Welcome to SecurityDocs

A collection of 8,040 IT security white papers, carefully curated by professionals like yourself

Context based Entropy : How to use keyed-steganography

by Keith Makan

I have spoken to a couple of people about this idea, those who know a little bit about steg often tell me this idea is pretty cool so I'll make it a little more public, see who catches it and starts doing interesting things before i do. Not saying I came up with this first, totally happy to pass the torch if I am to do so. But I do believe this idea could revolutionize security, cryptography and introduce a level of steganography to communication channels that is as hard to break as a secret ...

1 comment blog.k3170makan.com Encryption & Authentication

Google Hacking for Penetration Testers

by Johnny Long

This 170 page document covers all advanced Google OSINT gathering techniques commonly used by penetration testers.

1 comment Pen Testing & Audits

Hack Any Android Phone : msfvenon - Metasploit payload generator

by Ayush Patidar

msfvenom is a kali linux hacking tool for android ,is a combination of Msfpayload and Msfencode, putting both of these tools into a single Framework instance known as msfvenom payload. Hacking With METASPLOIT

1 comment www.kalitutorials.net Pen Testing & Audits

The Vaudenay Attack : A practical example

by Keith Makan

A padding oracle is a "device" (or for historically correct purposes a stoned virgin trapped in an enclosure) that reports on the correctness of the padding of a piece of cipher-text. We're going to abuse this mechanism in order to decrypt some cipher-text encrypted under a block cipher in CBC mode.

1 comment blog.k3170makan.com

Padding Oracle Attacks : The other padding that killed your secret key

by Keith Makan

Hi folks! In this post I'd like to talk about something that's pretty old but still crops up every now and then (example). I know for most folks this is nothing new but I'd still like to have a post about this attack in my archive and also deliver a good explanation of the attack in a way that makes it easier for more people to understand (I know for new comers this attack can be a bit of a mind bending exercise :P). Also if you want to be a total infosec / crypto hipster you can refuse to ca...

1 comment blog.k3170makan.com

Linux: 25 Iptables Netfilter Firewall Examples For New SysAdmins

Linux comes with a host based firewall called Netfilter. The netfilter is a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. A registered callback function is then called back for every packet that traverses the respective hook within the network stack. This Linux based firewall is controlled by the program called iptables to handles filtering for IPv4, and ip6tables handles filtering for IPv6.

1 comment www.cyberciti.biz

Iptables Essentials: Common Firewall Rules and Commands

by Mitchell Anicas

Iptables is the software firewall that is included with most Linux distributions by default. This cheat sheet-style guide provides a quick reference to iptables commands that will create firewall rules are useful in common, everyday scenarios. This includes iptables examples of allowing and blocking various services by port, network interface, and source IP address.

1 comment www.digitalocean.com

How to measure cybersecurity effectiveness

by Thor Olavsrud

Are you measuring the value and effectiveness of your cybersecurity efforts? Most companies around the world are failing to do so, according to a recent security measurement index benchmark survey. Without establishing the proper metrics, you're flying blind.

2 comments www.cio.com

Configure your web application pentesting lab

by Shashwat Chaudhary

In the previous tutorial, we set up our web application pentesting lab. However, it's far from ready, and we need to make some changes to get it working as per our needs. Here's the link to the previous post if you didn't follow that-

1 comment www.kalitutorials.net Pen Testing & Audits

How to build a cybersecurity team

by Blair Shiver

Cybersecurity professionals are bracing for continued attacks this year, effectively boosting their budgets by an average of 21%. These cybersecurity professionals are focused specifically on cloud infrastructure, training and educating end users, and securing mobile devices. While concerns around cybersecurity are high, more than half of midmarket companies operate with limited to no strategy at all.

1 comment www.cio.com

Hardening The Linux Kernel With Grsecurity (Debian)

Security is based on three characteristics: prevention, protection and detection. Grsecurity is a patch for Linux kernel that allows you to increase each of these points. This howto was performed on a Debian Lenny system. Thus some tools are Debian specific. However, tasks can be performed with other distro specific tools or even with universal tools (make).

1 comment www.howtoforge.com

Fraud Alert: Phishing — The Latest Tactics and Potential Business Impacts – Phishing White Paper

As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years. In fact, the cumulative number of phishing attacks recorded in 2011 represented a 37 percent increase over 2010.

1 comment www.symantec.com Detection & Response

Grepping for Glory : using grep to uncover Android Application Level Vulns

by Keith Makan

I've spent some time trawling through masses of Android App Sauce lately and I thought I'd share some quick tips and tricks that can help you uncover some critical vulnerabilities. In this post I'll discuss some basic bash scripting that pin points code being either in Java or Jasmin/Smali form.

1 comment blog.k3170makan.com

What is IT governance? A formal way to align IT & business strategy

by Kim Lindros

IT governance is a formal framework that provides a structure for organizations to ensure that IT investments support business objectives. The need for formal corporate and IT governance practices across U.S. organizations was fueled by the enactment of laws and regulations, including the Gramm–Leach–Bliley Act (GLBA) and the Sarbanes-Oxley Act, in the 1990 and early 2000s that resulted from the fallout from several high-profile corporate fraud and deception cases.

1 comment www.cio.com

Cloud Security Report

In the last few years the IT industry has crossed the chasm and cloud adoption no longer looks like an exotic proposition. This is as profound a paradigm shift as the Internet transformation appeared to be two decades ago, and it is driving an equally powerful change in the way we must evaluate the threat landscape. In 2017, we see a consolidation of threats in the very topmost layers of the computing model. The shift suggests that new approaches and fresh thinking will be required for busine...

1 comment www.alertlogic.com

WPA/WPA2 cracking using Dictionary attack with Aircrack-ng

by Shashwat Chaudhary

In this tutorial we will actually crack a WPA handshake file using dictionary attack. Our tool of choice for this tutorial will be aircrack-ng. We will not bother about the speed of various tools in this post. However, in the next post, we will compare various CPU and GPU algorithms for WPA hash cracking. I'd like to add that I already know the password of the network so I'll simply put it into the dictionary that I'm using.

1 comment www.kalitutorials.net Pen Testing & Audits

Suricata,Snorby and Barnyard2 set up guide

This is a detailed "How to guide" for setting up Suricata with Snorby and Barnyard2. In this particular set up we are using Suricata, Snorby, and Barnyard2.

1 comment redmine.openinfosecfoundation.org

Writing syslog messages to MySQL

by Rainer Gerhards

In this paper, I describe how to write syslog messages to a MySQL database. Having syslog messages in a database is often handy, especially when you intend to set up a front-end for viewing them. This paper describes an approach with rsyslogd, an alternative enhanced syslog daemon natively supporting MySQL. I describe the components needed to be installed and how to configure the

2 comments 7 minute read Apps & Hardening

Trojans and RansomWare explained in light of WannaCry RansomWare

by Shashwat Chaudhary

Over the past week, around 200,000 systems are believed to have been hacked by wannacry ransomware. Let's start with some background first, and then move into the details

1 comment www.kalitutorials.net

Even Faster Blind SQL injection methods

by Keith Makan

A method presented at DerbyCon and BlackHat involves extracting not the bits of the character but the bits of a characters position in a look up table which contains a number of character ascii values---more on this later. This post discusses the conceptual advantages and fundamental drawbacks of the bin2pos method and introduces a new variant I've developed which provides better stability and only requires a maximum of 4 requests per character extraction but imposes some configurational requ...

1 comment blog.k3170makan.com Pen Testing & Audits

Subscribe

We'll send you a carefully curated list of the best IT security white papers to your mailbox every Friday.