blog.sebastien.raveau.name
Tricks of the Trade: A great loss
http://blog.sebastien.raveau.name/2013/11/a-great-loss.html
Tricks of the Trade. Monday, November 11, 2013. I wish I were breaking radio silence with something else but I just received confirmation that Cédric Blancher. The security researcher and friend whom I was referring to in my previous post, died in an accident yesterday. Subscribe to: Post Comments (Atom). View my complete profile. Follow me on Twitter. Joshua D. Abraham.
blog.sebastien.raveau.name
Tricks of the Trade: Playing with DNS servers... some more
http://blog.sebastien.raveau.name/2009/02/playing-with-dns-servers-some-more.html
Tricks of the Trade. Tuesday, February 17, 2009. Playing with DNS servers. some more. Killing time in the metro by listening to podcasts of past security conferences, I got the idea of using DNS caches to check IP-spoofing capability. Now, the easiest way to check if you can send packets to the Internet with a fake source IP address would be with two computers (in different ASs), but that's no fun, is it? June 29, 2010 at 10:13 AM. Thanks to Archangel Amael from the Backtrack Forums for reporting the pro...
blog.sebastien.raveau.name
Tricks of the Trade: February 2009
http://blog.sebastien.raveau.name/2009_02_01_archive.html
Tricks of the Trade. Tuesday, February 17, 2009. Playing with DNS servers. some more. Killing time in the metro by listening to podcasts of past security conferences, I got the idea of using DNS caches to check IP-spoofing capability. Now, the easiest way to check if you can send packets to the Internet with a fake source IP address would be with two computers (in different ASs), but that's no fun, is it? Subscribe to: Posts (Atom). View my complete profile. Follow me on Twitter. Joshua D. Abraham.
blog.sebastien.raveau.name
Tricks of the Trade: December 2009
http://blog.sebastien.raveau.name/2009_12_01_archive.html
Tricks of the Trade. Sunday, December 6, 2009. On the legal uncertainty surrounding security education in France. By Cédric Blancher of EADS (in French sorry, automated translation to English here. Basically it discusses a highly subject to interpretation French law. That criminalizes informing people about dangers in Information Technology, and has me pulling my hair out to find interesting yet completely inoffensive. Stuff to tell you on Information Security. Subscribe to: Posts (Atom).
blog.sebastien.raveau.name
Tricks of the Trade: April 2009
http://blog.sebastien.raveau.name/2009_04_01_archive.html
Tricks of the Trade. Friday, April 17, 2009. Just a quick tip before the big monthly blog post :-). Today I was asked by a friend if it was possible to assign different network interfaces to different programs for their Internet traffic. As bandwidth-intensive applications are often also the ones that don't really require privacy, one could imagine categorizing programs in a way so as to watch Internet TV over the Wi-Fi network while corresponding over the cable. Create a "wifi" user. Sudo -u wifi vlc.
digi.ninja
Pipal, Password Analyser - DigiNinja
https://digi.ninja/projects/pipal.php
Pipal, Password Analyser. On most internal pen-tests I do I generally manage to get a password dump from the DC. To do some basic analysis on this I wrote Counter. And since I originally released it I've made quite a few mods to it to generate extra stats that are useful when doing reports to management. Recently a good friend, n00bz. Who I'd like to give a big thanks to. Seeing as there have been so many changes to the underlying code I also decided to change the name ( see why. And do a full new release.
easymactips.blogspot.com
Mac Tips and "How To" On a Mac: September 2012
http://easymactips.blogspot.com/2012_09_01_archive.html
Mac Tips and "How To" On a Mac. After 20 years on windows and pc, it took me 2 days on a Mac to realize that I wasted 20 years of my life on windows. Bummer. The highest form of ignorance is when you reject something you don't know anything about. Wayne Dyer (b 1940). John The Ripper Tutorial, Examples and Optimization. John The Ripper Mac Installation, Tutorial and Optimization. A while ago, I wrote this tutorial. On how to install the simple version (pre-compiled) of John The Ripper on a Mac. The insta...
blog.sebastien.raveau.name
Tricks of the Trade: November 2013
http://blog.sebastien.raveau.name/2013_11_01_archive.html
Tricks of the Trade. Monday, November 11, 2013. I wish I were breaking radio silence with something else but I just received confirmation that Cédric Blancher. The security researcher and friend whom I was referring to in my previous post, died in an accident yesterday. Subscribe to: Posts (Atom). View my complete profile. Follow me on Twitter. Joshua D. Abraham.
blog.sebastien.raveau.name
Tricks of the Trade: January 2009
http://blog.sebastien.raveau.name/2009_01_01_archive.html
Tricks of the Trade. Monday, January 12, 2009. More on encrypted repositories and the usage of EncFS. Judiciously pointed out to me, synchronizing block-ciphered data (typically Rsync EncFS in aes-256-cbc mode, which I mentioned yesterday) will induce a slight overhead on the amount of transferred data, because of block padding. This means software like Rsync could indeed benefit from internal support for repository-encryption. From the University of California and IBM shows. Feature is enabled in EncFS,...
blog.sebastien.raveau.name
Tricks of the Trade: Per-process routing
http://blog.sebastien.raveau.name/2009/04/per-process-routing.html
Tricks of the Trade. Friday, April 17, 2009. Just a quick tip before the big monthly blog post :-). Today I was asked by a friend if it was possible to assign different network interfaces to different programs for their Internet traffic. As bandwidth-intensive applications are often also the ones that don't really require privacy, one could imagine categorizing programs in a way so as to watch Internet TV over the Wi-Fi network while corresponding over the cable. Create a "wifi" user. Sudo -u wifi vlc.
SOCIAL ENGAGEMENT