Hey!

In addition to meeting the first Friday of each month in Helena at the Ox, the group is meeting in Bozeman on the 3rd Friday each month at the Bank of Bozeman at 875 Harmond Stream Blvd around 5:30.

Schedule an extra hour or two to visit the American Computer & Robotics Museum, a treasure state treasure-- http://www.compustory.com/


I had 70 tabs open and thought I'd start bookmarking them here, we'll see how it goes.

 nsa proof email via cern mit and harvard: https://protonmail.ch/

Ghost in the Tubes Walkthough http://memopadman.com/2014/06/15/ghost-in-the-tubes-walkthrough.html …

 

http://www.crowdstrike.com/blog/new-community-tool-crowdresponse/

https://www.bluecoat.com/products/malware-analysis-appliance

http://www.treasurestateinternet.com/

http://samsclass.info/124/proj14/p9-kl.htm

http://docs.cuckoosandbox.org

http://fluxbox.org/

http://blog.cassidiancybersecurity.com/post/2014/01/PlugX-v2%3A-meet-SController

 

pwning rural networks
openspectrum.eu
pirate radio movie
open source cell phone network at $2/mo
electromagnetic spectrum chart
digitalocean.com
openshift.redhat.com
radare.org
cloud.radare.org
blackarch
codepen.io/befamous
famo.us
meteor.com fast app building

http://sourceforge.net/projects/phlakproject/ old school h/t knightmar3

gsec, mimikatz, pwdump

 

http://passivetotal.org

1. Get account

2. Enter ip

3. ???

4. Profit!!!

DEFCON 406

That's the Way the Fortune Cookie Crumbles

PDFPrintEmail


AddThis Social Bookmark Button

Wanna see APT?

It is a threat actor, not a technique.

The attackers are advanced, but they will use the most common of hacks in more than 98% of their penetrations according to Mandiant.

One problem...they forgot to turn off the camera.

http://www.youtube.com/watch?v=L_Wu1HlZbBk&feature=youtu.be&t=36s

BTW: 

 

 

nslookup 138.26.72.17
Server: 8.8.8.8
Address: 8.8.8.8#53
Non-authoritative answer:
17.72.26.138.in-addr.arpa name = dali.chem.uab.edu.

We'll I'll be...

Lookie there Oppie!

Check out Eric's great post too

 

http://www.ericjhuber.com/2011/08/advanced-persistent-threat.html?m=1

 

Written by DC 406 Webmaster Wednesday, 24 August 2011 22:43

 

John the Ripper in Metasploit

PDFPrintEmail


AddThis Social Bookmark Button

A nice little tutorial on the using John the Ripper crack fast module in Metasploit.

Now you can crack hashes as you scoop them without leaving the MSG.

http://eromang.zataz.com/2011/07/12/built-in-john-the-ripper-jtr_crack_fast-into-metasploit/

Written by DC 406 Webmaster Saturday, 16 July 2011 14:05

   

THC Femto Hack

PDFPrintEmail


AddThis Social Bookmark Button

This is truly hacking.

THC has an explanation of how to hack a Vodafone Femto cell.

This is for EDUCATIONAL Purposes only...srsly...your mileage may vary.

http://wiki.thc.org/vodafone

Written by DC 406 Webmaster Wednesday, 13 July 2011 23:45

   

Honeypot Tutorial

PDFPrintEmail

User Rating: / 14
PoorBest 

AddThis Social Bookmark Button

A tutorial on honeypots.

 

Written by DC 406 Webmaster Wednesday, 13 July 2011 08:14

   

Mutually Assured Disruption?

PDFPrintEmail


AddThis Social Bookmark Button

Cyber detterrence through mutually assured disruption?

Potomoc Institute

Gen. Hayden

Video.

 

Written by DC 406 Webmaster Wednesday, 13 July 2011 07:22

   

Dropbox Reader

PDFPrintEmail

User Rating: / 54
PoorBest 

AddThis Social Bookmark Button

A nice set of python scripts that allow you to read dropbox content.

http://www.cybermarshal.com/index.php/cyber-marshal-utilities/dropbox-reader

 

Written by DC 406 Webmaster Saturday, 18 June 2011 23:27

   

Page 6 of 97

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>