DNR's Suggested Readings

No explicit questions like "how do I hack xxx.com" please!
Locked
User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

DNR's Suggested Readings

Post by DNR »

I will start putting a few of my favorite reads here. They are stored on the suck-o.net for archive.

Bots and Botnets
http://digitalnomad.suck-o.net/DNR/red/bots.pdf
http://digitalnomad.suck-o.net/DNR/red/ ... otnets.pdf
http://digitalnomad.suck-o.net/DNR/red/spambot.pdf

Build a computer
http://digitalnomad.suck-o.net/DNR/red/ ... mputer.pdf

Infrastructure security
http://digitalnomad.suck-o.net/DNR/red/c4ispbunker.pdf

Sentrol Security devices/physical security
http://digitalnomad.suck-o.net/DNR/red/security.pdf

Router Security -NSA
http://digitalnomad.suck-o.net/DNR/red/cis-security.zip

Forensic Examination of Digital Evidence:
A Guide for Law Enforcement

http://digitalnomad.suck-o.net/DNR/red/ ... ensics.pdf -91pg

Digital Dispatch Surveillance Standard - a cellphone snoop primer
http://digitalnomad.suck-o.net/DNR/red/ddss-01.zip

David Maynor lecture on Trojans
http://digitalnomad.suck-o.net/DNR/red/dmaynor.pdf

Using FPGAs to Parallelize Dictionary Attacks for Password Cracking
http://digitalnomad.suck-o.net/DNR/red/fpgahacking.pdf

Using Google for hacking
http://digitalnomad.suck-o.net/DNR/red/ ... sguide.pdf
http://digitalnomad.suck-o.net/DNR/red/ ... acking.pdf

Bypass web security with HTTP verb tampering
http://digitalnomad.suck-o.net/DNR/red/ ... tamper.pdf

Intro to satellites
http://digitalnomad.suck-o.net/DNR/red/Intro_sats.pdf
http://digitalnomad.suck-o.net/DNR/red/ ... om2008.pdf
http://digitalnomad.suck-o.net/DNR/red/easysat.pdf

US Army War College - Information Operations
http://digitalnomad.suck-o.net/DNR/red/io-primer.zip

Chap 8 -No-Tech Hacking
by Johnny Long

http://digitalnomad.suck-o.net/DNR/red/ ... xcerpt.pdf

Exploiting WDM
http://digitalnomad.suck-o.net/DNR/red/paper-wdm.pdf

AT&T security
http://digitalnomad.suck-o.net/DNR/red/ ... ec_ATT.pdf

Bruce Schneier "The Psychology of Security"
http://digitalnomad.suck-o.net/DNR/red/psyofsec.pdf

Web Application Kung-Fu, The
Art of Defense
Shreeraj Shah

http://digitalnomad.suck-o.net/DNR/red/sheeraj.pdf

TerrestrialWAN - Internet Plumbing
http://digitalnomad.suck-o.net/DNR/red/ ... alWAN.html

Trojan detection in IC chips
http://digitalnomad.suck-o.net/DNR/red/trojan_IC.pdf

Universal Plug and Play, hacking
http://digitalnomad.suck-o.net/DNR/red/upuppaper.pdf

collection for USB study
http://digitalnomad.suck-o.net/DNR/red/usb_study.zip

Fingerprinting 802.11 Devices
http://digitalnomad.suck-o.net/DNR/red/ ... finger.pdf

A Guide to Wardriving and Detecting Wardrivers
http://digitalnomad.suck-o.net/DNR/red/ ... rivers.pdf

Web Browsers
http://digitalnomad.suck-o.net/DNR/red/web_browsers.pdf

Security & Vulnerability Analysis of
Wireless Messaging Protocols &
Applications

http://digitalnomad.suck-o.net/DNR/red/ ... otocol.pdf

Wireshark/packet sniffing tutorial
http://digitalnomad.suck-o.net/DNR/red/wiresharktut.pdf
Last edited by DNR on 16 Sep 2009, 16:32, edited 3 times in total.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Windows Forensics

Windows Thumb DB file
http://digitalnomad.suck-o.net/DNR/red/win_thumb_db.pdf
Windows Registry
http://digitalnomad.suck-o.net/DNR/red/win_registry.pdf

Hacking Secrets 77pgs
http://digitalnomad.suck-o.net/DNR/red/ ... ecrets.pdf

Cable modem hacking: Everything the cable company does not want you to know 330pgs 21mb PDF
http://digitalnomad.suck-o.net/DNR/red/cable_modem.zip

Black Hat Las Vegas 2006 "Hacking the Intranet from the outside" 5.4mb 36pgs
http://digitalnomad.suck-o.net/DNR/red/grossman.pdf


DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Last edited by DNR on 30 Jun 2009, 22:01, edited 1 time in total.
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
Stavros
ΜΟΛΩΝ ΛΑΒΕ
ΜΟΛΩΝ ΛΑΒΕ
Posts: 1098
Joined: 02 Jan 2006, 17:00
18
Location: Mississippi, U.S.A.

Post by Stavros »

Speaking on this subject would you happen to have any texts on Wifi Triangulation and defeating it?

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

http://www.blackalchemy.to/project/fakeap/
Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. As part of a honeypot or as an instrument of your site security plan, Fake AP confuses Wardrivers, NetStumblers, Script Kiddies, and other undesirables.

Fake AP is a proof of concept released under the GPL.

Fake AP runs on Linux (tested on RedHat 7.3). For *BSD versions, see the links below.

Perl 5.6 or later

One or more Prism2/2.5/3 based 802.11b cards with the CVS version of the Host AP Driver for Intersil Prism2/2.5/3 working
Also check this
http://rfakeap.tuxfamily.org/


DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Al-Queda manual

http://digitalnomad.suck-o.net/DNR/red/ ... manual.zip



*note my posting this does not mean I support Al-queda - so don't solicit me for donations.
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
nightkid
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 306
Joined: 27 May 2007, 16:00
16
Location: interwebz

Post by nightkid »

damn nice information DNR..i plan to print all of these off and binder them...print them off at the library of course :)
[img]http://img.photobucket.com/albums/v328/trenchcoatskrilla/biohazard.gif[/img]

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

new uploads


MANET-Mobile Ad-Hoc NETwork-.mil

http://digitalnomad.suck-o.net/DNR/red/manet.pdf

"examine some basic principles of network theory and
discuss why they are important to NCW, define wired and wireless computer networks in general, and then define Mobile Ad-Hoc Networks and describe their specific components and functions."

Another Web Server Security Guide (.mil)

http://digitalnomad.suck-o.net/DNR/red/ ... G-V6R1.pdf

Implementing wifi devices for vital signs monitoring

http://digitalnomad.suck-o.net/DNR/red/ ... lsigns.pdf

---
junk

Interesting doc about SA banks
http://digitalnomad.suck-o.net/DNR/red/SAbank.pdf

DNR
Last edited by DNR on 25 Jul 2009, 09:29, edited 1 time in total.
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

IBM Redbook Maximo Cert Exam - 4.5mb
http://www.redbooks.ibm.com/redbooks/pdfs/sg247761.pdf

IBM Redbook FileNet P8 - 6.5mb
http://www.redbooks.ibm.com/redbooks/pdfs/sg247667.pdf

IBM Z/OS
http://www-03.ibm.com/systems/z/os/zos/

IBM Redbook OS/390 HTTP Server - 4.1mb
http://www.redbooks.ibm.com/redbooks/pdfs/sg245603.pdf
"This redbook will help you understand, configure and use the IBM HTTP Server 5.1 for OS/390 R7, which is part of the IBM WebSphere Application Server strategy -- a core part of the OS/390 e-business infrastructure.
This book is written for Webmasters and system programmers who install or customize the IBM HTTP Server on OS/390."

or go here

http://www.redbooks.ibm.com/

or here
CICS Transaction Server Help

http://publib.boulder.ibm.com/infocente ... fhtlj1.htm
Last edited by DNR on 25 Jul 2009, 09:32, edited 1 time in total.
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Hacking Nuclear Command and Control
http://digitalnomad.suck-o.net/DNR/red/ ... ng_NC2.pdf
"This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. Specifically, this research will use open source knowledge to identify the structure of nuclear command and control centres, how those structures might be compromised through computer network operations, and how doing so would fit within established cyber terrorists’ capabilities, strategies, and tactics."

"Efforts by militaries to place increasing reliance on computer networks, including
experimental technology such as autonomous systems, and their desire to have
multiple launch options, such as nuclear triad capability, enables multiple entry
points for terrorists. For example, if a terrestrial command centre is impenetrable,
perhaps isolating one nuclear armed submarine would prove an easier task. There
is evidence to suggest multiple attempts have been made by hackers to
compromise the extremely low radio frequency once used by the US Navy to send
nuclear launch approval to submerged submarines. Additionally, the alleged
Soviet system known as Perimetr was designed to automatically launch nuclear
weapons if it was unable to establish communications with Soviet leadership."

"By using proxies, multi-layered attacks
could be engineered. Terrorists could remotely commandeer computers in China
and use them to launch a US nuclear attack against Russia. Thus Russia would
believe it was under attack from the US and the US would believe China was
responsible. Further, emergency response communications could be disrupted,
transportation could be shut down, and disinformation, such as misdirection,
could be planted, thereby hindering the disaster relief effort and maximizing
destruction. Disruptions in communication and the use of disinformation could
also be used to provoke uninformed responses. For example, a nuclear strike
between India and Pakistan could be coordinated with Distributed Denial of
Service attacks against key networks, so they would have further difficulty in
identifying what happened and be forced to respond quickly. Terrorists could
also knock out communications between these states so they cannot discuss the
situation."

"Supervisory Control and Data Acquisition (SCADA) systems are computer systems
used for critical infrastructure such as energy grids, water management, waste
treatment, transportation systems, emergency services, and communications. These
systems “automatically monitor and adjust switching, manufacturing, and other
process control activities, based on feedback data gathered by sensors” (Wilson
2003). These systems were intended to remain separate from the internet; however as
organisations grew, and so did the internet, it became more cost effective to tie them
together. In particular, with deregulation it became more important for offsite
maintenance and information sharing"

"Similar to the US football, Russia employs a nuclear briefcase known as Cheget. It
accompanies the President at all times and provides secure communication and
authorization codes for the order to launch a nuclear strike. It is connected to Kavkaz,
a communications network for senior government officials, which is in turn connected
to the broader nuclear command and control communication network Kazbek. Some
reports state that the Minister of Defence and the Chief of the General Staff are also
issued nuclear briefcases."
--
Reports on USA, China, England, Russia and India.

In the event of a nuclear war follow these instructions:
1.Get under a desk
2.Put Head down between your legs
3.Kiss your ass good bye! (pray you are killed in the inital blast)

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
Gogeta70
^_^
^_^
Posts: 3275
Joined: 25 Jun 2005, 16:00
18

Post by Gogeta70 »

Some good reads. Thank you!
¯\_(ツ)_/¯ It works on my machine...

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

more

"SCADA systems have traditionally used combinations of radio and direct serial or modem connections to meet communication requirements, although Ethernet and IP over SONET / SDH is also frequently used at large sites such as railways and power stations. The remote management or monitoring function of a SCADA system is often referred to as telemetry."

Securing the Smart Grid
http://digitalnomad.suck-o.net/DNR/red/ ... t_grid.pdf


Cyber Assessment of SCADA Security
http://digitalnomad.suck-o.net/DNR/red/ ... curity.pdf


Wardriving tutorial old, but nice
http://digitalnomad.suck-o.net/DNR/red/wardrive002.pdf

802.11 Attacks best article on wardriving
http://digitalnomad.suck-o.net/DNR/red/ ... ttacks.pdf
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
ayu
Staff
Staff
Posts: 8109
Joined: 27 Aug 2005, 16:00
18
Contact:

Post by ayu »

wow, will take some time to read all this ^^
"The best place to hide a tree, is in a forest"

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

so many protocols so little time

Ad-hoc Routing Protocol for Aeronautical Mobile Ad-Hoc Networks
http://digitalnomad.suck-o.net/DNR/red/arpam.pdf

and got to have the bad news with the good news:

ARPAM Routing Protocol Vulnerabilities in Aeronautical Mobile Ad Hoc Networks
http://digitalnomad.suck-o.net/DNR/red/arpam_vuln.pdf
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Hacking the Malware– A reverse-engineer’s analysis-36pgs
http://digitalnomad.suck-o.net/DNR/red/ ... alware.pdf
RAHUL MOHANDAS
"1.1 Overview:
This paper attempts to document an approach on how the hackers make use of the vulnerabilities to install malicious software on the vulnerable machine. A comprehensive reverse code engineered analysis of the malicious software (Win32.Qucan.a) and the various protection schemes against the worm by various security products are also discussed.
I also describe an approach to setting up a flexible laboratory environment using virtual workstation software such as VMware, and demonstrate the process of reverse engineering a worm using a range of system monitoring tools in conjunction with a disassembler."
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

Locked