[[[ WiFi YT vids ]]] https://www.youtube.com/user/NeedSec https://www.youtube.com/user/Raventattoo/videos https://www.youtube.com/user/Cyb3rw0rM1/videos # GUI frontend to reaver http://sourceforge.net/projects/wpscrackgui/ --- # HSM from a Raspberry Pi http://cryptosense.com/building-a-raspberry-pi-hsm-for-rsa-2014/ # Shredding files recursively into directories http://www.linuxforums.org/forum/miscellaneous/46693-how-shred-entire-directory-tree.html#post257616 # OpenBSD lol http://bbs.progrider.org/prog/read/1383465168 http://www.iusmentis.com/maatschappij/privacy/filmen-cameratoezicht/ # iptables http://blog.commandlinekungfu.com/2014/01/episode-174-lightning-lockdown.html # /g/ has root to NSA http://archive.rebeccablacktech.com/g/thread/S39950951#p39950951 # Scan the whole Internet in under 45 minutes! https://zmap.io/ # Inception - search RAM contents for interesting stuff http://www.breaknenter.org/projects/inception/ [[[ SELinux ]]] # From #centos Useful resources for SELinux: http://wiki.centos.org/HowTos/SELinux http://wiki.centos.org/TipsAndTricks/SelinuxBooleans http://docs.fedoraproject.org/en-US/Fedora/13/html/Security-Enhanced_Linux/ http://fedorasolved.org/security-solutions/selinux-module-building http://www.youtube.com/watch?v=bQqX3RWn0Yw http://opensource.com/business/13/11/selinux-policy-guide http://wiki.centos.org/HowTos/SELinux http://beginlinux.com/server_training/web-server/976-apache-and-selinux http://docs.fedoraproject.org/en-US/Fedora/13/html/Managing_Confined_Services/ [ CentOS ] http://wiki.centos.org/HowTos/OS_Protection [[[ Theory ]]] # ECC Primer http://blog.cloudflare.com/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/2/ http://blog.serverfault.com/2011/12/12/a-studied-approach-at-wifi-part-1/ [[[ Wikipedia ]]] https://en.wikipedia.org/wiki/Data_remanence http://en.wikipedia.org/wiki/PA-DSS [[[ WebSec ]]] # Want to use my wifi? (cookie spoofing, MITM etc.) http://thejh.net/written-stuff/want-to-use-my-wifi? http://www.amanhardikar.com/mindmaps/Practice.html # The Web Application Vulnerability Scanners Benchmark http://sectooladdict.blogspot.se/2014/02/wavsep-web-application-scanner.html?m=1 # Hardening WordPress http://codex.wordpress.org/Hardening_WordPress http://halfelf.org/2013/false-security/ http://www.esecurityplanet.com/open-source-security/top-5-wordpress-vulnerabilities-and-how-to-fix-them.html https://wordpress.org/plugins/better-wp-security/ http://wordpress.org/plugins/bulletproof-security/ # A seemingly innocent PHP vuln http://danuxx.blogspot.de/2013/03/unauthorized-access-bypassing-php-strcmp.html --- https://wiki.ubuntu.com/BasicSecurity https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#Securing_the_unencrypted_boot_partition http://www.danielmiessler.com/study/infosec_interview_questions/ --- [[[ Reddit ]]] # How to sign kernel for UEFI Secure Boot. http://www.reddit.com/r/linux/comments/1mw1xb/state_of_securely_booting_linux/ # SSL/TLS Deployment Best Practices http://www.reddit.com/r/netsec/comments/1mn2nk/ssltls_deployment_best_practices/ # Physical machine security http://www.reddit.com/r/netsec/comments/l91d5/physical_laptop_security/ # Linux sec http://www.reddit.com/r/linux/comments/1oobkf/what_kind_of_antimalware_exists_for_linux/ # OS under a OS http://www.reddit.com/r/linux/comments/1qib6u/the_second_proprietary_operating_system_hiding_in/ # grsec patches explained http://www.reddit.com/r/netsec/comments/renu4/grsecurity_pax_configuration_options_explained/ # 4 HTTP security headers you should always be using (ibuildings.nl) http://www.reddit.com/r/netsec/comments/1vztlh/4_http_security_headers_you_should_always_be_using/ # Show r/netsec: reveal your true IP address behind proxy/NATs using WebRTC (Firefox/Chrome) (jsfiddle.net) http://www.reddit.com/r/netsec/comments/1vzsnn/show_rnetsec_reveal_your_true_ip_address_behind/ # Laptop security best practices. What do you do? (self.linux) http://www.reddit.com/r/linux/comments/1zi10c/laptop_security_best_practices_what_do_you_do/ # Ever wonder what makes the new ssh-certificate authentication different from ssh-pubkey? This guide explains that and how to use it effectively. (neocri.me) http://redd.it/1zmsi2