pastebin - collaborative debugging tool
secsav.kpaste.net RSS


Untitled
Posted by Anonymous on Wed 19th Mar 2014 13:53
raw | new post
view followups (newest first): Untitled by Anonymous
modification of post by Anonymous (view diff)

  1. [[[ WiFi YT vids ]]]
  2.  
  3. https://www.youtube.com/user/NeedSec
  4. https://www.youtube.com/user/Raventattoo/videos
  5. https://www.youtube.com/user/Cyb3rw0rM1/videos
  6.  
  7. # GUI frontend to reaver
  8. http://sourceforge.net/projects/wpscrackgui/
  9.  
  10.  
  11. ---
  12. # HSM from a Raspberry Pi
  13. http://cryptosense.com/building-a-raspberry-pi-hsm-for-rsa-2014/
  14.  
  15. # Shredding files recursively into directories
  16. http://www.linuxforums.org/forum/miscellaneous/46693-how-shred-entire-directory-tree.html#post257616
  17.  
  18. # OpenBSD lol
  19. http://bbs.progrider.org/prog/read/1383465168
  20.  
  21. http://www.iusmentis.com/maatschappij/privacy/filmen-cameratoezicht/
  22.  
  23. # iptables
  24. http://blog.commandlinekungfu.com/2014/01/episode-174-lightning-lockdown.html
  25.  
  26. # /g/ has root to NSA
  27. http://archive.rebeccablacktech.com/g/thread/S39950951#p39950951
  28.  
  29. # Scan the whole Internet in under 45 minutes!
  30. https://zmap.io/
  31.  
  32. # Inception - search RAM contents for interesting stuff
  33. http://www.breaknenter.org/projects/inception/
  34.  
  35. # Subterfuge - Automated MITM Framework
  36. https://code.google.com/p/subterfuge/
  37.  
  38.  
  39. [[[ SELinux ]]]
  40. # From #centos
  41. Useful resources for SELinux: http://wiki.centos.org/HowTos/SELinux
  42. http://wiki.centos.org/TipsAndTricks/SelinuxBooleans
  43. http://docs.fedoraproject.org/en-US/Fedora/13/html/Security-Enhanced_Linux/
  44. http://fedorasolved.org/security-solutions/selinux-module-building
  45. http://www.youtube.com/watch?v=bQqX3RWn0Yw
  46. http://opensource.com/business/13/11/selinux-policy-guide
  47.  
  48. http://wiki.centos.org/HowTos/SELinux
  49. http://beginlinux.com/server_training/web-server/976-apache-and-selinux
  50. http://docs.fedoraproject.org/en-US/Fedora/13/html/Managing_Confined_Services/
  51.  
  52.  
  53. [ CentOS ]
  54. http://wiki.centos.org/HowTos/OS_Protection
  55.  
  56.  
  57.  
  58. [[[ Theory ]]]
  59. # ECC Primer
  60. http://blog.cloudflare.com/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
  61. http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/2/
  62. http://blog.serverfault.com/2011/12/12/a-studied-approach-at-wifi-part-1/
  63. http://safecurves.cr.yp.to/
  64.  
  65.  
  66. [[[ Wikipedia ]]]
  67. https://en.wikipedia.org/wiki/Data_remanence
  68. http://en.wikipedia.org/wiki/PA-DSS
  69.  
  70.  
  71.  
  72. [[[ WebSec ]]]
  73.  
  74. # Want to use my wifi? (cookie spoofing, MITM etc.)
  75. http://thejh.net/written-stuff/want-to-use-my-wifi?
  76.  
  77. http://www.amanhardikar.com/mindmaps/Practice.html
  78.  
  79. # The Web Application Vulnerability Scanners Benchmark
  80. http://sectooladdict.blogspot.se/2014/02/wavsep-web-application-scanner.html?m=1
  81.  
  82. # Hardening WordPress
  83. http://codex.wordpress.org/Hardening_WordPress
  84. http://halfelf.org/2013/false-security/
  85. http://www.esecurityplanet.com/open-source-security/top-5-wordpress-vulnerabilities-and-how-to-fix-them.html
  86. https://wordpress.org/plugins/better-wp-security/
  87. http://wordpress.org/plugins/bulletproof-security/
  88.  
  89. # A seemingly innocent PHP vuln
  90. http://danuxx.blogspot.de/2013/03/unauthorized-access-bypassing-php-strcmp.html
  91.  
  92.  
  93. ---
  94. https://wiki.ubuntu.com/BasicSecurity
  95. https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#Securing_the_unencrypted_boot_partition
  96.  
  97. http://www.danielmiessler.com/study/infosec_interview_questions/
  98.  
  99.  
  100.  
  101. [[[ Talks & Other videos ]]]
  102. http://makehacklearn.org/2014/03/06/trustycon-videos/
  103.  
  104.  
  105.  
  106. ---
  107.  
  108. [[[ Reddit ]]]
  109. # How to sign kernel for UEFI Secure Boot.
  110. http://www.reddit.com/r/linux/comments/1mw1xb/state_of_securely_booting_linux/
  111.  
  112. # SSL/TLS Deployment Best Practices
  113. http://www.reddit.com/r/netsec/comments/1mn2nk/ssltls_deployment_best_practices/
  114.  
  115. # Physical machine security
  116. http://www.reddit.com/r/netsec/comments/l91d5/physical_laptop_security/
  117.  
  118. # Linux sec
  119. http://www.reddit.com/r/linux/comments/1oobkf/what_kind_of_antimalware_exists_for_linux/
  120.  
  121. # OS under a OS
  122. http://www.reddit.com/r/linux/comments/1qib6u/the_second_proprietary_operating_system_hiding_in/
  123.  
  124. # grsec patches explained
  125. http://www.reddit.com/r/netsec/comments/renu4/grsecurity_pax_configuration_options_explained/
  126.  
  127. # 4 HTTP security headers you should always be using (ibuildings.nl)
  128. http://www.reddit.com/r/netsec/comments/1vztlh/4_http_security_headers_you_should_always_be_using/
  129.  
  130. # Show r/netsec: reveal your true IP address behind proxy/NATs using WebRTC (Firefox/Chrome) (jsfiddle.net)
  131. http://www.reddit.com/r/netsec/comments/1vzsnn/show_rnetsec_reveal_your_true_ip_address_behind/
  132.  
  133. # Laptop security best practices. What do you do? (self.linux)
  134. http://www.reddit.com/r/linux/comments/1zi10c/laptop_security_best_practices_what_do_you_do/
  135.  
  136. # Ever wonder what makes the new ssh-certificate authentication different from ssh-pubkey? This guide explains that and how to use it effectively. (neocri.me)
  137. http://redd.it/1zmsi2
  138.  
  139. # How I got root with Sudo (securusglobal.com)
  140. http://www.reddit.com/r/netsec/comments/20mftq/how_i_got_root_with_sudo/

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at