pastebin - collaborative debugging tool
secsav.kpaste.net RSS


Untitled
Posted by Anonymous on Sun 21st Dec 2014 09:58
raw | new post
view followups (newest first): Untitled by Anonymous
modification of post by Anonymous (view diff)

  1. [[[ WiFi YT vids ]]]
  2.  
  3. https://www.youtube.com/user/NeedSec
  4. https://www.youtube.com/user/Raventattoo/videos
  5. https://www.youtube.com/user/Cyb3rw0rM1/videos
  6.  
  7. # GUI frontend to reaver
  8. http://sourceforge.net/projects/wpscrackgui/
  9.  
  10.  
  11. ---
  12. # HSM from a Raspberry Pi
  13. http://cryptosense.com/building-a-raspberry-pi-hsm-for-rsa-2014/
  14.  
  15. # Shredding files recursively into directories
  16. http://www.linuxforums.org/forum/miscellaneous/46693-how-shred-entire-directory-tree.html#post257616
  17.  
  18. # Backdoor anything
  19. http://www.reddit.com/r/netsec/comments/2az8z2/the_backdoor_factory_backdoor_just_about_any/
  20.  
  21. # OpenBSD lol
  22. http://bbs.progrider.org/prog/read/1383465168
  23.  
  24. http://www.iusmentis.com/maatschappij/privacy/filmen-cameratoezicht/
  25.  
  26. # iptables
  27. http://blog.commandlinekungfu.com/2014/01/episode-174-lightning-lockdown.html
  28.  
  29. # /g/ has root to NSA
  30. http://archive.rebeccablacktech.com/g/thread/S39950951#p39950951
  31.  
  32. # Scan the whole Internet in under 45 minutes!
  33. https://zmap.io/
  34.  
  35. # Subterfuge - Automated MITM Framework
  36. https://code.google.com/p/subterfuge/
  37.  
  38. # Telegram
  39. http://www.thoughtcrime.org/blog/telegram-crypto-challenge/
  40.  
  41. # Entropy as fuck
  42. http://gamesbyemail.com/news/diceomatic
  43. http://www.random.org/
  44.  
  45. # List of resources
  46. https://github.com/enaqx/awesome-pentest
  47.  
  48.  
  49.  
  50. [[[ (Anti) Forensics ]]]
  51. # The truth about – How to securely erase a Solid State Drive (SSD) (skrilnetz.net)
  52. http://www.reddit.com/r/linux/comments/2etx24/the_truth_about_how_to_securely_erase_a_solid/
  53.  
  54. # Inception - search RAM contents for interesting stuff
  55. http://www.breaknenter.org/projects/inception/
  56.  
  57.  
  58.  
  59.  
  60. [[[ SELinux ]]]
  61. # From #centos
  62. Useful resources for SELinux: http://wiki.centos.org/HowTos/SELinux
  63. http://wiki.centos.org/TipsAndTricks/SelinuxBooleans
  64. http://docs.fedoraproject.org/en-US/Fedora/13/html/Security-Enhanced_Linux/
  65. http://fedorasolved.org/security-solutions/selinux-module-building
  66. http://www.youtube.com/watch?v=bQqX3RWn0Yw
  67. http://opensource.com/business/13/11/selinux-policy-guide
  68.  
  69. http://wiki.centos.org/HowTos/SELinux
  70. http://beginlinux.com/server_training/web-server/976-apache-and-selinux
  71. http://docs.fedoraproject.org/en-US/Fedora/13/html/Managing_Confined_Services/
  72.  
  73. http://www.reddit.com/r/linux/comments/23a2tg/the_selinux_coloring_book/
  74.  
  75.  
  76. [ CentOS ]
  77. http://wiki.centos.org/HowTos/OS_Protection
  78.  
  79.  
  80.  
  81. [[[ Theory ]]]
  82. # ECC Primer
  83. http://blog.cloudflare.com/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
  84. http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/2/
  85. http://blog.serverfault.com/2011/12/12/a-studied-approach-at-wifi-part-1/
  86. http://safecurves.cr.yp.to/
  87.  
  88.  
  89. [ GPG / PGP ]
  90. http://www.gnupg.org/documentation/index.html
  91. http://www.thedrinkingrecord.com/pgpgpg-guide/
  92. http://www.dewinter.com/gnupg_howto/english/GPGMiniHowto.html
  93.  
  94. # Intro tutorial blogpost
  95. https://www.reddit.com/r/linux/comments/2jhem8/how_to_verify_the_authenticity_and_integrity_of_a/
  96.  
  97. # Key security
  98. https://wiki.debian.org/Subkeys?action=show&redirect=subkeys
  99.  
  100.  
  101.  
  102. [[[ Wikipedia ]]]
  103. https://en.wikipedia.org/wiki/Data_remanence
  104. http://en.wikipedia.org/wiki/PA-DSS
  105.  
  106.  
  107.  
  108. [[[ WebSec ]]]
  109.  
  110. # SSL easy copy pasta
  111. http://www.reddit.com/r/sysadmin/comments/271g4m/cipherlist_strong_copypaste_ssl_configuration_for/
  112.  
  113. # Want to use my wifi? (cookie spoofing, MITM etc.)
  114. http://thejh.net/written-stuff/want-to-use-my-wifi?
  115.  
  116. http://www.amanhardikar.com/mindmaps/Practice.html
  117.  
  118. # The Web Application Vulnerability Scanners Benchmark
  119. http://sectooladdict.blogspot.se/2014/02/wavsep-web-application-scanner.html?m=1
  120.  
  121. # Bypassing WAF's
  122. http://www.reddit.com/r/netsec/comments/20uhgh/bypassing_web_application_firewalls_using_http/
  123.  
  124. # Hardening WordPress
  125. http://codex.wordpress.org/Hardening_WordPress
  126. http://halfelf.org/2013/false-security/
  127. http://www.esecurityplanet.com/open-source-security/top-5-wordpress-vulnerabilities-and-how-to-fix-them.html
  128. https://wordpress.org/plugins/better-wp-security/
  129. http://wordpress.org/plugins/bulletproof-security/
  130. https://www.reddit.com/r/AskNetsec/comments/2mbpj5/best_practices_for_web_server_hardening/
  131.  
  132. # A seemingly innocent PHP vuln
  133. http://danuxx.blogspot.de/2013/03/unauthorized-access-bypassing-php-strcmp.html
  134.  
  135. # JS crypto / sec
  136. http://www.reddit.com/r/netsec/comments/21ebv7/mylar_encryptdecrypt_your_webapp_data_in_users/
  137. http://nosql.mypopescu.com/post/14453905385/attacking-nosql-and-node-js-server-side-javascript
  138.  
  139. # Mega.co.nz weakness (MegaPWN)
  140. https://www.reddit.com/r/netsec/comments/1lo48d/megapwn_bookmarklet_to_recover_your_secret_mega/
  141.  
  142.  
  143. ---
  144. https://wiki.ubuntu.com/BasicSecurity
  145. https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#Securing_the_unencrypted_boot_partition
  146.  
  147. http://www.danielmiessler.com/study/infosec_interview_questions/
  148.  
  149.  
  150. [[[ CryptoLocker ]]]
  151. http://www.bleepingcomputer.com/forums/t/547708/torrentlocker-ransomware-cracked-and-decrypter-has-been-made/
  152.  
  153.  
  154.  
  155.  
  156. [[[ Talks & Other videos ]]]
  157. http://makehacklearn.org/2014/03/06/trustycon-videos/
  158.  
  159.  
  160.  
  161. ---
  162.  
  163. [[[ Reddit ]]]
  164.  
  165. # How to sign kernel for UEFI Secure Boot.
  166. http://www.reddit.com/r/linux/comments/1mw1xb/state_of_securely_booting_linux/
  167.  
  168. # SSL/TLS Deployment Best Practices
  169. http://www.reddit.com/r/netsec/comments/1mn2nk/ssltls_deployment_best_practices/
  170.  
  171. # SSH hardening
  172. http://www.reddit.com/r/linux/comments/1yfvm9/hardening_ssh_servers/
  173. http://www.reddit.com/r/linux/comments/2cwakx/the_ultimate_guide_to_hardening_ssh_with_ssh/
  174. # Ever wonder what makes the new ssh-certificate authentication different from ssh-pubkey? This guide explains that and how to use it effectively. (neocri.me)
  175. http://redd.it/1zmsi2
  176.  
  177.  
  178. # Physical machine security
  179. http://www.reddit.com/r/netsec/comments/l91d5/physical_laptop_security/
  180.  
  181. # Linux sec
  182. http://www.reddit.com/r/linux/comments/1oobkf/what_kind_of_antimalware_exists_for_linux/
  183.  
  184. # How does the Shellshock exploit work?
  185. http://fedoramagazine.org/shellshock-how-does-it-actually-work/
  186.  
  187. # OS under a OS
  188. http://www.reddit.com/r/linux/comments/1qib6u/the_second_proprietary_operating_system_hiding_in/
  189.  
  190. # grsec patches explained
  191. http://www.reddit.com/r/netsec/comments/renu4/grsecurity_pax_configuration_options_explained/
  192.  
  193. # 4 HTTP security headers you should always be using (ibuildings.nl)
  194. http://www.reddit.com/r/netsec/comments/1vztlh/4_http_security_headers_you_should_always_be_using/
  195.  
  196. # Show r/netsec: reveal your true IP address behind proxy/NATs using WebRTC (Firefox/Chrome) (jsfiddle.net)
  197. http://www.reddit.com/r/netsec/comments/1vzsnn/show_rnetsec_reveal_your_true_ip_address_behind/
  198.  
  199. # Laptop security best practices. What do you do? (self.linux)
  200. http://www.reddit.com/r/linux/comments/1zi10c/laptop_security_best_practices_what_do_you_do/
  201.  
  202. # How I got root with Sudo (securusglobal.com)
  203. http://www.reddit.com/r/netsec/comments/20mftq/how_i_got_root_with_sudo/
  204.  
  205. # Hardening a Linux server (self.linux)
  206. http://www.reddit.com/r/linux/comments/1xxpap/hardening_a_linux_server/
  207.  
  208. # Security of Debian?
  209. http://www.reddit.com/r/linux/comments/1xfuqb/debian_74_relased/cfbwunr
  210.  
  211. # Sidestep Wireless Logins by Routing All Traffic Through Measly Little Ping Packets (getpostdelete.com)
  212. http://www.reddit.com/r/linux/comments/22tsil/sidestep_wireless_logins_by_routing_all_traffic/
  213.  
  214. # Why Linux is better for infosec?
  215. http://www.reddit.com/r/linux/comments/22xece/why_is_linux_better_for_infosecsysadmins/
  216.  
  217. # Wayland is NOT immune to keyloggers (self.linux)
  218. http://www.reddit.com/r/linux/comments/23mj49/wayland_is_not_immune_to_keyloggers/
  219.  
  220. # What routines have you in place to keep your linux server secure and up to date? (self.linux)
  221. http://www.reddit.com/r/linux/comments/24j290/what_routines_have_you_in_place_to_keep_your/
  222.  
  223. # The world's first operating-system kernel with an end-to-end proof of implementation correctness and security enforcement is now open source. (sel4.systems)
  224. http://www.reddit.com/r/netsec/comments/2c0yxh/the_worlds_first_operatingsystem_kernel_with_an/
  225.  
  226. # BadUSB
  227. https://pay.reddit.com/r/netsec/comments/2c9otm/badusb/
  228. https://www.reddit.com/r/netsec/comments/2i6vvh/badusb_the_unpatchable_malware_that_infects_usbs/
  229.  
  230. # Deanonymizing Facebook Users By CSP Bruteforcing (myseosolution.de)
  231. http://www.reddit.com/r/netsec/comments/2djtkt/deanonymizing_facebook_users_by_csp_bruteforcing/
  232.  
  233. # Monitoring & log overview.
  234. # How To Install OSSEC on Ubuntu 14.04 (linuxlove.eu)
  235. http://www.reddit.com/r/linux/comments/2f72j4/how_to_install_ossec_on_ubuntu_1404/
  236.  
  237. # Password MGMT
  238. http://www.reddit.com/r/linux/comments/2fnget/what_is_your_password_management_strategy/
  239.  
  240. # Metasploit Resource Portal Data [collection of the most helpful videos, blog posts, podcasts, and other helpful resources, produced mainly by community contributors] (metasploit.github.io)
  241. https://www.reddit.com/r/netsec/comments/2pstkf/metasploit_resource_portal_data_collection_of_the/

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}





All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at