Tag Archive: Security learning

Lockbin

Lockbin is a web application for sending private email messages and files. It’s free! People use it to send things like credit card numbers or confidential information. Lockbin protects messages in transit with 256-bit TLS/SSL, while FIPS 140-2 verified AES-256 bit encryption protects messages at rest. https://lockbin.com/  

Permanent link to this article: http://www.darknessgate.com/2016/09/15/lockbin/

Framework for Improving Critical Infrastructure Cybersecurity

The Framework is voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders. https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf

Permanent link to this article: http://www.darknessgate.com/2016/09/04/framework-for-improving-critical-infrastructure-cybersecurity/

StartPage

StartPage by Ixquick (www.ixquick.com) combines the powerful search results of Google with the strong privacy features of Ixquick, the world’s most private search engine. The result is great search results – with total privacy protection! No IP addresses are stored, no personal data is gathered or passed on to third parties, and no identifying cookies …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/09/01/startpage/

sslstrip

This tool provides a demonstration of the HTTPS stripping attacks that I presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/03/15/sslstrip/

Aircrack-ng

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/12/aircrack-ng-3/

Magnet RAM Capture

Magnet RAM Capture is a free imaging tool designed to capture the physical memory of a suspect’s computer, allowing investigators to recover and analyze valuable artifacts that are often only found in memory. Magnet RAM Capture has a small memory footprint, meaning investigators can run the tool while minimizing the data that is overwritten in …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/12/magnet-ram-capture/

Alpine Linux

Alpine Linux is a community-developed operating system designed for x86 Routers, Firewalls, VPNs, VoIP and servers. Alpine Linux is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Alpine Linux with anyone for absolutely nothing. Alpine Linux was designed with security in mind. It …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/17/alpine-linux/

Permanent link to this article: http://www.darknessgate.com/2014/11/06/exiv2/

Network and Computer Security

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department’s Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/17/network-computer-security/

Introduction to computer forensics and investigations

Learning outcomes an understanding of the role of computer forensics in both the business and private world identify some of the current techniques and tools for forensic examinations describe and identify basic principles of good professional practice for a forensic computing practitioner become familiar with some forensic tools and know how to apply them in …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/13/introduction-computer-forensics-investigations/

Emerging Security Vulnerabilities & the Impact to Business

This informational video examines what information technology professionals and Web programmers need to know about security, what security is needed and how to implement appropriate security. The web video examines the most common security vulnerabilities, as well as which software programs are most vulnerable. The video also focuses on specific cyber attacks, such as SQL …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/13/emerging-security-vulnerabilities-impact-business/

Page 3 of 1112345...Last »