DNR's Suggested Readings
DNR's Suggested Readings
I will start putting a few of my favorite reads here. They are stored on the suck-o.net for archive.
Bots and Botnets
http://digitalnomad.suck-o.net/DNR/red/bots.pdf
http://digitalnomad.suck-o.net/DNR/red/ ... otnets.pdf
http://digitalnomad.suck-o.net/DNR/red/spambot.pdf
Build a computer
http://digitalnomad.suck-o.net/DNR/red/ ... mputer.pdf
Infrastructure security
http://digitalnomad.suck-o.net/DNR/red/c4ispbunker.pdf
Sentrol Security devices/physical security
http://digitalnomad.suck-o.net/DNR/red/security.pdf
Router Security -NSA
http://digitalnomad.suck-o.net/DNR/red/cis-security.zip
Forensic Examination of Digital Evidence:
A Guide for Law Enforcement
http://digitalnomad.suck-o.net/DNR/red/ ... ensics.pdf -91pg
Digital Dispatch Surveillance Standard - a cellphone snoop primer
http://digitalnomad.suck-o.net/DNR/red/ddss-01.zip
David Maynor lecture on Trojans
http://digitalnomad.suck-o.net/DNR/red/dmaynor.pdf
Using FPGAs to Parallelize Dictionary Attacks for Password Cracking
http://digitalnomad.suck-o.net/DNR/red/fpgahacking.pdf
Using Google for hacking
http://digitalnomad.suck-o.net/DNR/red/ ... sguide.pdf
http://digitalnomad.suck-o.net/DNR/red/ ... acking.pdf
Bypass web security with HTTP verb tampering
http://digitalnomad.suck-o.net/DNR/red/ ... tamper.pdf
Intro to satellites
http://digitalnomad.suck-o.net/DNR/red/Intro_sats.pdf
http://digitalnomad.suck-o.net/DNR/red/ ... om2008.pdf
http://digitalnomad.suck-o.net/DNR/red/easysat.pdf
US Army War College - Information Operations
http://digitalnomad.suck-o.net/DNR/red/io-primer.zip
Chap 8 -No-Tech Hacking
by Johnny Long
http://digitalnomad.suck-o.net/DNR/red/ ... xcerpt.pdf
Exploiting WDM
http://digitalnomad.suck-o.net/DNR/red/paper-wdm.pdf
AT&T security
http://digitalnomad.suck-o.net/DNR/red/ ... ec_ATT.pdf
Bruce Schneier "The Psychology of Security"
http://digitalnomad.suck-o.net/DNR/red/psyofsec.pdf
Web Application Kung-Fu, The
Art of Defense
Shreeraj Shah
http://digitalnomad.suck-o.net/DNR/red/sheeraj.pdf
TerrestrialWAN - Internet Plumbing
http://digitalnomad.suck-o.net/DNR/red/ ... alWAN.html
Trojan detection in IC chips
http://digitalnomad.suck-o.net/DNR/red/trojan_IC.pdf
Universal Plug and Play, hacking
http://digitalnomad.suck-o.net/DNR/red/upuppaper.pdf
collection for USB study
http://digitalnomad.suck-o.net/DNR/red/usb_study.zip
Fingerprinting 802.11 Devices
http://digitalnomad.suck-o.net/DNR/red/ ... finger.pdf
A Guide to Wardriving and Detecting Wardrivers
http://digitalnomad.suck-o.net/DNR/red/ ... rivers.pdf
Web Browsers
http://digitalnomad.suck-o.net/DNR/red/web_browsers.pdf
Security & Vulnerability Analysis of
Wireless Messaging Protocols &
Applications
http://digitalnomad.suck-o.net/DNR/red/ ... otocol.pdf
Wireshark/packet sniffing tutorial
http://digitalnomad.suck-o.net/DNR/red/wiresharktut.pdf
Bots and Botnets
http://digitalnomad.suck-o.net/DNR/red/bots.pdf
http://digitalnomad.suck-o.net/DNR/red/ ... otnets.pdf
http://digitalnomad.suck-o.net/DNR/red/spambot.pdf
Build a computer
http://digitalnomad.suck-o.net/DNR/red/ ... mputer.pdf
Infrastructure security
http://digitalnomad.suck-o.net/DNR/red/c4ispbunker.pdf
Sentrol Security devices/physical security
http://digitalnomad.suck-o.net/DNR/red/security.pdf
Router Security -NSA
http://digitalnomad.suck-o.net/DNR/red/cis-security.zip
Forensic Examination of Digital Evidence:
A Guide for Law Enforcement
http://digitalnomad.suck-o.net/DNR/red/ ... ensics.pdf -91pg
Digital Dispatch Surveillance Standard - a cellphone snoop primer
http://digitalnomad.suck-o.net/DNR/red/ddss-01.zip
David Maynor lecture on Trojans
http://digitalnomad.suck-o.net/DNR/red/dmaynor.pdf
Using FPGAs to Parallelize Dictionary Attacks for Password Cracking
http://digitalnomad.suck-o.net/DNR/red/fpgahacking.pdf
Using Google for hacking
http://digitalnomad.suck-o.net/DNR/red/ ... sguide.pdf
http://digitalnomad.suck-o.net/DNR/red/ ... acking.pdf
Bypass web security with HTTP verb tampering
http://digitalnomad.suck-o.net/DNR/red/ ... tamper.pdf
Intro to satellites
http://digitalnomad.suck-o.net/DNR/red/Intro_sats.pdf
http://digitalnomad.suck-o.net/DNR/red/ ... om2008.pdf
http://digitalnomad.suck-o.net/DNR/red/easysat.pdf
US Army War College - Information Operations
http://digitalnomad.suck-o.net/DNR/red/io-primer.zip
Chap 8 -No-Tech Hacking
by Johnny Long
http://digitalnomad.suck-o.net/DNR/red/ ... xcerpt.pdf
Exploiting WDM
http://digitalnomad.suck-o.net/DNR/red/paper-wdm.pdf
AT&T security
http://digitalnomad.suck-o.net/DNR/red/ ... ec_ATT.pdf
Bruce Schneier "The Psychology of Security"
http://digitalnomad.suck-o.net/DNR/red/psyofsec.pdf
Web Application Kung-Fu, The
Art of Defense
Shreeraj Shah
http://digitalnomad.suck-o.net/DNR/red/sheeraj.pdf
TerrestrialWAN - Internet Plumbing
http://digitalnomad.suck-o.net/DNR/red/ ... alWAN.html
Trojan detection in IC chips
http://digitalnomad.suck-o.net/DNR/red/trojan_IC.pdf
Universal Plug and Play, hacking
http://digitalnomad.suck-o.net/DNR/red/upuppaper.pdf
collection for USB study
http://digitalnomad.suck-o.net/DNR/red/usb_study.zip
Fingerprinting 802.11 Devices
http://digitalnomad.suck-o.net/DNR/red/ ... finger.pdf
A Guide to Wardriving and Detecting Wardrivers
http://digitalnomad.suck-o.net/DNR/red/ ... rivers.pdf
Web Browsers
http://digitalnomad.suck-o.net/DNR/red/web_browsers.pdf
Security & Vulnerability Analysis of
Wireless Messaging Protocols &
Applications
http://digitalnomad.suck-o.net/DNR/red/ ... otocol.pdf
Wireshark/packet sniffing tutorial
http://digitalnomad.suck-o.net/DNR/red/wiresharktut.pdf
Last edited by DNR on 16 Sep 2009, 16:32, edited 3 times in total.
Windows Forensics
Windows Thumb DB file
http://digitalnomad.suck-o.net/DNR/red/win_thumb_db.pdf
Windows Registry
http://digitalnomad.suck-o.net/DNR/red/win_registry.pdf
Hacking Secrets 77pgs
http://digitalnomad.suck-o.net/DNR/red/ ... ecrets.pdf
Cable modem hacking: Everything the cable company does not want you to know 330pgs 21mb PDF
http://digitalnomad.suck-o.net/DNR/red/cable_modem.zip
Black Hat Las Vegas 2006 "Hacking the Intranet from the outside" 5.4mb 36pgs
http://digitalnomad.suck-o.net/DNR/red/grossman.pdf
DNR
Windows Thumb DB file
http://digitalnomad.suck-o.net/DNR/red/win_thumb_db.pdf
Windows Registry
http://digitalnomad.suck-o.net/DNR/red/win_registry.pdf
Hacking Secrets 77pgs
http://digitalnomad.suck-o.net/DNR/red/ ... ecrets.pdf
Cable modem hacking: Everything the cable company does not want you to know 330pgs 21mb PDF
http://digitalnomad.suck-o.net/DNR/red/cable_modem.zip
Black Hat Las Vegas 2006 "Hacking the Intranet from the outside" 5.4mb 36pgs
http://digitalnomad.suck-o.net/DNR/red/grossman.pdf
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
Chinese Spy Guide
http://digitalnomad.suck-o.net/DNR/red/chspyguide.zip
Network Scanning Techniques
http://digitalnomad.suck-o.net/DNR/red/ ... antech.zip
GhostNet
http://digitalnomad.suck-o.net/DNR/red/ghostnet.zip
NSA Security Guides for Servers, Routers, and Computers
http://digitalnomad.suck-o.net/DNR/red/ ... guides.zip
NSA WinXP Security Guide
http://digitalnomad.suck-o.net/DNR/red/ ... guides.zip
NIST Technical Guide to infoSec Testing
http://digitalnomad.suck-o.net/DNR/red/NIST_infosec.zip
Microsoft Server (5.0/2k) and App Security Guides
http://digitalnomad.suck-o.net/DNR/red/ ... guides.zip
Hardcore Windows XP 289 pgs!
http://digitalnomad.suck-o.net/DNR/red/ ... ows_XP.zip
http://digitalnomad.suck-o.net/DNR/red/chspyguide.zip
Network Scanning Techniques
http://digitalnomad.suck-o.net/DNR/red/ ... antech.zip
GhostNet
http://digitalnomad.suck-o.net/DNR/red/ghostnet.zip
NSA Security Guides for Servers, Routers, and Computers
http://digitalnomad.suck-o.net/DNR/red/ ... guides.zip
NSA WinXP Security Guide
http://digitalnomad.suck-o.net/DNR/red/ ... guides.zip
NIST Technical Guide to infoSec Testing
http://digitalnomad.suck-o.net/DNR/red/NIST_infosec.zip
Microsoft Server (5.0/2k) and App Security Guides
http://digitalnomad.suck-o.net/DNR/red/ ... guides.zip
Hardcore Windows XP 289 pgs!
http://digitalnomad.suck-o.net/DNR/red/ ... ows_XP.zip
Last edited by DNR on 30 Jun 2009, 22:01, edited 1 time in total.
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
http://www.blackalchemy.to/project/fakeap/
http://rfakeap.tuxfamily.org/
DNR
Also check thisBlack Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. As part of a honeypot or as an instrument of your site security plan, Fake AP confuses Wardrivers, NetStumblers, Script Kiddies, and other undesirables.
Fake AP is a proof of concept released under the GPL.
Fake AP runs on Linux (tested on RedHat 7.3). For *BSD versions, see the links below.
Perl 5.6 or later
One or more Prism2/2.5/3 based 802.11b cards with the CVS version of the Host AP Driver for Intersil Prism2/2.5/3 working
http://rfakeap.tuxfamily.org/
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
Al-Queda manual
http://digitalnomad.suck-o.net/DNR/red/ ... manual.zip
*note my posting this does not mean I support Al-queda - so don't solicit me for donations.
DNR
http://digitalnomad.suck-o.net/DNR/red/ ... manual.zip
*note my posting this does not mean I support Al-queda - so don't solicit me for donations.
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
new uploads
MANET-Mobile Ad-Hoc NETwork-.mil
http://digitalnomad.suck-o.net/DNR/red/manet.pdf
"examine some basic principles of network theory and
discuss why they are important to NCW, define wired and wireless computer networks in general, and then define Mobile Ad-Hoc Networks and describe their specific components and functions."
Another Web Server Security Guide (.mil)
http://digitalnomad.suck-o.net/DNR/red/ ... G-V6R1.pdf
Implementing wifi devices for vital signs monitoring
http://digitalnomad.suck-o.net/DNR/red/ ... lsigns.pdf
---
junk
Interesting doc about SA banks
http://digitalnomad.suck-o.net/DNR/red/SAbank.pdf
DNR
MANET-Mobile Ad-Hoc NETwork-.mil
http://digitalnomad.suck-o.net/DNR/red/manet.pdf
"examine some basic principles of network theory and
discuss why they are important to NCW, define wired and wireless computer networks in general, and then define Mobile Ad-Hoc Networks and describe their specific components and functions."
Another Web Server Security Guide (.mil)
http://digitalnomad.suck-o.net/DNR/red/ ... G-V6R1.pdf
Implementing wifi devices for vital signs monitoring
http://digitalnomad.suck-o.net/DNR/red/ ... lsigns.pdf
---
junk
Interesting doc about SA banks
http://digitalnomad.suck-o.net/DNR/red/SAbank.pdf
DNR
Last edited by DNR on 25 Jul 2009, 09:29, edited 1 time in total.
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
IBM Redbook Maximo Cert Exam - 4.5mb
http://www.redbooks.ibm.com/redbooks/pdfs/sg247761.pdf
IBM Redbook FileNet P8 - 6.5mb
http://www.redbooks.ibm.com/redbooks/pdfs/sg247667.pdf
IBM Z/OS
http://www-03.ibm.com/systems/z/os/zos/
IBM Redbook OS/390 HTTP Server - 4.1mb
http://www.redbooks.ibm.com/redbooks/pdfs/sg245603.pdf
"This redbook will help you understand, configure and use the IBM HTTP Server 5.1 for OS/390 R7, which is part of the IBM WebSphere Application Server strategy -- a core part of the OS/390 e-business infrastructure.
This book is written for Webmasters and system programmers who install or customize the IBM HTTP Server on OS/390."
or go here
http://www.redbooks.ibm.com/
or here
CICS Transaction Server Help
http://publib.boulder.ibm.com/infocente ... fhtlj1.htm
http://www.redbooks.ibm.com/redbooks/pdfs/sg247761.pdf
IBM Redbook FileNet P8 - 6.5mb
http://www.redbooks.ibm.com/redbooks/pdfs/sg247667.pdf
IBM Z/OS
http://www-03.ibm.com/systems/z/os/zos/
IBM Redbook OS/390 HTTP Server - 4.1mb
http://www.redbooks.ibm.com/redbooks/pdfs/sg245603.pdf
"This redbook will help you understand, configure and use the IBM HTTP Server 5.1 for OS/390 R7, which is part of the IBM WebSphere Application Server strategy -- a core part of the OS/390 e-business infrastructure.
This book is written for Webmasters and system programmers who install or customize the IBM HTTP Server on OS/390."
or go here
http://www.redbooks.ibm.com/
or here
CICS Transaction Server Help
http://publib.boulder.ibm.com/infocente ... fhtlj1.htm
Last edited by DNR on 25 Jul 2009, 09:32, edited 1 time in total.
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
Hacking Nuclear Command and Control
http://digitalnomad.suck-o.net/DNR/red/ ... ng_NC2.pdf
"This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. Specifically, this research will use open source knowledge to identify the structure of nuclear command and control centres, how those structures might be compromised through computer network operations, and how doing so would fit within established cyber terrorists’ capabilities, strategies, and tactics."
"Efforts by militaries to place increasing reliance on computer networks, including
experimental technology such as autonomous systems, and their desire to have
multiple launch options, such as nuclear triad capability, enables multiple entry
points for terrorists. For example, if a terrestrial command centre is impenetrable,
perhaps isolating one nuclear armed submarine would prove an easier task. There
is evidence to suggest multiple attempts have been made by hackers to
compromise the extremely low radio frequency once used by the US Navy to send
nuclear launch approval to submerged submarines. Additionally, the alleged
Soviet system known as Perimetr was designed to automatically launch nuclear
weapons if it was unable to establish communications with Soviet leadership."
"By using proxies, multi-layered attacks
could be engineered. Terrorists could remotely commandeer computers in China
and use them to launch a US nuclear attack against Russia. Thus Russia would
believe it was under attack from the US and the US would believe China was
responsible. Further, emergency response communications could be disrupted,
transportation could be shut down, and disinformation, such as misdirection,
could be planted, thereby hindering the disaster relief effort and maximizing
destruction. Disruptions in communication and the use of disinformation could
also be used to provoke uninformed responses. For example, a nuclear strike
between India and Pakistan could be coordinated with Distributed Denial of
Service attacks against key networks, so they would have further difficulty in
identifying what happened and be forced to respond quickly. Terrorists could
also knock out communications between these states so they cannot discuss the
situation."
"Supervisory Control and Data Acquisition (SCADA) systems are computer systems
used for critical infrastructure such as energy grids, water management, waste
treatment, transportation systems, emergency services, and communications. These
systems “automatically monitor and adjust switching, manufacturing, and other
process control activities, based on feedback data gathered by sensors” (Wilson
2003). These systems were intended to remain separate from the internet; however as
organisations grew, and so did the internet, it became more cost effective to tie them
together. In particular, with deregulation it became more important for offsite
maintenance and information sharing"
"Similar to the US football, Russia employs a nuclear briefcase known as Cheget. It
accompanies the President at all times and provides secure communication and
authorization codes for the order to launch a nuclear strike. It is connected to Kavkaz,
a communications network for senior government officials, which is in turn connected
to the broader nuclear command and control communication network Kazbek. Some
reports state that the Minister of Defence and the Chief of the General Staff are also
issued nuclear briefcases."
--
Reports on USA, China, England, Russia and India.
In the event of a nuclear war follow these instructions:
1.Get under a desk
2.Put Head down between your legs
3.Kiss your ass good bye! (pray you are killed in the inital blast)
DNR
http://digitalnomad.suck-o.net/DNR/red/ ... ng_NC2.pdf
"This paper will analyse the threat of cyber terrorism in regard to nuclear weapons. Specifically, this research will use open source knowledge to identify the structure of nuclear command and control centres, how those structures might be compromised through computer network operations, and how doing so would fit within established cyber terrorists’ capabilities, strategies, and tactics."
"Efforts by militaries to place increasing reliance on computer networks, including
experimental technology such as autonomous systems, and their desire to have
multiple launch options, such as nuclear triad capability, enables multiple entry
points for terrorists. For example, if a terrestrial command centre is impenetrable,
perhaps isolating one nuclear armed submarine would prove an easier task. There
is evidence to suggest multiple attempts have been made by hackers to
compromise the extremely low radio frequency once used by the US Navy to send
nuclear launch approval to submerged submarines. Additionally, the alleged
Soviet system known as Perimetr was designed to automatically launch nuclear
weapons if it was unable to establish communications with Soviet leadership."
"By using proxies, multi-layered attacks
could be engineered. Terrorists could remotely commandeer computers in China
and use them to launch a US nuclear attack against Russia. Thus Russia would
believe it was under attack from the US and the US would believe China was
responsible. Further, emergency response communications could be disrupted,
transportation could be shut down, and disinformation, such as misdirection,
could be planted, thereby hindering the disaster relief effort and maximizing
destruction. Disruptions in communication and the use of disinformation could
also be used to provoke uninformed responses. For example, a nuclear strike
between India and Pakistan could be coordinated with Distributed Denial of
Service attacks against key networks, so they would have further difficulty in
identifying what happened and be forced to respond quickly. Terrorists could
also knock out communications between these states so they cannot discuss the
situation."
"Supervisory Control and Data Acquisition (SCADA) systems are computer systems
used for critical infrastructure such as energy grids, water management, waste
treatment, transportation systems, emergency services, and communications. These
systems “automatically monitor and adjust switching, manufacturing, and other
process control activities, based on feedback data gathered by sensors” (Wilson
2003). These systems were intended to remain separate from the internet; however as
organisations grew, and so did the internet, it became more cost effective to tie them
together. In particular, with deregulation it became more important for offsite
maintenance and information sharing"
"Similar to the US football, Russia employs a nuclear briefcase known as Cheget. It
accompanies the President at all times and provides secure communication and
authorization codes for the order to launch a nuclear strike. It is connected to Kavkaz,
a communications network for senior government officials, which is in turn connected
to the broader nuclear command and control communication network Kazbek. Some
reports state that the Minister of Defence and the Chief of the General Staff are also
issued nuclear briefcases."
--
Reports on USA, China, England, Russia and India.
In the event of a nuclear war follow these instructions:
1.Get under a desk
2.Put Head down between your legs
3.Kiss your ass good bye! (pray you are killed in the inital blast)
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
more
"SCADA systems have traditionally used combinations of radio and direct serial or modem connections to meet communication requirements, although Ethernet and IP over SONET / SDH is also frequently used at large sites such as railways and power stations. The remote management or monitoring function of a SCADA system is often referred to as telemetry."
Securing the Smart Grid
http://digitalnomad.suck-o.net/DNR/red/ ... t_grid.pdf
Cyber Assessment of SCADA Security
http://digitalnomad.suck-o.net/DNR/red/ ... curity.pdf
Wardriving tutorial old, but nice
http://digitalnomad.suck-o.net/DNR/red/wardrive002.pdf
802.11 Attacks best article on wardriving
http://digitalnomad.suck-o.net/DNR/red/ ... ttacks.pdf
"SCADA systems have traditionally used combinations of radio and direct serial or modem connections to meet communication requirements, although Ethernet and IP over SONET / SDH is also frequently used at large sites such as railways and power stations. The remote management or monitoring function of a SCADA system is often referred to as telemetry."
Securing the Smart Grid
http://digitalnomad.suck-o.net/DNR/red/ ... t_grid.pdf
Cyber Assessment of SCADA Security
http://digitalnomad.suck-o.net/DNR/red/ ... curity.pdf
Wardriving tutorial old, but nice
http://digitalnomad.suck-o.net/DNR/red/wardrive002.pdf
802.11 Attacks best article on wardriving
http://digitalnomad.suck-o.net/DNR/red/ ... ttacks.pdf
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
so many protocols so little time
Ad-hoc Routing Protocol for Aeronautical Mobile Ad-Hoc Networks
http://digitalnomad.suck-o.net/DNR/red/arpam.pdf
and got to have the bad news with the good news:
ARPAM Routing Protocol Vulnerabilities in Aeronautical Mobile Ad Hoc Networks
http://digitalnomad.suck-o.net/DNR/red/arpam_vuln.pdf
Ad-hoc Routing Protocol for Aeronautical Mobile Ad-Hoc Networks
http://digitalnomad.suck-o.net/DNR/red/arpam.pdf
and got to have the bad news with the good news:
ARPAM Routing Protocol Vulnerabilities in Aeronautical Mobile Ad Hoc Networks
http://digitalnomad.suck-o.net/DNR/red/arpam_vuln.pdf
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
Hacking the Malware– A reverse-engineer’s analysis-36pgs
http://digitalnomad.suck-o.net/DNR/red/ ... alware.pdf
RAHUL MOHANDAS
"1.1 Overview:
This paper attempts to document an approach on how the hackers make use of the vulnerabilities to install malicious software on the vulnerable machine. A comprehensive reverse code engineered analysis of the malicious software (Win32.Qucan.a) and the various protection schemes against the worm by various security products are also discussed.
I also describe an approach to setting up a flexible laboratory environment using virtual workstation software such as VMware, and demonstrate the process of reverse engineering a worm using a range of system monitoring tools in conjunction with a disassembler."
http://digitalnomad.suck-o.net/DNR/red/ ... alware.pdf
RAHUL MOHANDAS
"1.1 Overview:
This paper attempts to document an approach on how the hackers make use of the vulnerabilities to install malicious software on the vulnerable machine. A comprehensive reverse code engineered analysis of the malicious software (Win32.Qucan.a) and the various protection schemes against the worm by various security products are also discussed.
I also describe an approach to setting up a flexible laboratory environment using virtual workstation software such as VMware, and demonstrate the process of reverse engineering a worm using a range of system monitoring tools in conjunction with a disassembler."
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.