SeMeMal
233 views | +0 today
Follow
SeMeMal
rescoop from others infosec enthuasiast
Your new post is loading...
Your new post is loading...
Rescooped by Patrick Penetrante from opexxx
Scoop.it!

Best Hacking OS For a Hacker-2016

Best Hacking OS For a Hacker-2016 | SeMeMal | Scoop.it
This blog is fully dedicated to the Best Hacking OS  for a Hacker.Which type of OS will be suitable for a professional or a beginners Hacker you will get answer of all this type of question after reading this blog.

Via alexander knorr
more...
No comment yet.
Rescooped by Patrick Penetrante from ICT Security-Sécurité PC et Internet
Scoop.it!

Sneaky Linux malware comes with sophisticated custom-built rootkit | CyberSecurity

Sneaky Linux malware comes with sophisticated custom-built rootkit | CyberSecurity | SeMeMal | Scoop.it
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that’s custom built for each infection.

The malware, known as XOR.DDoS, was first spotted in September by security research outfit Malware Must Die. However, it has since evolved and new versions were seen in the wild as recently as Jan. 20, according to a new report Thursday from security firm FireEye, which analyzed the threat in detail.

XOR.DDoS is installed on targeted systems via SSH (Secure Shell) brute-force attacks launched primarily from Internet Protocol (IP) addresses registered to a Hong Kong-based company called Hee Thai Limited.

The attacks attempt to guess the password for the root account by using different dictionary-based techniques and password lists from past data breaches. FireEye observed well over 20,000 SSH login attempts per targeted server within a 24-hour period and more than 1 million per server between mid-November and end of January.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux

 

 


Via Gust MEES
more...
Gust MEES's curator insight, February 7, 2015 6:41 AM
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that’s custom built for each infection.

The malware, known as XOR.DDoS, was first spotted in September by security research outfit Malware Must Die. However, it has since evolved and new versions were seen in the wild as recently as Jan. 20, according to a new report Thursday from security firm FireEye, which analyzed the threat in detail.

XOR.DDoS is installed on targeted systems via SSH (Secure Shell) brute-force attacks launched primarily from Internet Protocol (IP) addresses registered to a Hong Kong-based company called Hee Thai Limited.

The attacks attempt to guess the password for the root account by using different dictionary-based techniques and password lists from past data breaches. FireEye observed well over 20,000 SSH login attempts per targeted server within a 24-hour period and more than 1 million per server between mid-November and end of January.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


Rescooped by Patrick Penetrante from H4x0r5 Playground
Scoop.it!

Security - White Papers, Case Studies, Videos, Webcasts - TechWeb Digital Library

Security - White Papers, Case Studies, Videos, Webcasts - TechWeb Digital Library | SeMeMal | Scoop.it
InformationWeek is the leading news and information source for information technology professionals and business managers with technology management and purchasing authority. InformationWeek.com provides breaking news online and in newsletters, in-depth features, insightful analysis, benchmarking data, research reports, a wide-range of technology centers, white papers, community forums and expert opinions.

Via 0xerror
more...
No comment yet.
Scooped by Patrick Penetrante
Scoop.it!

Connected devices have huge security holes: study

Connected devices have huge security holes: study | SeMeMal | Scoop.it
The surge Web-connected devices—TVs, refrigerators, thermostats, door locks and more—has opened up huge opportunities for cyberattacks because of weak security, researchers said Thursday.
more...
No comment yet.
Scooped by Patrick Penetrante
Scoop.it!

CyberSecurity Program Reference Model

CyberSecurity Program Reference Model (11 essential security processes for effective #CyberSecurity Program #Reference #Model http://t.co/DqRNykSRRp http://t.co/jociFjxuqh)...
more...
No comment yet.
Rescooped by Patrick Penetrante from Raspberry Pi
Scoop.it!

InfoSec Institute Resources – Pentesting Distributions and Installer Kits for your Raspberry Pi

InfoSec Institute Resources – Pentesting Distributions and Installer Kits for your Raspberry Pi | SeMeMal | Scoop.it
RT @ProjectxInfosec: #Pentesting Distributions and Installer Kits for your Raspberry Pi
http://t.co/Q8w5HmN9wa

#linux #opensource #hacking #linux #raspberrypi

Via F. Thunus
more...
Jason Toy's curator insight, June 21, 2013 7:25 PM

Everything about this is freaking cool. Just the fun stuff to do when you get that feeling that you HAVE to tinker with something, anything!

David Pollum's curator insight, July 9, 2013 4:19 AM

Raspberry Pi's are useful for many applications including testing websites security.

Rescooped by Patrick Penetrante from High Technology Threat Brief (HTTB) (1)
Scoop.it!

Researchers test quantum encryption hacking risk - Phys.Org

Researchers test quantum encryption hacking risk - Phys.Org | SeMeMal | Scoop.it
Researchers test quantum encryption hacking risk Phys.Org Since such bright light hacking techniques were first demonstrated in 2010, physicists have been keen to find ways to calculate the security of quantum encryption schemes without making...

Via Daniel A. Libby, CFC
more...
No comment yet.
Rescooped by Patrick Penetrante from H4x0r5 Playground
Scoop.it!

How to Detect Port Behind Firewall (Nmap Firewalk Script) | Hacking Articles

How to Detect Port Behind Firewall (Nmap Firewalk Script) | Hacking Articles | SeMeMal | Scoop.it

Via 0xerror
more...
No comment yet.
Rescooped by Patrick Penetrante from H4x0r5 Playground
Scoop.it!

50 UNIX / Linux Sysadmin Tutorials

50 UNIX / Linux Sysadmin Tutorials | SeMeMal | Scoop.it
Merry Christmas and Happy Holidays to all TGS Readers. To wrap this year, I've collected 50 UNIX / Linux sysadmin related tutorials that we've posted so far.

Via 0xerror
more...
No comment yet.
Rescooped by Patrick Penetrante from High Technology Threat Brief (HTTB) (1)
Scoop.it!

From malware to madman: A brief history of John McAfee's lunacy ...

From malware to madman: A brief history of John McAfee's lunacy ... | SeMeMal | Scoop.it
Technology's favorite crazy man John McAfee is currently sitting in a jail in Guatemala after fleeing police in Belize who suspect him of murdering his neighbor. Here's a complete rundown of how he ended up in such crazy, ...

Via Daniel A. Libby, CFC
more...
No comment yet.
Rescooped by Patrick Penetrante from High Technology Threat Brief (HTTB) (1)
Scoop.it!

Mass phishing emails a thing of the past? - Help Net Security

Mass phishing emails a thing of the past? - Help Net Security | SeMeMal | Scoop.it
Help Net SecurityMass phishing emails a thing of the past?

Via Daniel A. Libby, CFC
more...
No comment yet.
Rescooped by Patrick Penetrante from Sergio's Curation Powershell GoogleScript & IT-Security
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | SeMeMal | Scoop.it
. . . Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . . . Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critic...

Via Serge FLEITH
more...
No comment yet.
Rescooped by Patrick Penetrante from H4x0r5 Playground
Scoop.it!

Hopper v3

Hopper v3 | SeMeMal | Scoop.it

Hopper is a reverse engineering tool for OS X and Linux, that lets you disassemble, decompile and debug your 32/64bits Intel Mac, Linux, Windows and iOS executables!


Via 0xerror
more...
No comment yet.
Rescooped by Patrick Penetrante from H4x0r5 Playground
Scoop.it!

Nmap Cheat Sheet 5: The Final View of a Ninja Pentester - InfoSec Institute

Nmap Cheat Sheet 5: The Final View of a Ninja Pentester - InfoSec Institute | SeMeMal | Scoop.it
As we discussed in the last topic of our Nmap Series, this will be our final touch for the cheat sheet. Here we will try to cover most of the topic as requ

Via 0xerror
more...
No comment yet.
Rescooped by Patrick Penetrante from H4x0r5 Playground
Scoop.it!

isowall - Completely Isolate A Device From The Local Network - Darknet - The Darkside

isowall - Completely Isolate A Device From The Local Network - Darknet - The Darkside | SeMeMal | Scoop.it
isowall is a nifty tool if you are doing forensics, running a honeypot or just want to completely isolate a device from the local network.

Via 0xerror
more...
No comment yet.
Scooped by Patrick Penetrante
Scoop.it!

Encryption essential for cyber security: A million reasons to encrypt sensitive data

Encryption essential for cyber security: A million reasons to encrypt sensitive data | SeMeMal | Scoop.it
Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and small, to protect customers and avoid fines and penalties after data breaches.
more...
No comment yet.
Scooped by Patrick Penetrante
Scoop.it!

Metasploit Module Released for IE Zero Day

Metasploit Module Released for IE Zero Day | SeMeMal | Scoop.it

A Metasploit exploit module has been released for the zero-day vulnerability in Internet Explorer. The flaw has been exploited in attacks against Japanese targets, and expert think the availability...

more...
No comment yet.
Rescooped by Patrick Penetrante from H4x0r5 Playground
Scoop.it!

Tutorial: Fun with SMB on the Command Line - EH-Net Online Mag

Tutorial: Fun with SMB on the Command Line - EH-Net Online Mag | SeMeMal | Scoop.it

Via 0xerror
more...
No comment yet.
Rescooped by Patrick Penetrante from Chinese Cyber Code Conflict
Scoop.it!

Travnet Trojan Could Be Part of APT Campaign | Blog Central

Travnet Trojan Could Be Part of APT Campaign | Blog Central | SeMeMal | Scoop.it

Via Red-DragonRising
more...
No comment yet.
Rescooped by Patrick Penetrante from H4x0r5 Playground
Scoop.it!

Cheat Sheet

Cheat Sheet | SeMeMal | Scoop.it
These are various tips and tricks I have found useful on my pentest engagements. Most of these can be found using Google but I decided to put them in a central location to make them easily accessib...

Via 0xerror
more...
No comment yet.
Rescooped by Patrick Penetrante from Digital Evidence and Discovery (DEAD)
Scoop.it!

Predictive Coding Predictions for 2013 #predictivecoding

Predictive Coding Predictions for 2013 #predictivecoding | SeMeMal | Scoop.it
Predictive Coding Predictions for 2013 #predictivecoding (Predictive Coding Predictions for 2013 #predictivecoding: http://t.co/eMKA9IVt)

Via Daniel A. Libby, CFC
more...
No comment yet.
Rescooped by Patrick Penetrante from ZeroTrustNet
Scoop.it!

Homeland Security still advises disabling Java, even after update

Homeland Security still advises disabling Java, even after update | SeMeMal | Scoop.it
DHS says an unpatched vulnerability may still put Web browsers using the plugin at risk of remote attack. Read this article by Steven Musil on CNET News.

Via 0 тrυѕт neт
more...
No comment yet.
Rescooped by Patrick Penetrante from Digital Evidence and Discovery (DEAD)
Scoop.it!

10 Top Government Data Breaches Of 2012 - Dark Reading

10 Top Government Data Breaches Of 2012 - Dark Reading | SeMeMal | Scoop.it
SQL injection, post-phishing privilege escalation, and poorly secured back-up information all played their part in exposing sensitive government data stores this year...

Via Daniel A. Libby, CFC
more...
No comment yet.
Rescooped by Patrick Penetrante from Digital Evidence and Discovery (DEAD)
Scoop.it!

Infographic: Anatomy of a Cyber Security Expert

Infographic: Anatomy of a Cyber Security Expert | SeMeMal | Scoop.it

Infographic: Anatomy of a Cyber Security Expert

 


Via Gust MEES, Daniel A. Libby, CFC
more...
No comment yet.