DNR's Suggested Readings

No explicit questions like "how do I hack xxx.com" please!
User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

In process...

Afgan Commander's Guide
http://digitalnomad.suck-o.net/DNR/red/af-com-guide.pdf

for now...
2009 HITBSecCon Materials
http://conference.hackinthebox.org/hitb ... materials/
(directory traverse from here http://conference.hackinthebox.org/hitb ... 20What.pdf )
Name Last modified Size Description-------------------------------------------------------------------------------- Parent Directory -
D1T1 - Haroon Meer -..> 07-Oct-2009 08:50 44M
D1T1 - Meling Mudin ..> 07-Oct-2009 06:48 73M
Meling Mudin - Network Forensics for Dummies 168pgs, w/pcap file 73mb
http://digitalnomad.suck-o.net/DNR/red/ ... ensics.zip
D1T1 - Nishad Herath..> 07-Oct-2009 09:42 111K
D1T1 - Paul Thieraul..> 07-Oct-2009 09:10 847K
D1T1 - Tavis Ormandy..> 07-Oct-2009 08:50 78K
D1T2 - Alex Kuza55 K..> 07-Oct-2009 11:38 638K
D1T2 - Alexander Gaz..> 07-Oct-2009 07:40 805K
D1T2 - Mark Dowd - A..> 07-Oct-2009 09:13 4.5M
D1T2 - Nguyen Anh Qu..> 07-Oct-2009 11:36 744K
D1T2 - Sheran Gunase..> 07-Oct-2009 09:46 16M
D1T3 - Andrea Barisa..> 07-Oct-2009 09:20 2.7M
D1T3 - Lock Picking ..> 08-Oct-2009 09:46 654M
D2T1 - Bruno Goncalv..> 08-Oct-2009 10:41 3.4M
D2T1 - Chris Evans a..> 08-Oct-2009 07:16 931K
D2T1 - Frederic Rayn..> 08-Oct-2009 07:16 1.4M
D2T1 - Job De Haas -..> 08-Oct-2009 06:16 4.7M
D2T1 - Saumil Shah -..> 08-Oct-2009 10:40 3.3M
D2T2 - Dimitri Petro..> 08-Oct-2009 07:22 4.8M
D2T2 - Lucas Adamski..> 08-Oct-2009 06:17 2.7M
D2T2 - MARES - APRS ..> 09-Oct-2009 06:15 46M
D2T2 - Steve Anson -..> 09-Oct-2009 06:16 2.1M
D2T2 - The Grugq and..> 08-Oct-2009 09:53 1.5M
D2T3 - Wes Brown - B..> 08-Oct-2009 06:19 1.1M
KEYNOTE 1 - Joe Gran..> 07-Oct-2009 06:37 8.9M
KEYNOTE 2 - Rop Gong..> 07-Oct-2009 06:37 9.4K
KEYNOTE 3 - Ed Skoud..> 08-Oct-2009 02:35 533K
The badguys Win, now what? Ed Skoudis
http://digitalnomad.suck-o.net/DNR/red/ ... koudis.pdf
KEYNOTE 4 - Julian A..> 08-Oct-2009 04:51 8.8K
Thats what I wanted earlier, sorry about the bad link

Project Abandoned - No more Updates to follow - DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Last edited by DNR on 20 Dec 2009, 07:20, edited 1 time in total.
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

"Convict the Guilty" - for LEO and prosecutors - Canadian 399 pgs
Tactics for convicting people
http://digitalnomad.suck-o.net/DNR/red/ ... guilty.zip
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

LAW ENFORCEMENT SENSITIVE INFORMATION –DO NOT SHARE THESE MATERIALS*

"Exploration of Windows 7 Advanced ForensicTopics"
http://digitalnomad.suck-o.net/DNR/red/ ... icsLEO.zip
1.Windows Vista and NTFS File System Internals - 40pgs
2.Introduction to the Volume Shadow Copy Service - 89pgs
3.Introduction to Windows 7 - Exploration of Windows 7 -171 pgs
4.Windows 7 Virtualization Technologies - 42pgs
5.Introduction to BitLocker FVE - 107pgs

total zipped file = 18.4mb

*Don't share them with the police! :twisted:

DNR
Last edited by DNR on 05 Mar 2010, 18:20, edited 1 time in total.
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Pass-the-hash attacks: Tools and Mitigation
http://digitalnomad.suck-o.net/DNR/red/ ... ttacks.pdf - 50pgs

Password hashes are equivalent to clear-text passwords (Johansson, 2009). If the attacker manages to obtain the hash, he can simply use it to gain access to a system without the need to know the password used to create it. This type of attack is known as "pass-the-hash" attack.
Pass-the-hash attacks are usually directed against Windows systems, however they can be found in other systems, for example vulnerable web applications (SANS, 2008). In Windows, pass-the-hash attack depends on the Single Sign-On (SSO) functionality in authentication protocols like NTLM and Kerberos (Scambray & McClure, 2008).

--------
Why Crack When You Can Pass the Hash?
http://digitalnomad.suck-o.net/DNR/red/why_crack.pdf - 40pgs
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Re: DNR's Suggested Readings

Post by DNR »

Special Forces Unconventional Warfare Manual dec 2009

http://digitalnomad.suck-o.net/DNR/red/tc31-20.zip" onclick="window.open(this.href);return false; 4.9mb
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Re: DNR's Suggested Readings

Post by DNR »

The Explosive Reaction Between Swimming Pool
Chlorine and Brake Fluid

http://digitalnomad.suck-o.net/DNR/red/ ... idbomb.pdf" onclick="window.open(this.href);return false;
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Re: DNR's Suggested Readings

Post by DNR »

Court Docs - Operation Flicker

DEPARTMENT OF DEFENSE
DEFENSE CRIMINAL INVESTIGATIVE SERVICE
Child Porn investigation
http://digitalnomad.suck-o.net/DNR/red/op-flicker.zip" onclick="window.open(this.href);return false; 4.3mb 94 pgs
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Re: DNR's Suggested Readings

Post by DNR »

Smudge Attacks on Smartphone Touch Screens

http://digitalnomad.suck-o.net/DNR/red/Aviv.pdf" onclick="window.open(this.href);return false; 1.5mb 10pgs

"This paper explores the feasibility of smudge attacks,
where an attacker, by inspection of smudges, attempts to
extract sensitive information about recent user input. We
provide initial analysis of the capabilities of an attacker
who wishes to execute a smudge attack. While this analysis
is restricted to smartphone touch screens, specifically
attacks against the Android password pattern, smudge attacks
may apply to a significantly larger set of devices,
ranging from touch screen ATMs and DRE voting machines
too."
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Re: DNR's Suggested Readings

Post by DNR »

The McEliece Cryptosystem
Resists Quantum Fourier Sampling Attacks

Aug 17th 2010 - 30 pgs (advance level study noobs need not view) 256kb
http://digitalnomad.suck-o.net/DNR/red/ ... crypto.pdf" onclick="window.open(this.href);return false;

"Asymmetric codes use different keys for encrypting and decrypting messages. In so-called public key encryption systems such as the popular RSA algorithm, a public key is available to anyone who can use it to encrypt a message. But only those with a private key can decrypt the messages and this, of course, is kept secret.

The security of these systems relies on so-called trap door functions: mathematical steps that are easy to make in one direction but hard to do in the other. The most famous example is multiplication. It is easy to multiply two numbers together to get a third but hard to start with the third number and work out which two generated it, a process called factorisation.

But in 1994, the mathematician Peter Shor dreamt up a quantum algorithm that could factorise much faster than any classical counterpart. Such an algorithm running on a decent quantum computer could break all known public key encryption systems like a 4-year old running amok in Legoland.

Here's a sense of how it works. The problem of factorisation is to find a number that divides exactly into another. Mathematicians do this using the idea of periodicity: a mathematical object with exactly the right periodicity should divide the number exactly, any others will not.

One way to study periodicity in the classical world is to use fourier analysis, which can break down a signal into its component waves. The quantum analogue to this is the quantum fourier sampling and Shor's triumph was to find a way to use this idea to find the periodicity of the mathematical object that reveals the factors.

Thanks to Shor, any code that relies on this kind of asymmetry (ie almost all popular public key encryption systems) can be cracked using a quantum fourier attack.

The McEliese cryptosystem is different. It too is asymmetric but its security is based not on factorisation but on a version of a conundrum that mathematicians call the hidden supgroup problem. What Dinh and buddies have shown is that this problem cannot be solved using quantum fourier analysis. In other words it is immune to attack by Shor's algorithm. In fact, it is immune to any attack based on quantum fourier sampling. "

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Re: DNR's Suggested Readings

Post by DNR »

SUPERVISORY CONTROL AND DATA
ACQUISITION (SCADA) SYSTEMS
FOR COMMAND, CONTROL,
COMMUNICATIONS, COMPUTER,
INTELLIGENCE, SURVEILLANCE,
AND RECONNAISSANCE (C4ISR)
FACILITIES


http://digitalnomad.suck-o.net/DNR/red/SCADAtm5_601.pdf" onclick="window.open(this.href);return false;
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Re: DNR's Suggested Readings

Post by DNR »

RapidScan Secure 1000 info/specs 10+mb
http://digitalnomad.suck-o.net/DNR/red/tsa-body-spy.zip" onclick="window.open(this.href);return false;

Lawfully Authorized Electronic
Surveillance (LAES) for cdma2000
Wireless LAN (WLAN)-Interworking
- 54 pgs

http://digitalnomad.suck-o.net/DNR/red/tia-1118.zip" onclick="window.open(this.href);return false;
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
caisher
On the way to fame!
On the way to fame!
Posts: 46
Joined: 04 Oct 2007, 16:00
16
Location: Texas,USA
Contact:

Re: DNR's Suggested Readings

Post by caisher »

Thanks man, I am back
The barrier to change is not too little caring; it is too much complexity.
改变世界的阻碍,并非人类的冷漠,而是这个世界太复杂

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
19
Location: In your eye floaters.
Contact:

Re: DNR's Suggested Readings

Post by bad_brain »

wb caisher.... :D
Image

Locked