F-Secure has created a free tool that automates the detection and removal of the widespread Flashback Mac OS X malware.
How to use the tools:
1) Download FlashbackRemoval.zip to the Mac machine you want to scan. 2) Double-click the zip package to unzip it in the current folder. 3) Double-click the FlashBack Removal app to run the tool. 4) Follow the instructions to check . . . → Read More: detect flashback mac
Routing of malicious traffic and forensic analysis
A detailed implementation of a full interaction honeypot and honeywall in a virtualized VMWare environment is presented. The benefits and drawbacks of this type of this type of implementation are explained. The importance of proper . . . → Read More: Honeynet honeywall howto
SQL Server has a function called CAST, that converts an ASCII codes array to text. Hackers can use this function to obfuscate the SQL Injection payload, and bypass filters that block SQL commands or hazardous characters. Here is an example to an attack that uses this technique:
Metasploit Project – open-source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development Netwag – Graphical front end for netwox which contains 223 tools Netcat – Computer networking service for reading from and writing network connections using TCP or . . . → Read More: Top Security Hacking Tools & Utilities
Tool being shown: http://www.yersinia.net/ Attack 1: Taking over the root bridge Never set the TC-ACK bit when receiving TCN BPDUs–> unnecessary flooding Keep switching between root bridge and other roles – excessive load on processor