Bookmarks for 8 Mar 2016 through 14 Mar 2016

These are my links for 8 Mar 2016 through 14 Mar 2016:

  • Zsoldier’s Tech Blog: Add Portgroups/VLANs to vmware standard switches via PowerCLI – Wrote a simple little script to insert a portgroup into a targeted vSwitch of all VM hosts in a targeted cluster. This is not an issue if you use distributed vSwitches.
  • siph0n – exploits : leaks : dumps : papers : hashes – Hello and welcome to "siph0n", we are a group of security enthusiasts that want to make people
    more aware of security risks and the risks behind compromised(stolen) data.
    By using this Site, you signify your assent to these Terms of Service if you do not agree to any of these conditions,
    do not use this website.
  • Hardening Framework – […] Server hardening is a well-known topic with many guides out in the wild. Why this project? At Deutsche Telekom we need to manage thousands of servers for customers and ourselves. All servers need to be configured properly and maintained, which is difficult and time-consuming to get right. To answer these needs for security, compliance, and maintainability, we decided to launch this project as a common ground for requirements and their fulfillment.[…]
  • Node-RED – Node-RED is a tool for wiring together hardware devices, APIs and online services in new and interesting ways.
  • zachlatta/sshtron: Play Tron over SSH – SSHTron is a multiplayer lightcycle game that runs through SSH

Bookmarks for 19 set 2013 through 25 set 2013

These are my links for 19 set 2013 through 25 set 2013:

  • AIXchange: Restricting FTP Access (AIX) – A customer was trying to restrict user access to a particular directory on an AIX system when FTP was used. We came across two good options.
  • FBI Tor Malware Analysis – […] In April 2013, a piece of malware was found embedded in Freedom Hosting's darknet server that would exploit a security hole in a particular web browser and execute code on the user's computer. This code gathered some information about the user and sent it to a server in Virginia and then crashed – it had no obvious malicious intent that is so characteristic of malware. It was therefore theorised that the FBI, who have offices in Virginia, and who have 'form' for writing malware, may have authored it – this now appears to be true. […]
  • Samba4 and OpenChange on a Debian or Ubuntu server – Samba4/Openchange suite promises to provide a complete Active Directory© domain controller with an alternative to a Microsoft Exchange server. Gracefully to the rewrite of MAPI protocol, Outlook can now seamlessly connect to a Linux server for synchronizing and sharing calendars, contacts, tasks and mails.

Bookmarks for 10 apr 2012 through 13 apr 2012

These are my links for 10 apr 2012 through 13 apr 2012:

  • php:zerobin [sebsauvage] – ZeroBin is a minimalist, opensource online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES. You can test it online.
  • logstash – open source log management – logstash is a tool for managing events and logs. You can use it to collect logs, parse them, and store them for later use (like, for searching). Speaking of searching, logstash comes with a web interface for searching and drilling into all of your logs.

    It is fully free and fully open source. The license is Apache 2.0, meaning you are pretty much free to use it however you want in whatever way.

  • Exploit Exercises – provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering.

    [ via ]

Bookmarks for 13 feb 2012 through 15 feb 2012

These are my links for 13 feb 2012 through 15 feb 2012:

  • Configuring a site-to-site VPN between a Sonicwall and Linux Openswan – Mike A. Leonetti – I have had the fortune of having the challenge to set up a site-to-site (or BOVPN/Branch Office VPN) between a Sonicwall and Openswan. I have searched for other articles that cover this topic and found plenty of information that got me far enough to get some of it working. However, getting the whole thing working took quite some time and I found the guides to be incomplete. So for the sake of even my own remembrance, I will write a mini guide up. Of course I will link all of the guides I've used in a references section.
  • VPN Site-to-Site Openswan x ASA (Cisco) – House of Linux – Ladies and gentleman, today I am going to demonstrate how to integrate technologies from different platforms. It is possible to use Cisco to integrate with Windows and Linux using protocol such as LDAP. In this case the communication between Linux and ASA (Adaptive Security Appliances) is straight. We will only need to check the cryptography configuration and that it, the connection is established.
  • Linux Commands – SkullSecurity – Recon, scanning, exploitation and password from comman line in linux (netcat, metasploit, etc)
  • Windows Commands – SkullSecurity – Recon, scanning and exploitation in a windows command line