Saturday, January 30th, 2010
I just wanted to show a quick example of using Incognito to impersonate user tokens on a compromised system. You can think of tokens as a web "cookie" which is just an object that holds your security information for the entire login process so that you don't have to re-authenticate ...
Posted in Internet, Networking, Privacy, Security, Windows | 2 Comments
Monday, January 25th, 2010
Named Win32.Worm.Zimuse.A, this new nasty claims to be an IQ Test but is really a worm that will create about 7-11 copies of itself and store them in critical areas of your Windows system and then destroy the first 50KB of the Master Boot Record (MBR) after X number of ...
Posted in Internet, Security, Windows | No Comments
Friday, January 22nd, 2010
I just noticed that I have 13 different virtual machines installed on my home VirtualBox installation. It seems like a lot but there are many more that I would love to install and play with. This is just a variety of flavors I've needed in the past for "testing" ...
Posted in General BS, Internet, Linux, Networking, Windows | No Comments
Sunday, January 17th, 2010
While I was updating my VMs today with the final version of BackTrack 4 I decided to jump in and take a look at the new IE 0day exploit that was added to MetaSploit a couple of days ago. It works surprisingly well. I had 100% success rate with IE6. ...
Posted in Coding, Internet, Security, Software, Windows | 1 Comment
Tuesday, January 12th, 2010
I wanted to offer my personal backup routine to all those that do not have something in place and not sure where or how to start. I tried many different methods over the years and so far I think this is the best one for me, my amount of data, ...
Posted in Hardware, Networking, Privacy, Security, Windows | 2 Comments