Saturday, August 22, 2015

RFIDler is better than your fiddler

As promised here is my in-depth write up on integrating the RFIDler into my setup. It has not been hard, but there are some definite lessons I have learned.
First let me start by describing what the tool is. The RFIDler is a Software Defined (SD) Low Frequency Only(LFO) Radio (R) (SDLFOR). It is from Aperature Labs. Mine came as an exposed circuit board with n exposed coil antenna.

Thursday, August 20, 2015

Roll your own Pwnie On a Samsung Galaxy Tab 3

If you have ever researched a Pwnie Express device for penetration tests you may have been floored, like I was, by the price/performance ratio. On my recent trip to Defcon23 I stopped at the Pwnie Express table to play with the Pwn Pad https://www.pwnieexpress.com/product/pwn-pad-2014-penetration-testing-tablet/ . Let me start by saying they have taken the idea and put a fit and finish I will never be able to achieve on my own. they have a slick interface and tie all the apps together in a logical and attractive (to me) manner.

However, I do not need slick, I break fit, and I scuff finishes. So rather than pay a lot more than I felt comfortable with I set out to build my own version. Total investment was $100.00 and about 3 hours of my time. Here is how you can make your own:

Sunday, August 16, 2015

DEFCON 23 in the books

Defcon 23 was last week in Las Vegas, NV. It was my first year going, but certainly will not be my last. There is no adequate way to describe the number of things brought together in one (actually two) place(s). Not knowing anyone at the convention, I was worried I would spend most of my time on my own searching for things to keep myself entertained. I was wrong. So so wrong. A huge thank you to the folks from DEFCON for keeping an amazing event going.

Now let me go over some of the things I picked up while I was there:

Monday, December 10, 2012

Offensive Security

Everyone knows that networking is the backbone of business. For most businesses today, a breach in network security can mean a lot of losses. Everything from information to assets are at risk when they are stored on a networked computer. Unfortunately this knowledge has not translated into businesses taking their network security seriously enough (al a Playstation & others).
The truth of the matter is: If these companies had taken the initiative with Offensive Security, they wouldn't have put thousands of people at risk!

What can you or your business do to protect the network? Think and act like a Hacker! On your own network only of course.
Now I will endeavor to explain to you some of the keys to successfully testing your networks security.

1. Get a method - When I provide a network security analysis I use the Open Source Security Testing Methodology. You can get a copy of the latest O.S.S.T.M. Manual from http://www.isecom.org/osstmm/
2.  Do your (p)research - Even if you are testing your own network you should see what the major search engines know about your network. Try searching for specific file names, I.P.s, MAC addresses, etc. You may be surprised what you come across.
3. Collect your tools - Whether you will be testing from a Windows, Mac, or Linux box you will need some special types of software to help you in your tests. I use a Linux laptop for the majority of the testing with a back-up Windows laptop if I am doing something that would benefit from two laptops.