsincoming ICMP packets; a computer to act as the client this willusually be your laptop, on the go; root access, preferably on bothcomputers; a posix-compliant OS, with libpcap for packet capturing;and/or, Windows with mingw and WinPcap installed * SSL Sniff 05 osslsniff-05tarbz2 + This tool was originally written to demonstrateand exploit IE's vulnerability to a specific man-in-the-middle attackWhile Microsoft has since fixed the vulnerability that allowed leafcertificates to act as signing certificates, this tool is stilloccasionally useful for other purposes It is designed to MITM all SSLconnections on a LAN, and dynamically generates certs for the domainsthat are being accessed on the fly The new certificates areconstructed in a certificate chain that is signed by any certificatethat you provide For a long time this was still useful in itsoriginal context with the default certificate that was provided, ascertificates that were generated by non-singing certificates that wereexpired would trigger a click-through warning in some browsers whichindicated the certificate in question was expired, but not that thewhole certificate chain was completely invalid These days somebrowsers, specifically Firefox 3, are more heavy-handed SSL Sniff isalso useful for deploying other vulnerabilities as well, some of whichare public knowledge This is the tool that the people who pulled therecent MD5 hash collision publicity stunt used to demonstrate MITMattacks with their rogue CA-certificate * Three Proxy 3proxy 053ko threeproxy-053ktarbz2 + 3proxy is a universal freeware proxyserver with HTTP, HTTPS, SOCKS v4, SOCKS v4a, SOCKS v5, FTP, POP3, UDPand TCP portmapping, access control, bandwidth control, trafficlimitation, and accounting based on user name, client IP, target IP,day time, day of week, etc</description><link>http://www.secuobs.com/revue/news/99054.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99054.shtml</guid></item>
<item><title>Done with the highlight search</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - All of the code samples have been changed, for two reasons First ofwhich is due to the dark theme - which still makes it somewhatdifficult to make out some of the code - and the second, is I gottired of having all those RGB files laying around It's been an uphillstruggle finding a suitable syntax highlighter so thanks go to thoseon the Quanta mailing list that bothered replying back andrecommending GeSHi It has turned out to be flexible enough to allowdynamic adjustments in coloring without having to create a second copyof the damned thing to use against differing background colors So farmy only complaint with GeSHi is that the third-party module functions,like ncurses, aren't included by default I'll go through my configand put it up here if it's significant enough or anybody requests itTop of my head I can think of also adding the mhash, pcntl, and bzip2funcs 'Til then</description><link>http://www.secuobs.com/revue/news/99053.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99053.shtml</guid></item>
<item><title>Would you pay for a YouTube video</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I sure wouldn't, not when things like sponger exist Still they try Seelink for images</description><link>http://www.secuobs.com/revue/news/99052.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99052.shtml</guid></item>
<item><title>An improved GeSHi</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Here I wrote about GeSHi and how I wanted to add third-party functionsthat had not existed to the config I have now done that and it seemsto work good enough, though the function links are a bit overwhelmingespecially with all those curses funcs a quick CSS hack will cleanthat up later on Strangely enough GeSHi segfaults when attempting tohighlight its own configuration file so I offer to you instead anexample PHP script that does absolutely nothing but demonstrate howthe added keywords, constants, and functions arebold/underlined/linked when previously they were not Theconfiguration file is below, as well xD at the lone hash_hmac notlinked It exists, I have proof It's a conflict between the constantwith the same name, whatever See link for code and config</description><link>http://www.secuobs.com/revue/news/99051.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99051.shtml</guid></item>
<item><title>arsenal dnsmap 022  SSL Strip 01</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * dnsmap 022 o dnsmap-022tarbz2 + Originally released in 2006,dnsmap is mainly meant to be used by pentesters during the informationgathering/enumeration phase of infrastructure security assessmentsDuring the enumeration stage, the security consultant would typicallydiscover the target company's IP netblocks, domain names, phonenumbers, etc dnsmap was included in BackTrack 2 and 3, although theversion included is the now dated version 01 Subdomain brute-forcingis another technique that should be used in the enumeration stage, asit's especially useful when other domain enumeration techniques suchas zone transfers don't work This latest release has the followingfeatures: saving the results in human-readable and CSV format for easyprocessing; fixed bug that disallowed reading wordlists with DOS CRLFformat; improved built-in subdomains wordlist; new Bash scriptdnsmap-bulksh included which allows running dnsmap against a listof domains from a user-supplied file ie: bruteforcing severaldomains in a bulk fashion; and, bypassing of signature-based dnsmapdetection by generating a proper pseudo-random subdomain when checkingfor wildcards * SSL Strip 01 o sslstrip-01tarbz2 + This toolprovides a demonstration of the HTTPS stripping attacks presented byMoxie Marlinspike at Black Hat DC 2009 It will transparently hijackHTTP traffic on a network, watch for HTTPS links and redirects, thenmap those links into either look-alike HTTP links or homograph-similarHTTPS links It also supports modes for supplying a favicon whichlooks like a lock icon, selective logging, and session denial</description><link>http://www.secuobs.com/revue/news/99050.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99050.shtml</guid></item>
<item><title>Last free copy of Helix</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Helix project has become commercial and thus is no longer free Ihave put in the library the final release of Helix made available tothe public where it shall remain as an alternative for those that donot wish to pay for something that ought to have remained freesoftware Helix 2008r1 ** helix-2008r1tarbz2 This is the finalrelease of Helix that is free to the public Helix is a customizeddistribution of the Knoppix Live Linux CD Helix is more than just abootable live CD You can still boot into a customized Linuxenvironment that includes customized Linux kernels, excellent hardwaredetection and many applications dedicated to incident response andforensics Helix has been modified very carefully to NOT touch thehost computer in any way and it is forensically sound Helix wil notauto mount swap space, or auto mount any attached devices Helix alsohas a special Windows autorun side for incident response andforensics Helix focuses on incident response et forensics tools It ismeant to be used by individuals who have a sound understanding ofincident response and forensic techniques</description><link>http://www.secuobs.com/revue/news/99049.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99049.shtml</guid></item>
<item><title>library New files for February 26th, 2009</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info -  * A86 Assembler Package o + Assembly a86-assembler-packageericisaacsontarbz2 * Acceptable Use: Whose Responsibility Is It o +Articles et Reference acceptable-use-whose-responsibility-is-itpattilawrencepdf * Advances In Endpoint Data Security: New Technology toMeet Security, Operations, et Compliance Needs o + Articles et Referenceadvances-in-endpoint-data-security-new-technology-to-meet-security-operations-and-compliance-needscredantpdf* A Guide to Security Metrics o + Articles et Referencea-guide-to-security-metricsshirley c paynepdf * Aligning anInformation Risk Management Approach to BS 7799-3:2005 o + Articles etReferencealigning-an-information-risk-management-approach-to-bs-7799-3-2005lorihomsherpdf * Analyzing Attack Surface Code Coverage o + Articles etReference analyzing-attack-surface-code-coveragejustin seitzpdf *An Anarchist Critique of Democracy o + Miscellaneousan-anarchist-critique-of-democracyaudio anarchy radiotxt * AnApproach to Application Security o + Articles et Referencean-approach-to-application-securityian rathiepdf * An Introductionto Information system Risk Management o + Articles et Referencean-introduction-to-information-system-risk-managementsteve elkypdf* An Overview of Threat et Risk Assessment o + Articles et Referencean-overview-of-threat-and-risk-assessmentjames baynepdf *Anti-Hacking the Protection of Computers o + Articles et Referenceanti-hacking-the-protection-of-computerschadd schlotterpdf * APerspective on Threats in the Risk Analysis Process o + Articles etReference a-perspective-on-threats-in-the-risk-analysis-processarthurnicholspdf * Application Development Technology et Tools:Vulnerabilities et Threat Management With Secure Programming Practices,A Defense-in-Depth Approach o + Articles et Referenceapplication-development-technology-and-tools-vulnerabilities-and-threat-management-with-secure-programming-practices-a-defense-in-depth-approachvilasl ankolekarpdf * Application Firewalls: Don't Forget About Layer 7 o+ Articles et Referenceapplication-firewalls-don't-forget-about-layer-7russell eubankspdf* Application of the NSA Infosec Assessment Methodology o + Articles etReferenceapplication-of-the-nsa-infosec-assessment-methodologykathryncrosspdf * Application Security, Information Assurance's NeglectedStepchild: A Blueprint for Risk Assessment o + Articles et Referenceapplication-security-information-assurance's-neglected-stepchild-a-blueprint-for-risk-assessmenttedminapdf * A Practical Guide to Auditing an ASP o + Articles etReference a-practical-guide-to-auditing-an-aspjosie ollingerpdf * AQualitative Risk Analysis et Management Tool: CRAMM o + Articles etReference a-qualitative-risk-analysis-and-management-tool-crammzekiyazarpdf * Assessing Vendor Application Security: A Practical Way toBegin o + Articles et Referenceassessing-vendor-application-security-a-practical-way-to-beginbart lhubbspdf * A Taxonomy of Information Systems Audits, Assessments etReviews o + Articles et Referencea-taxonomy-of-information-systems-audits-assessments-and-reviewscraigs wrightpdf * Auditing a Corporate Log Server o + Articles etReference auditing-a-corporate-log-serverroger meyerpdf * Auditingin-Depth for Solaris o + Articles et Referenceauditing-in-depth-for-solarisjeff pikepdf * Auditing Inside theEnterprise via Port Scanning et Related Tools o + Articles et Referenceauditing-inside-the-enterprise-via-port-scanning-and-related-toolsbobkonigsbergpdf * Auditing Nokia Firewall o + Articles et Referenceauditing-nokia-firewallrichard sokalpdf * Automated Scanning ofOracle 10g Databases o + Articles et Referenceautomated-scanning-of-oracle-10g-databasesrory mccunepdf *BASE: A Security Assessment Methodology o + Articles et Referencebase-a-security-assessment-methodologygregory brauntonpdf * Blender+ Indigo Under Linux o + Articles et Referenceblender-indigo-under-linuxjoe giampaolipdf * Case Study: TruSecureSecurity Certification o + Articles et Referencecase-study-trusecure-security-certificationdavid vospdf *Certification et Accreditation: A Madman's Dilemma - Controls o +Articles et Referencecertification-and-accreditation-a-madman's-dilemma-controlssanspdf* Certification et Accreditation: A Madman's Dilemma - Costs o +Articles et Referencecertification-and-accreditation-a-madman's-dilemma-costssanspdf *Certification et Accreditation for Dummies o + Articles et Referencecertification-and-accreditation-for-dummiessanspdf * Certificationet Accreditation Versus System Development Life Cycle Management o +Articles et Referencecertification-and-accreditation-vs-system-development-life-cycle-managementisacapdf* Closing Internal User Visibility et Data Governance Gaps withPacketMotion o + Articles et Referenceclosing-internal-user-visibility-and-data-governance-gaps-with-packetmotionemapdf* Conducting An Electronic Information Risk Assessment forGramm-Leach-Blily Act Compliance o + Articles et Referenceconducting-an-electronic-information-risk-assessment-for-gramm-leach-bliley-act-compliancekevinm bongpdf * Conducting a Penetration Test on an Organization o +Articles et Referenceconducting-a-penetration-test-on-an-organizationchan tuck waipdf *Conducting a Security Audit of an Oracle Database o + Articles etReference conducting-a-security-audit-of-an-oracle-databaseegilandresenpdf * Creating a Comprehensive Vulnerability AssessmentProgram for a Large Company Using QualysGuard o + Articles et Referencecreating-a-comprehensive-vulnerability-assessment-program-for-a-large-company-using-qualysguardtimproffittpdf * Creating IDA Plugins With C# or VB6 o + Articles etReference creating-ida-plugins-with-c#-or-vb6dzzietxt * Database:The Final Firewall o + Articles et Referencedatabase-the-final-firewalls brian suddethpdf * Data-CentricQuantitative Computer Security Risk Assessment o + Articles etReferencedata-centric-quantitative-computer-security-risk-assessmentbrettbergerpdf * Defeating HyperUnpackMe2 With an IDA Processor Module o+ Articles et Referencedefeating-hyperunpackme2-with-an-ida-processor-modulerolfrollestxt* Defining a Risk Assessment Process for Federal Security Personnel o+ Articles et Referencedefining-a-risk-assessment-process-for-federal-security-personnelkathleenfedericopdf * Deploying a Secure Web Application: From a CodingPerspective o + Articles et Referencedeploying-a-secure-web-application-from-a-coding-perspectivejaimespicciatipdf * Distributed Object Technology: Security Perspective o+ Articles et Referencedistributed-object-technology-security-perspectivesubbucherukuwadapdf * Distributed Scan Model for Enterprise-Wide NetworkVulnerability Assessment o + Articles et Referencedistributed-scan-model-for-enterprise-wide-network-vulnerability-assessmentsanspdf* Distributed Systems Security: Java, CORBA, et COM+ o + Articles etReference distributed-systems-security-java-corba-and-com+april lmorenopdf * Evaluating Untrusted Software in a ControlledEnvironment o + Articles et Referenceevaluating-untrusted-software-in-a-controlled-environmentjeffreavapdf * February 2009 Spam Report o + Articles et Referencefebruary-2009-spam-reportmcafeepdf * File Format Reversing:EverQuest II VPK o + Articles et Referencefile-format-reversing-everquest-2-vpkdaekentxt * Footprinting: WhatIs It, Who Should Do It, et Why o + Articles et Referencefootprinting-what-is-it-who-should-do-it-and-whyjames p mcgreevypdf* Footprint Your Intranet o + Articles et Referencefootprint-your-intranetbob brownpdf</description><link>http://www.secuobs.com/revue/news/99048.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99048.shtml</guid></item>
<item><title>Voodoo Labs RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The Voodoo Labs feed has been added English posts will come</description><link>http://www.secuobs.com/revue/news/99047.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99047.shtml</guid></item>
<item><title>bLackhammer  Didier Stevens RSS</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The bLackhammer and Didier Stevens feeds have been added</description><link>http://www.secuobs.com/revue/news/99046.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99046.shtml</guid></item>
<item><title>urchinCrackhead - update</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - This is just a quick idea I had to stop urchinTracker - usually afunction called from Google Analytics but still prevails when you haveGA blocked - from watching your every move It's a GreaseMonkey scriptthat simply embeds its own urchinTracker function into the currentpage Currently runs on any domain unless I decide to hone it down tojust a few, mostly YouTube and such Only thing I haven't verified isthat the original urchinTracker is never actually called afterexecuting this code I don't imagine it is Update: Verified I ran atest both ways the JavaScript can be included, on the page directlyand through an HTML include, and urchinCrackhead works asexpectedSee link for code</description><link>http://www.secuobs.com/revue/news/99045.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99045.shtml</guid></item>
<item><title>Bash Scripting #3</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Bash Scripting #3 - A multi-phase Bash shell fondu</description><link>http://www.secuobs.com/revue/news/99044.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99044.shtml</guid></item>
<item><title>Site additions: pagination and PGP</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - The arsenal, library, BBS, and news sections have all been paginated, orspread across multiple pages to make navigating them easier It's asweet deal, was easy to implement thanks to PEAR's Pager class, andwound up to be as configurable as I required for linking up everythinghere the way I wanted - and sure beats writing my own routines to dothe same thing Hope that helps those of you on slower connectionsfrom having to wait on slow loading pages; the Articles et Referencelibrary category actually had over 110 items on one page Yeah, thisis an improvement Do note that the links to tools and files in thelibrary are somewhat broke as they span across several pages ratherthan just one; I should have a fix for this possibly later today Myprevious PGP key has been replaced with this public key that I shallbe using to sign files residing on the server Currently the arsenalhas this functionality built in library will take time, so if youwish to verify the integrity of, say, the Netcat binarynetcat-071tarbz2, its corresponding signature file is in the samedirectory ending in "gpg": netcat-071tarbz2gpg The links arepart of each tool's description so no worries on memorizing that ;PIf you wish to take advantage of PGP and prefer command line as muchas I do, do the following % wget --no-check-certificatehttps://kinqpinzinfo/contact/kinqpinzpubkey % gpg --importkinqpinzpubkey gpg: key F70B4BEF: public key "meathive kinqpinzinfo- now in plain text mode " imported gpg: Total number processed: 1gpg: imported: 1 I'm not big on signing keys that aren't my own sothis step may require something extra for you I was signing my ownpublic key with its corresponding private key here; added forthoroughness % gpg --sign-key meathive "meathive kinqpinzinfo -now in plain text mode " was already signed by key F70B4BEF Nothingto sign with key F70B4BEF Key not changed so no update needed % wget--no-check-certificatehttps://kinqpinzinfo/arsenal/n/netcat-071tarbz2gpg % gpg--verify netcat-071tarbz2gpg gpg: Signature made Fri 06 Mar 200901:46:29 PM MST using DSA key ID F70B4BEF gpg: Good signature from"meathive kinqpinzinfo - now in plain text mode " gpg: WARNING:This key is not certified with a trusted signature gpg: There is noindication that the signature belongs to the owner Primary keyfingerprint: ACA3 B26F B692 733E 491E 0118 45F3 993F F70B 4BEF</description><link>http://www.secuobs.com/revue/news/99043.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99043.shtml</guid></item>
<item><title>toxic video leecher revision - update</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - Update: parallel video downloading has been added which greatly improvesthis script's performance You can leech however many videos you wishby supplying them on the command The first argument should be flv orwmv, the video format, followed by the video URLs The streaming Flashformat flv is much smaller than that of wmv, but likely of meagerquality Too bad the videos on NothingToxic's site are so lame; I amnow working on releasing a revamped sponger as fast as this I've hadthis damned video leech script sitting around for so long I've decidedto finally breathe new life into it It just downloads files fromhttp://nothingtoxiccom/, and quite unamazingly does just that, but atleast the guts look neat It's kind of all over the place and I likethat It has given me another chance to try out a few cURL options,console coloring, regex delimitersand, obviously, code formattingCheers See link for code and image</description><link>http://www.secuobs.com/revue/news/99042.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99042.shtml</guid></item>
<item><title>pasteybin - a pastebincom sensitive information stealer</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - This is a script I wrote to automate the downloading of files recentlyadded to http://pastebincom/, basically a domain where you canquickly put a code snippet or configuration file online for somebodyelse to help you debug or download I don't take credit for the ideaof what this thing can do, thanks go to klaymen in the #kinqpinz IRCchannel for that The main function will find the links under 'RecentPosts' on the homepage, create download links for each match found,gets the corresponding file name, checks if each file already existsin the download directory defaults to /pastebin/, and if not,continues to download There are 10 links available at any given timeAll files are leeched in parallel and very quickly Here is what toexpect % /pasteybinphp pasteybin-file d25d1de27txt exists,skipping pasteybin-file m703558c9txt exists, skippingpasteybin-file m2c156ef7txt exists, skipping pasteybin-filem1ba94d24txt exists, skipping pasteybin-got m7b0073d4htmlpasteybin-got m24bc714etxt pasteybin-got d76b5679btxtpasteybin-got m7015d4b4txt pasteybin-got m47210055cpppasteybin-got m32fc2a5atxt pasteybin-took 1236727426243seconds Since the links are updated quite often it makes sense to keepon checking for updates The delay between how often you should checkfor new entries will vary, but my tests show that approximately every2 minutes can provide entirely new files consistently Here is avariation you can use in your favorite Linux terminal It will run asusual, echo to the stdout how many files are currently in yourpossession, sleep for 2 minutes, and repeat for ;;; do/pasteybinphp; echo "pasteybin-has leeched "$$ls -lpastebin|wc-l-1"files so far"; sleep 120; done This would yield theusual output with an additional line corresponding to the current filecount: pasteybin-file m411c3adbc exists, skippingpasteybin-file m691a8a1cpp exists, skipping pasteybin-filed126b85dexml exists, skipping pasteybin-file m631d033ctxtexists, skipping pasteybin-file m7bd7c3b5txt exists, skippingpasteybin-file d2c64cea7cpp exists, skipping pasteybin-filem41e3a50ctxt exists, skipping pasteybin-file d4d27f01ftxtexists, skipping pasteybin-file m9d0e091txt exists, skippingpasteybin-got m674ad13ctxt pasteybin-took 12367278272861seconds pasteybin-has leeched 273 files so far Why is all of thisso useful Well, have a look % grep -i mysql_* *|wc -l 124 % grep-i pass* *|wc -l 201 % grep -i user* *|wc -l 874 % grep -idatabase* *|wc -l 52 % grep -i credit* *|wc -l 13 See link forcode</description><link>http://www.secuobs.com/revue/news/99041.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99041.shtml</guid></item>
<item><title>pasteybin - too soon for a revision ;</title><description>Secuobs.com : 2009-05-20 05:36:50 - kinqpinz.info - I have written a revised version of my pasteybin script that magicallydownloads files that can potentially contain sensitive informationfrom pastebin Well, I was on the hunt for companion sites to pastebinand came upon http://wowipasteynet/ - no, I don't like the name,either The site has a better look and more flexible code formattingincluding much better language and highlighting support Unsure ofwhether or not it can pick up as much steam as pastebin - new entriesare apparently further separated and infrequent - I'm keeping bothscripts intact so that I can easily remove this revision ifwowipasteynet turns out to be a flop Trial runs lead me to think sobut here it is for now See link for code</description><link>http://www.secuobs.com/revue/news/99040.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/99040.shtml</guid></item>
</channel>
</rss>
 
<?xml version="1.0" encoding="utf-8"?>
<rss version="0.92">
<channel>
<title>SecuObs.com</title>
<link>http://www.secuobs.com</link>
<description>Observatoire de la securite Internet</description>
<language>fr</language>
<webMaster>webmaster@secuobs.com</webMaster>
 <item><title>Local buffer overflow exploit  reverse shell</title><description>2009-07-11 23:21:37 -  kinqpinz.info  : Well, I'm still working on a suitable Linux screen recording solution Xvidcap's constant seg faults and poor quality aren't worth it  vnc2swf, which is what I used for this video, encodes using some arcane method that none of the dozen or so programs I've ran against the final SWF have been able to convert to a real video that I can add some gangster music to Once I figure that out I'll just replace the video </description><link>http://www.secuobs.com/revue/news/119648.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/119648.shtml</guid></item>
</channel>
</rss>
 
