Texas Tech Security Group
196 followers 0 articles/week
Mapping Tor Relays and Exit Nodes

Introduction The Tor network is used by anyone who wants to maintain their online anonymity. There has recently been quite a bit of activity regarding Tor in the media, so I thought it would be helpful to explain a bit about how Tor's peer-to-peer structure is setup, as well as showing how we can create a map of Tor relays and exit nodes. The Basics...

Fri Sep 13, 2013 15:32
Building an SSH Botnet C&C Using Python and Fabric

Introduction Disclaimer: I suppose it would be wise to put a disclaimer on this post. Compromising hosts to create a botnet without authorization is illegal, and not encouraged in any way. This post simply aims to show security professionals how attackers could use standard IT automation tools for a purpose in which they were not originally intended....

Fri Jul 5, 2013 15:39
How Browsers Store Your Passwords (and Why You Shouldn't Let Them)

Introduction In a previous post, I introduced a Twitter bot called dumpmon which monitors paste sites for account dumps, configuration files, and other information. Since then, I've been monitoring the information that is detected. While you can expect a follow-up post with more dumpmon-filled data soon, this post is about how browsers store passwords....

Fri Jun 21, 2013 08:56
Smash the Stack IO Level 4 Writeup

Introduction It's been a while. I suppose finals, projects, etc. will do that. Anyway, I figured it was time to get back to posting content on here as much as possible - and I have some neat projects underway that I'm excited to share soon. For now, I'll continue the previous series covering the IO wargame on smashthestack.org. Analyzing Level 4...

Thu Jun 6, 2013 05:53
Introducing dumpmon: A Twitter-bot that Monitors Paste-Sites for Account/Database Dumps and Other Interesting Content

TL;DR I created a Twitter-bot which monitors multiple paste sites for different types of content (account/database dumps, network device configuration files, etc.). You can find it on Twitter and on Github. Introduction Paste-sites such as Pastebin, Pastie, Slexy, and many others offer users (often anonymously) the ability to upload raw text of...

Thu Mar 28, 2013 17:49
Installing Kali Linux in a VirtualBox Virtual Machine

Introduction For years, Backtrack Linux, a penetration testing suite from Offensive Security has been the standard operating system for security testing professionals. However, Offensive Security has just released a new distribution based on Backtrack called Kali Linux which seems to offer quite a few improvements. In a previous post, I showed how...

Fri Mar 15, 2013 06:54

Build your own newsfeed

Ready to give it a go?
Start a 14-day trial, no credit card required.

Create account