last data update: 2011/10/14, 21:36
Website loading time
during the test: 1.63 s
cable connection (average): 2.01 s
DSL connection (average): 2.38 s
modem (average): 22.28 s
HTTP headers
HTTP/1.1 200 OK
Date: Sat, 15 Oct 2011 04:36:07 GMT
Server: Apache/2.2.3 (Win32) PHP/5.2.0 mod_perl/2.0.3-rc2 Perl/v5.8.8
X-Powered-By: PHP/5.2.0
Connection: close
Content-Type: text/html
Information about DNS servers
terminal23.net | MX | 40 | aspmx2.googlemail.com | IN | 43200 |
terminal23.net | MX | 50 | aspmx3.googlemail.com | IN | 43200 |
terminal23.net | MX | 10 | aspmx.l.google.com | IN | 43200 |
terminal23.net | MX | 20 | alt1.aspmx.l.google.com | IN | 43200 |
terminal23.net | MX | 30 | alt2.aspmx.l.google.com | IN | 43200 |
terminal23.net | A | 173.28.34.75 | IN | 3600 | |
terminal23.net | SOA | ns33.domaincontrol.com | dns.jomax.net | 2010121300 | 28800 7200 604800 86400 IN 43200 |
terminal23.net | NS | ns34.domaincontrol.com | IN | 3600 | |
terminal23.net | NS | ns33.domaincontrol.com | IN | 3600 |
Received from the first DNS server
Request to the server "terminal23.net"
You used the following DNS server:
DNS Name: ns34.domaincontrol.com
DNS Server Address: 208.109.255.17#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 13873
flag: qr aa rd REQUEST: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 0
REQUEST SECTION:
terminal23.net. IN ANY
ANSWER SECTION:
terminal23.net. 86400 IN SOA ns33.domaincontrol.com. dns.jomax.net. 2010121300 28800 7200 604800 86400
terminal23.net. 3600 IN A 173.28.34.75
terminal23.net. 3600 IN NS ns33.domaincontrol.com.
terminal23.net. 3600 IN NS ns34.domaincontrol.com.
terminal23.net. 604800 IN MX 10 aspmx.l.google.com.
terminal23.net. 604800 IN MX 20 alt1.aspmx.l.google.com.
terminal23.net. 604800 IN MX 30 alt2.aspmx.l.google.com.
terminal23.net. 604800 IN MX 40 aspmx2.googlemail.com.
terminal23.net. 604800 IN MX 50 aspmx3.googlemail.com.
Received 301 bytes from address 208.109.255.17#53 in 98 ms
Received from the second DNS server
Request to the server "terminal23.net"
You used the following DNS server:
DNS Name: ns33.domaincontrol.com
DNS Server Address: 216.69.185.17#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 18457
flag: qr aa REQUEST: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 0
REQUEST SECTION:
terminal23.net. IN ANY
ANSWER SECTION:
terminal23.net. 86400 IN SOA ns33.domaincontrol.com. dns.jomax.net. 2010121300 28800 7200 604800 86400
terminal23.net. 3600 IN A 173.28.34.75
terminal23.net. 3600 IN NS ns33.domaincontrol.com.
terminal23.net. 3600 IN NS ns34.domaincontrol.com.
terminal23.net. 604800 IN MX 10 aspmx.l.google.com.
terminal23.net. 604800 IN MX 20 alt1.aspmx.l.google.com.
terminal23.net. 604800 IN MX 30 alt2.aspmx.l.google.com.
terminal23.net. 604800 IN MX 40 aspmx2.googlemail.com.
terminal23.net. 604800 IN MX 50 aspmx3.googlemail.com.
Received 301 bytes from address 216.69.185.17#53 in 14 ms
Subdomains (the first 50)
Typos (misspells)
rerminal23.net ferminal23.net germinal23.net yerminal23.net 6erminal23.net 5erminal23.net twrminal23.net tsrminal23.net tdrminal23.net trrminal23.net t4rminal23.net t3rminal23.net teeminal23.net tedminal23.net tefminal23.net tetminal23.net te5minal23.net te4minal23.net terninal23.net terkinal23.net terjinal23.net termunal23.net termjnal23.net termknal23.net termonal23.net | term9nal23.net term8nal23.net termibal23.net termimal23.net termijal23.net termihal23.net terminzl23.net terminsl23.net terminwl23.net terminql23.net terminak23.net terminap23.net terminao23.net terminal13.net terminalq3.net terminalw3.net terminal33.net terminal22.net terminal2w.net terminal2e.net terminal24.net erminal23.net trminal23.net teminal23.net terinal23.net | termnal23.net termial23.net terminl23.net termina23.net terminal3.net terminal2.net etrminal23.net treminal23.net temrinal23.net terimnal23.net termnial23.net termianl23.net terminla23.net termina2l3.net terminal32.net tterminal23.net teerminal23.net terrminal23.net termminal23.net termiinal23.net terminnal23.net terminaal23.net terminall23.net terminal223.net terminal233.net |
Location
IP: 173.28.34.75
continent: NA, country: United States (USA), city: Davenport
Website value
rank in the traffic statistics:
There is not enough data to estimate website value.
Basic information
website build using CSS
code weight: 144.55 KB
text per all code ratio: 0 %
title: terminal23
description:
keywords:
encoding: utf-8
language: en
Website code analysis
one word phrases repeated minimum three times
two word phrases repeated minimum three times
three word phrases repeated minimum three times
B tags
1. Avoid password re-use for admins.
2. Run something that detects new hardware on your network.
3. Monitor your internal network to detect weird behavior and unexpected requests.
4. Monitor external DNS to detect new website/hostname exposed on Internet by your company.
5. Let your System/Network Admins use their magic.
6. Win small fights - one at a time
7. Save the money to hire people with skills instead of getting magic boxes that do little or nothing.
8. Use open source.
9. Go to real hacking conferences.
10. As a CSO, you MUST be involved with all “critical” projects.
11. Rub shoulders with those in the trenches.
12. It takes time.
13. Find a blend of talented people for various roles.
14. Dedicate time to your security technologies.
job.
The first step of a PCI DSS assessment is to accurately determine the scope of the review. At least annually and prior to the annual assessment, the assessed entity should confirm
verify that no cardholder data exists outside of the currently defined cardholder data environment (CDE)
PANBuster
Spider from Cornell
It can also scan UNC paths, including admin shares with the proper permissions.
SENF
CardRecon
IdentityFinder
DLP solutions
Forensics tools like EnCase
Either you're happy or you're not. If you're not happy, change things to attain that happy state. If you're unable or unwilling to make those changes, then you *must* change your viewpoint such that you become happy.
"That's not your problem."
The reaction to DigiNotar is not scalable.
1. Who are you using for trust?
2. Where are the certificates?
3. Be ready to replace certificates in response to a problem.
...But if you want to quickly learn a key lesson, check out these highlights from the investigation report – thanks to Ira Victor and the SANS forensics blog. No logging. Flat network. Unpatched Internet-facing systems. Total security fundamentals FAIL.
other security companies have been breached in recent years and failed to disclose.
StarCraft II
.: about
.: news
.: blogs/personal
.: learn-general
.: learn-web apps
.: vulns/exploits/tools
.: audio/podcasts
.: video
.: livecd
.: zines
.: forums
.: tools/apps
.: resources
.: dashboards
.: virus info
.: malware checkers
.: papers/guides
.: cons/training
.: archives
U tags
I tags
If anyone has any suggestions on this topic, please comment or tweet or email me!
images
file name | alternative text |
---|---|
noc14.jpg | noc14.jpg |
rss_1.jpg |
headers
H1
H2
H3
H4
H5
H6
internal links
address | anchor text |
---|---|
/ | noc14.jpg |
http://www.terminal23.net/2011/10/how_a_cso_can_make_life_harder.html | how a cso can make life harder for an attacker |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/10/how_a_cso_can_make_life_harder.html#comments | comments |
http://www.terminal23.net/2011/10/how_a_cso_can_make_life_harder.html#comments | (0) |
http://www.terminal23.net/2011/10/the_passing_on_of_steve_jobs.html | the passing on of steve jobs |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/10/the_passing_on_of_steve_jobs.html#comments | comments |
http://www.terminal23.net/2011/10/the_passing_on_of_steve_jobs.html#comments | (0) |
http://www.terminal23.net/2011/10/the_vendor_beating_and_lessons.html | the vendor beating and lessons in operations mgmt |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/10/the_vendor_beating_and_lessons.html#comments | comments |
http://www.terminal23.net/2011/10/the_vendor_beating_and_lessons.html#comments | (0) |
http://www.terminal23.net/2011/10/graham_on_ways_to_do_real_dama.html | graham on ways to do real damage to the nyse |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/10/graham_on_ways_to_do_real_dama.html#comments | comments |
http://www.terminal23.net/2011/10/graham_on_ways_to_do_real_dama.html#comments | (0) |
http://www.terminal23.net/2011/10/htc_phones_log_information_and.html | htc phones log information and don't secure it |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/10/htc_phones_log_information_and.html#comments | comments |
http://www.terminal23.net/2011/10/htc_phones_log_information_and.html#comments | (0) |
http://www.terminal23.net/2011/09/pci_20_scan_your_whole_network.html | pci 2.0: scan your whole network for cardholder data |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/pci_20_scan_your_whole_network.html#comments | comments |
http://www.terminal23.net/2011/09/pci_20_scan_your_whole_network.html#comments | (1) |
http://www.terminal23.net/2011/09/happiness_in_slaveryi_mean_sec.html | happiness in slavery...I mean, security |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/happiness_in_slaveryi_mean_sec.html#comments | comments |
http://www.terminal23.net/2011/09/happiness_in_slaveryi_mean_sec.html#comments | (0) |
http://www.terminal23.net/2011/09/lock_picking_video_series.html | lock picking video series |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/searchsecurity_article_on_ciss.html | searchsecurity article on cissp growth vs security value |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/searchsecurity_article_on_ciss.html#comments | comments |
http://www.terminal23.net/2011/09/searchsecurity_article_on_ciss.html#comments | (0) |
http://www.terminal23.net/2011/09/physicalwireless_incidents_won.html | physical/wireless incidents won't happen to us! |
http://www.terminal23.net/ | / |
http://www.terminal23.net/2011/09/resources_for_analyzing_malici.html | resources for analyzing malicious pdfs |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/quick_look_at_sept_2011_micros.html | quick look at sept 2011 microsoft security patches |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/for_the_technically_proficient.html | for the technically proficient, an article on laptop security |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/for_the_technically_proficient.html#comments | comments |
http://www.terminal23.net/2011/09/for_the_technically_proficient.html#comments | (1) |
http://www.terminal23.net/2011/09/diginotar_response_plus_ca_bcp.html | diginotar response, plus ca bcp/dr planning |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/security_elephants_arent_endan.html | security elephants aren't endangered |
taosecurity.blogspot.com/ | Richard Bejtlich |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/hardening_guide_to_drupal_77.html | hardening guide to drupal 7.7 |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/thought_replace_diginotar_with.html | thought: replace diginotar with network solutions or verisign |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/tinfoil_hats_and_web_of_trust.html | tinfoil hats and web of trust chatting |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/procrastinating_cpe_earnings_m.html | procrastinating cpe earnings? more like just not reporting them |
http://www.terminal23.net/general | /general |
http://www.terminal23.net/2011/09/jayson_streets_defcon_19_talk.html | jayson street's defcon 19 talk |
http://www.terminal23.net/general | /general |
/aboutsite.php | site |
/aboutauthor.php | author |
http://wiki.terminal23.net | wiki |
http://www.terminal23.net/atom.xml | img |
http://www.terminal23.net/ | / |
http://www.terminal23.net/general/ | /general |
http://www.terminal23.net/terminal23/ | /terminal23 |
http://www.terminal23.net/tools/ | /tools |
http://www.terminal23.net/web/ | /web |
http://www.terminal23.net/2011/10/ | October 2011 |
http://www.terminal23.net/2011/09/ | September 2011 |
http://www.terminal23.net/2011/08/ | August 2011 |
http://www.terminal23.net/2011/07/ | July 2011 |
http://www.terminal23.net/2011/06/ | June 2011 |
http://www.terminal23.net/2011/05/ | May 2011 |
http://www.terminal23.net/2011/04/ | April 2011 |
http://www.terminal23.net/2011/03/ | March 2011 |
http://www.terminal23.net/2011/02/ | February 2011 |
http://www.terminal23.net/2011/01/ | January 2011 |
http://www.terminal23.net/2010/12/ | December 2010 |
http://www.terminal23.net/2010/11/ | November 2010 |
http://www.terminal23.net/2010/10/ | October 2010 |
http://www.terminal23.net/2010/09/ | September 2010 |
http://www.terminal23.net/2010/08/ | August 2010 |
http://www.terminal23.net/2010/07/ | July 2010 |
http://www.terminal23.net/2010/06/ | June 2010 |
http://www.terminal23.net/2010/05/ | May 2010 |
http://www.terminal23.net/2010/04/ | April 2010 |
http://www.terminal23.net/2010/03/ | March 2010 |
http://www.terminal23.net/2010/02/ | February 2010 |
http://www.terminal23.net/2010/01/ | January 2010 |
http://www.terminal23.net/2009/12/ | December 2009 |
http://www.terminal23.net/2009/11/ | November 2009 |
http://www.terminal23.net/2009/10/ | October 2009 |
http://www.terminal23.net/2009/09/ | September 2009 |
http://www.terminal23.net/2009/08/ | August 2009 |
http://www.terminal23.net/2009/07/ | July 2009 |
http://www.terminal23.net/2009/06/ | June 2009 |
http://www.terminal23.net/2009/05/ | May 2009 |
http://www.terminal23.net/2009/04/ | April 2009 |
http://www.terminal23.net/2009/03/ | March 2009 |
http://www.terminal23.net/2009/02/ | February 2009 |
http://www.terminal23.net/2009/01/ | January 2009 |
http://www.terminal23.net/2008/12/ | December 2008 |
http://www.terminal23.net/2008/11/ | November 2008 |
http://www.terminal23.net/2008/10/ | October 2008 |
http://www.terminal23.net/2008/09/ | September 2008 |
http://www.terminal23.net/2008/08/ | August 2008 |
http://www.terminal23.net/2008/07/ | July 2008 |
http://www.terminal23.net/2008/06/ | June 2008 |
http://www.terminal23.net/2008/05/ | May 2008 |
http://www.terminal23.net/2008/04/ | April 2008 |
http://www.terminal23.net/2008/03/ | March 2008 |
http://www.terminal23.net/2008/02/ | February 2008 |
http://www.terminal23.net/2008/01/ | January 2008 |
http://www.terminal23.net/2007/12/ | December 2007 |
http://www.terminal23.net/2007/11/ | November 2007 |
http://www.terminal23.net/2007/10/ | October 2007 |
http://www.terminal23.net/2007/09/ | September 2007 |
http://www.terminal23.net/2007/08/ | August 2007 |
http://www.terminal23.net/2007/07/ | July 2007 |
http://www.terminal23.net/2007/06/ | June 2007 |
http://www.terminal23.net/2007/05/ | May 2007 |
http://www.terminal23.net/2007/04/ | April 2007 |
http://www.terminal23.net/2007/03/ | March 2007 |
http://www.terminal23.net/2007/02/ | February 2007 |
http://www.terminal23.net/2007/01/ | January 2007 |
http://www.terminal23.net/2006/12/ | December 2006 |
http://www.terminal23.net/2006/11/ | November 2006 |
http://www.terminal23.net/2006/10/ | October 2006 |
http://www.terminal23.net/2006/09/ | September 2006 |
http://www.terminal23.net/2006/08/ | August 2006 |
http://www.terminal23.net/2006/07/ | July 2006 |
http://www.terminal23.net/2006/06/ | June 2006 |
http://www.terminal23.net/2006/01/ | January 2006 |
http://www.terminal23.net/2005/08/ | August 2005 |
http://www.terminal23.net/2005/04/ | April 2005 |
http://www.terminal23.net/2005/03/ | March 2005 |
http://www.terminal23.net/2005/02/ | February 2005 |
http://www.terminal23.net/2004/12/ | December 2004 |
http://www.terminal23.net/2004/11/ | November 2004 |
http://www.terminal23.net/2004/10/ | October 2004 |
http://www.terminal23.net/2004/09/ | September 2004 |
http://www.terminal23.net/2004/08/ | August 2004 |
external links
address | anchor text |
---|---|
http://www.cso.com.au/blog/cso-bloggers/2011/10/14/if-i-was-cso-hacker/ | 14 things a CSO (read: IT security) can do to make an attacker's life harder. |
http://securosis.com/blog/friday-summary-goodbye-to-the-crazy-one | Securosis |
http://chucksblog.emc.com/chucks_blog/2011/09/the-vendor-beating.html | vendor beating and some hard lessons in IT. |
http://erratasec.blogspot.com/2011/10/anonymouss-war-against-new-york-stock.html | Anonymous threats against the NYSE. |
http://www.androidpolice.com/2011/10/01/massive-security-vulnerability-in-htc-android-devices-evo-3d-4g-thunderbolt-others-exposes-phone-numbers-gps-sms-emails-addresses-much-more/ | detailed an issue with recent HTC phones |
http://www.androidpolice.com/2011/10/04/htc-acknowledges-data-exposing-vulnerability-in-some-devices-promises-over-the-air-patch-shortly/ | subsequent response |
http://www.xmco.fr/panbuster.html | PANBuster |
http://www2.cit.cornell.edu/security/tools/ | Spider from Cornell |
https://senf.security.utexas.edu/ | SENF |
http://www.groundlabs.com/products/comparison | CardRecon |
http://www.identityfinder.com/ | IdentityFinder |
http://www.ashimmy.com/2011/09/an-open-letter-to-the-security-industry-we-live-in-amazing-times.html | optimism in security |
http://www.securosis.com/blog/incite-9-28-2011-renewal | Securosis mention it |
http://www.youtube.com/playlist?list=PL66CD42F86F3A1F85&feature=plcp | 24-part lock picking series |
http://twitter.com/#!/mckeay/status/117267433634541569 | @Mckeay |
http://searchsecurity.techtarget.com/opinion/ISC2-at-a-crossroads-CISSP-value-vs-security-industry-growth | problem between CISSP value and security industry growth |
http://www.infosecnews.org/ | infosecnews |
http://seattletimes.nwsource.com/html/localnews/2016278295_wardriving22m.html | cyber-thieves who would break into business wireless networks or even physical buildings |
http://stopmalvertising.com/malware-reports/analysis-of-wzzc_pdf-exploitjspdfkacnk.html | this analysis walkthru |
https://isc.sans.edu/diary.html?storyid=11551 | isc.sans.org |
http://ht.ly/6tHwe | eeye |
http://technet.microsoft.com/en-us/security/bulletin/ms11-070 | MS11-070 Vulnerability in WINS Could Allow Elevation of Privilege (2571621) |
http://technet.microsoft.com/en-us/security/bulletin/ms11-071 | MS11-071 Vulnerability in Windows Components Could Allow Remote Code Execution (2570947) |
http://technet.microsoft.com/en-us/security/bulletin/ms11-072 | MS11-072 Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2587505) |
http://technet.microsoft.com/en-us/security/bulletin/ms11-073 | MS11-073 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2587634) |
http://technet.microsoft.com/en-us/security/bulletin/ms11-074 | MS11-074 Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege (2451858) |
http://support.microsoft.com/kb/2616676 | DigiNotar fraudulent root certificate revocations |
http://www.securosis.com/blog/friday-summary-september-9-2011 | Securosis |
https://grepular.com/Protecting_a_Laptop_from_Simple_and_Sophisticated_Attacks | detailed article on laptop security |
http://datasecurityblog.wordpress.com/2011/09/05/september-05-2011-episode-228/ | Cyber Jungle podcast |
http://www.securosis.com/blog/incite-9-7-2011-decisions-decisions | Incite at Securosis |
http://infosecevents.net/ | reviews at Infosec Events |
http://computer-forensics.sans.org/blog/2011/09/06/diginotar-incident-response-report-no-logging-weak-password-no-protected-network | highlights from the investigation report |
http://blogs.securiteam.com/index.php/archives/1547 | hardening guide for Drupal 7.7 |
http://security-24-7.com/hardening-guide-for-drupal-7-7/ | found elsewhere |
http://it.toolbox.com/blogs/securitymonkey/defcon-19-talks-steal-everything-kill-everyone-cause-total-financial-ruin-48232 | "Steal Everything, Kill Everyone, Cause Total Financial Ruin" |
http://twitter.com/lonervamp | |
http://www.astalavista.com | astalavista |
http://www.darkreading.com | darkreading |
http://www.infosecnews.org | infosecnews |
http://www.linuxexposed.com/ | linux exposed |
http://www.net-security.org | net-security |
http://netsec.blogspot.com | net sec |
http://www.rootprompt.org | rootprompt |
http://www.rootsecure.net | rootsecure |
http://searchsecuritychannel.techtarget.com | searchsecurity |
http://searchwincomputing.techtarget.com/?track=sy43 | searchwin |
http://www.security-database.com/toolswatch/ | security-database |
http://www.wifinetnews.com | wifinetnews |
http://www.wirelessdefence.org | wirelessdefence |
http://www.zone-h.org/content/blogcategory/15/31/ | zone-h |
http://blog.1manit.net/ | 1-manitdept |
http://adminspotting.net | adminspotting |
http://vasim.blogspot.com/ | adnan's blog |
http://www.aldeid.com | aldeid |
http://www.andrewhay.ca/ | andrew hay |
http://andyitguy.blogspot.com/index.html | andy itguy |
http://anti-virus-rants.blogspot.com | anti-virus rants |
http://chuvakin.blogspot.com/index.html | anton chuvakin |
http://artofinfosec.com/ | artofinfosec |
http://arved.priv.at/weblog/ | arved |
http://www.attackvector.org | attack vector |
http://menno.b10m.net/blog/blosxom.cgi | b10[m |
https://www.brandenwilliams.com/blog/ | g] |
http://carnal0wnage.blogspot.com/ | branden williams |
http://blog.cowtowncomputercongress.org/ | carnal0wnage |
http://www.cultdeadcow.com/cms/main.php3 | ccckc |
http://www.cipherdyne.org/ | cdc |
http://www.clearnetsec.com/roller/page/cns | cipherdyne |
http://blog.commandlinekungfu.com/ | clearnetsec |
http://www.computerdefense.org/ | cmd line kung fu |
http://www.cqure.net/wp/ | computerdefense |
http://blogs.ittoolbox.com/security/dmorrill | cqure |
http://www.darknet.org.uk | dan morrill |
http://www.darkoperator.com | darknet |
http://staff.washington.edu/dittrich/ | darkoperator |
http://hhi.corecom.com/weblogindex.htm | dave dittrich |
http://jarrodloidl.blogspot.com | david piscitello |
http://didierstevens.wordpress.com | /dev/null |
http://digiassn.blogspot.com | didier stevens |
http://blog.trailofbits.com | digital voice |
http://www.dissectingthehack.com/ | dino dai zovi |
http://singe.za.net/blog | dissectingthehack |
http://www.computerworld.com/blogs/schweitzer | dominic white |
http://edsmiley.com | douglas schweitzer |
http://erratasec.blogspot.com/index.html | ed smiley |
http://www.f-secure.com/weblog | errata security |
http://geek00l.blogspot.com | f-secure |
http://geekybits.blogspot.com | geek00l |
http://www.gnucitizen.org | geekybits |
http://www.greebo.net/ | gnucitizen |
http://ha.ckers.org/ | greebo |
http://www.i-hacked.com/ | ha.ckers.org |
http://hackreport.net/ | i-hacked |
http://www.hackosis.com/ | hackreport |
http://www.headhacker.net | hackosis |
http://www.honeyblog.org | headhacker |
http://distributed.honeynets.org/main.php | honeyblog |
http://hype-free.blogspot.com/index.html | honeynets |
http://www.infonomicon.org/ | hype-free |
http://www.infosecleaders.com | infonomicon |
http://infosecpotpourri.blogspot.com/ | infosecleaders |
http://infosecplace.com/blog/ | infosec potpourri |
http://www.infosecramblings.com/ | infosecplace |
http://infosuck.org | infosecramblings |
http://www.innismir.net | infosuck |
http://isc.sans.org | innismir |
http://theinterw3bs.com | internet storm center |
http://ismellpackets.com/ | the interw3bs |
http://beechplane.wordpress.com | ismellpackets |
http://jeremiahgrossman.blogspot.com/ | jay jacobs |
http://www.757.org/~joat/ | jeremiah grossman |
http://www.joelonsoftware.com/ | joatblog |
https://kinqpinz.info | joelonsoftware |
http://www.krebsonsecurity.com | kinqpinz |
http://layer8.itsecuritygeek.com/ | krebs on security |
http://thelazyadmin.com/ | layer8 |
http://xavierashe.wordpress.com/ | lazyadmin |
http://www.lifehacker.com/ | lazy genius |
http://blogs.ittoolbox.com/linux/locutus | lifehacker |
http://www.curphey.com/ | locutus |
http://www.matasano.com/log/ | mark curphey |
http://www.matthewneely.com/ | matasano chargen |
http://mcwresearch.com/ | matthew neely |
http://metasploit.blogspot.com/ | mcwresearch |
http://en.wikibooks.org/wiki/Metasploit/Contents | metasploit |
http://www.modsecurity.org/blog/ | book |
http://blog.thoughtcrime.org/ | modsecurity |
http://blogs.technet.com/msrc/default.aspx | moxie marlinspike |
http://rdist.root.org/ | msrc |
http://blog.ncircle.com/ | nate lawson |
http://www.nettwerked.net/ | ncircle |
http://www.mckeay.net/secure/ | nettwerked |
http://newschoolsecurity.com | network security |
http://www.notsosecure.com/folder2/ | newschoolsecurity |
http://blog.n0where.org | notsosecure |
http://www.offensivecomputing.net/ | n0where |
http://ogenstad.net | offensivecomputing |
http://michaeldaw.org | ogenstad |
http://osvdb.org/blog/ | operation n |
http://packetlife.net/ | osvdb |
http://pcianswers.com/ | packetlife |
http://www.penetrationtests.com/ | pci answers |
http://philosecurity.org/ | penetrationtests |
http://blog.portswigger.net/ | philosecurity |
http://practicalexploitation.com/ | portswigger |
https://www.professionalsecuritytesters.org/ | practicalexploitation |
http://rarmknecht.net/wp/ | prosectesters |
http://www.rationalsurvivability.com/blog | rarmknecht |
http://ravichar.blogharbor.com/blog | rational survivability |
http://www.realtime-itcompliance.com/index.html | ravichar |
http://riosec.com/ | rebecca herold |
http://riskanalysis.riskmanagementinsight.com/ | riosec |
http://www.room362.com/ | riskanalysis |
http://www.rootkit.com | room362 |
http://www.secmaniac.com/ | rootkit |
http://www.sectechno.com | secmaniac |
http://securethoughts.com/ | sectechno |
http://www.securityaegis.com/ | secure thoughts |
http://securitythoughts.wordpress.com | securityaegis |
http://blogs.securiteam.com | securitythoughts |
http://securitybraindump.blogspot.com | securiteam blog |
http://security4all.blogspot.com/ | securitybraindump |
http://www.security-hacks.com/ | security4all |
http://securityincite.com/blog | securityhacks |
http://www.berylliumsphere.com/security_mentor/ | securityincite |
http://blogs.ittoolbox.com/security/investigator/ | security mentor |
http://www.security-sh3ll.blogspot.com/ | security monkey |
http://www.securitywizardry.com | security-shell |
http://www.securosis.com | securitywizardry |
http://www.shmoo.com/news/ | securosis |
http://www.siemninja.com | shmoo group |
http://www.nmrc.org/~thegnome/blog/ | siemninja |
http://www.skullsecurity.org/blog | simple nomad |
http://www.social-engineer.org/blog | skullsecurity |
http://spoofed.org/blog | social-engineer |
http://blog.starmind.org | spoofed.org |
http://www.stevegoodbarn.com | starmind.org |
http://myweb.facstaff.wwu.edu/~riedesg/sysadmin1138 | steve goodbarn |
http://tacticalwebappsec.blogspot.com/ | sysadmin1138 |
http://taosecurity.blogspot.com | tacticalwebappsec |
http://techbuddha.wordpress.com/ | tao security |
http://www.thespanner.co.uk | techbuddha |
http://www.spylogic.net | thespanner |
http://topheavysecurity.com | tom eston |
http://www.tssci-security.com | topheavysecurity |
http://www.2blocksaway.com | tssci security |
http://www.unleashnetworks.com/blog | 2blocksaway |
http://un-excogitate.org | unleash networks |
http://veracode.com/blog/ | un-excogitate |
http://blog.vulnerableminds.com/ | veracode |
http://windowsir.blogspot.com/ | vulnerable minds |
http://www.wirelessve.org/ | windowsir |
http://writequit.org/blog/ | wirelessve |
http://www.exoticliability.com/forum/topics/show-17-links | write-quit |
http://www.corewars.org/ | another list (el) |
http://www.cyberarmy.net/ | corewars |
http://www.darklevel.org | cyberarmy |
http://de-ice.net/ | darklevel |
http://www.ethicalhacker.net | de-ice |
http://www.forensicswiki.org/wiki/Recovering_deleted_data | ethicalhacker |
http://ha.ckers.org/blog/20090406/hacking-without-all-the-jailtime/ | forensics challenges |
http://www.hackerslab.org/eorg/hackingzone/hackingzone.htm | ha.ckers.org list |
http://www.hackthissite.org/ | hackerslab |
https://honeynet.org/challenges | hackthissite |
http://www.honeynet.org/scans/index.html | honeynet challenges |
http://handlers.sans.org/pbueno/ | honeynet scans |
http://blog.metasploit.com/2010/05/introducing-metasploitable.html | malware quizzes |
http://www.bonsai-sec.com/en/research/moth.php | metasploitable |
http://www.overthewire.org/wargames | moth |
http://www.packet-level.com/traces/index.htm | overthewire |
http://packetlife.net/lab/ | packet captures |
http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html | packetlife lab |
http://www.pythonchallenge.com/ | pentest mindmap |
http://scratchpad.wikia.com/wiki/Reverse_Engineering_Mentoring | python challenge |
http://www.smashthestack.org/ | reversing lessons |
http://testasp.vulnweb.com/ | smash the stack |
http://testaspnet.vulnweb.com/ | acunetix-asp (live) |
http://testphp.vulnweb.com/ | acunetix-aspnet (live) |
http://www.badstore.net/ | acunetix-php (live) |
http://sourceforge.net/projects/thebutterflytmp/files/ButterFly%20Project/ | badstore |
http://crackme.cenzic.com | butterfly (php) |
http://dvwa.co.uk | cenzic (live) |
http://enigmagroup.org/ | damn vuln webapp |
http://google-gruyere.appspot.com | enigmagroup |
http://www.foundstone.com/us/resources/proddesc/hacmebank.htm | gruyere |
http://www.o2-ounceopen.com/technical-info/2008/12/8/updated-version-of-hacmebank.html | hacmebank |
http://www.foundstone.com/us/resources/proddesc/hacmecasino.htm | hacmebank updated |
http://www.foundstone.com/us/resources/proddesc/hacmeshipping.htm | hacmecasino |
http://www.foundstone.com/us/resources/proddesc/hacmetravel.htm | hacmeshipping |
http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10 | hacmetravel |
http://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project | mutillidae |
http://www.owasp.org/index.php/Owasp_SiteGenerator | owasp insecureapp |
http://www.owasp.org/index.php/Category:OWASP_Vicnum_Project | owasp sitegenerator |
http://www.owasp.org/index.php/OWASP_WebGoat_Project | owasp vicnum |
http://pctechtips.org/hacker-challenge-pwn3d-the-login-form/ | owasp webgoat |
http://suif.stanford.edu/~livshits/securibench/ | pctechtips (live) |
http://suif.stanford.edu/~livshits/work/securibench-micro/ | securibench |
http://zero.webappsecurity.com | securibench-micro |
http://demo.testfire.net/ | spi dynamics (live) |
http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project | watchfire (live) |
http://www.mavensecurity.com/WebMaven/ | webgoat |
http://www.nottrusted.com/x5s/ | webmaven |
http://www.auscert.org.au | x5s |
http://www.securityfocus.com/archive/1 | auscert |
http://www.cert.org | bugtraq |
http://www.cvedetails.com | cert |
http://research.eeye.com/rss/zeroday.rss | cvedetails |
http://www.itsecdb.com/oval | eeye 0day tracker |
http://www.knowledgecave.com/ | itsecdb/oval |
http://www.mcafee.com/us/threat_center/default.asp | knowledgecave |
http://www.milw0rm.com | mcafee |
http://nvd.nist.gov | milw0rm |
http://exploits.offensive-security.com | nvd |
http://osvdb.org | offsec exploits |
http://www.penetrationtests.com/Knowledge-Zone/Videos | osvdb |
http://www.securiteam.com | pentests videos |
http://www.securitytracker.com/startup/index.html | securiteam |
http://secwatch.org | securitytracker |
http://www.us-cert.gov/cas/techalerts/index.html | secwatch |
http://vigilance.fr | us cert |
http://www.vupen.com/english | vigil@nce |
http://www.websense.com/securitylabs/blog | vupen |
http://www.wiretapped.net | websense |
http://www.binrev.com/ | wiretapped |
http://dyork.livejournal.com/ | binary revolution |
http://datasecurityblog.wordpress.com | blue box voip |
http://cyberspeak.libsyn.com/ | the cyber jungle |
http://www.forensic4cast.com/ | cyberspeak |
http://www.eurotrashsecurity.eu/episodes/eurotrash.xml | forensic4cast |
http://www.exoticliability.com/ | eurotr@sh |
http://www.getmon.com | exoticliability |
http://hackermedia.org/ | getmon |
http://hackerpublicradio.org/ | hackermedia |
http://www.hackervoice.co.uk/ | hackerpublicradio |
http://www.lets-talk-computers.com/ | hacker voice |
http://www.hackervoice.co.uk/ | lets talk computers |
http://netsecpodcast.com | hacker voice |
http://www.2600.com/offthehook/ | netsecpodcast |
http://www.2600.com/offthewall/ | off the hook |
http://www.owasp.org/index.php/OWASP_Podcast | off the wall |
http://www.pauldotcom.com/ | OWASP |
http://risky.biz/netcasts/risky-business | pauldotcom |
http://runyourownserver.org/ | risky-business |
http://www.sans.org/audiocasts | runyourownserver |
http://securabit.com/ | SANS audiocasts |
http://www.securityinfowatch.com/podcast/ | securabit |
http://securityjustice.com/ | securityinfowatch |
http://www.cigital.com/silverbullet/ | security justice |
http://www.social-engineer.org/framework/Podcast | silver bullet security |
http://www.southernfriedsecurity.com | social-engineer.org |
http://www.sploitcast.com | southern fried sec |
http://www.carnal0wnage.com/ | sploitcast |
http://www.ustream.tv/dojosec | carnal0wnage |
http://www.hacktv.org/ | dojosec |
http://www.hak5.org/episodes | hack tv |
http://www.irongeek.com | hak5 |
http://www.isc2.org/securitytalk.aspx | irongeek |
http://learnsecurityonline.com/index.php?option=com_content&task=category§ionid=7&id=26&Itemid=66s | isc2 webinars |
http://www.milw0rm.com/video/ | learnsecurityonline |
http://practicalexploitation.com | milw0rm videos |
http://www.revision3.com | practicalexploitation |
http://www.sans.org/webcasts | revision3 |
http://www.security-freak.net/videos.html | sans webinars |
http://www.securitytube.net/ | security-freak |
http://www.techcentric.org/ | securitytube |
http://www.theacademy.ca/ | techcentric |
http://www.microsoft.com/technet/scriptcenter/webcasts/archive.mspx | the academy.ca |
http://www.backbox.org/public | windows scripting |
http://www.backtrack-linux.org | backbox |
http://www.deftlinux.net | backtrack |
http://www.skynet-solutions.net/index.php?option=com_content&view=article&id=47&Itemid=86 | deft |
http://my.rawpacket.org | easyids (distro) |
https://projects.honeynet.org/honeywall | hex |
http://www.snorby.org/ | honeywall |
http://www.hackfromacave.com/katana.html#katana_download | insta-snorby (distro) |
http://www.networksecuritytoolkit.org/nst/ | katana |
http://appseclive.org/blog | netsec toolkit (nst) |
http://pentoo.blogspot.com/ | owasp |
http://samurai.inguardians.com | pentoo |
http://securityonion.blogspot.com/ | samuraiwtf |
https://www.wzdftpd.net/redmine/projects/siem-live | securityonion |
http://bailey.st/blog/smooth-sec/ | siem-live |
http://trinityhome.org/Home/blog.php?front_id=15 | smooth-sec (distro) |
http://www.ubcd4win.com/index.htm | trinity rescue kit |
http://vipervast.sourceforge.net/ | ubcd4win |
http://www.insecuremag.com/ | vipervast (voip) |
http://www.theiia.org/itaudit/ | (in)secure |
http://www.phrack.org/ | itaudit |
http://www.securityhorizon.com/journal.php | phrack |
http://www.uninformed.org/? | securityjournal |
http://www.usenix.org/publications/login/ | uninformed |
http://www.antionline.com/ | usenix |
http://www.daniweb.com/ | antionline |
http://www.h4cky0u.org/ | daniweb |
http://www.hacking-passion.com | h4cky0u |
https://forum.hackinthebox.org/ | hacking-passion |
https://forum.hackinthebox.org/ | hackinthebox |
http://www.infosyssec.com/forum/ | hak5 |
http://www.ism-community.org/ | infosyssec |
http://forums.remote-exploit.org/index.php | ism community |
http://www.securitycatalyst.org/forums/ | remote-exploit |
http://www.tazforum.thetazzone.com/index.php | securitycatalyst |
http://www.undergroundnews.com/cgi-bin/ubbcgi/ultimatebb.cgi | taz forums |
httphttp://www.waraxe.us/index.html | undergroundnews |
https://wiki.remote-exploit.org/backtrack/ | waraxe |
http://www.dirk-loss.de/win-tools.htm | backtrack wiki |
http://rnicrosoft.net/ | dirk loss |
http://computer-forensics.privacyresources.org/ | forensics - harbour |
http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/forensic-toolkit.htm | forensics toolkit |
http://www.mandiant.com/software.htm | foundstone tools |
http://www.nirsoft.net | mandiant tools |
http://www.opensourcewindows.org/ | nirsoft |
http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project | opensource windows |
http://www.owasp.org/index.php/Phoenix/Tools | owasp flash project |
http://packetstormsecurity.org/ | owasp phx tools |
http://www.stearns.org/doc/pcap-apps.html | packetstorm |
http://www.russix.com | pcap apps |
http://www.securityfocus.com/tools | russix |
http://www.securityforest.com/wiki/index.php/Main_Page | securityfocus tools |
http://www.staticrez.org/toolkit.php | securityforest |
http://www.darknet.org.uk/2006/04/top-15-securityhacking-tools-utilities/ | staticrez tools |
http://sectools.org/tools2003.html | top 15 hack tools |
http://www.astalavista.com/index.php?page=76 | top 50 tools 2003 |
http://sectools.org/ | top 50 tools asta |
http://seetips.blogspot.com/2006/04/best-freeware-guide.html | top 100 tools 2006 |
http://en.wikipedia.org/wiki/List_of_portable_applications | top freeware apps |
http://www.hak5.org/wiki/index.php?title=USB_Goodies | top portable apps |
http://www.tacticalvoip.com/tools.html | usb goodies on hak5 |
http://www.voipsa.org/Resources/tools.php | voip tacvoip tools |
http://www.softwareqatest.com/qatweb1.html#SECURITY | voip tools |
http://www.wikistc.org/ | web security tools |
http://www.the-cloak.com/anonymous-surfing-home.html/ | wikistc |
http://www.atomintersoft.com/products/alive-proxy/proxy-list | anon web browsing |
http://www.samair.ru/proxy/ | anon web proxies |
http://www.mikezilla.com/exp0012.html | anon web proxies |
http://www.paulschou.com/tools/xlate/ | ascii converters |
http://www.vortex.prodigynet.co.uk/misc/ascii_conv.html | o |
http://www.auditmypc.com/ | o |
http://www.opinionatedgeek.com/dotnet/tools/Base64Decode/Default.aspx | auditmypc |
http://clez.net/ | base64 to binary |
http://csrc.ncsl.nist.gov/ | clez tools |
http://www.privacyrights.org/ar/ChronDataBreaches.htm | csrc |
http://sharkysoft.com/misc/vigenere/ | data breaches |
http://www.redoracle.com/index.php?option=com_password&task=rlist | decode vigenere |
http://www.phenoelit.de/dpl/dpl.html | default passwords |
http://www.dnsstuff.com/ | o |
http://www.dnswatch.info/ | dnsstuff |
http://www.lookupserver.com/ | o |
http://www.e-proxy.info/ | o |
http://exploitsearch.com/ | e-proxy |
http://www.hackerwatch.org/probe/ | exploit search |
http://hashcrack.blogspot.com | firewall test |
http://www.maxmind.com/app/locate_ip | hashcrack |
http://www.computersecuritynow.com/ | ip-to-country lookup |
http://jsunpack.jeek.org/dec/go | iso 17799 portal |
http://www.digilife.be/quickreferences/QRC/Linux%20Security%20Quick%20Reference%20Guide.pdf | jsunpack |
http://standards.ieee.org/regauth/oui/index.shtml | linux security sheet |
http://www.mailinator.com | mac assignments |
http://www.abuse.net/relay.html | mailinator |
http://www.tmto.org/ | mail relay test |
http://www.hashhack.com/index.php | md5 and sha1 lookup |
http://md5pass.com/ | md5 hashes |
http://www.hash-cracker.com/ | o |
http://md5crack.com/ | o |
http://csrc.nist.gov/pcig/cig.html | o |
http://nmap-online.com/ | nist standards |
http://nmaptweaker.clearnetsec.com/ | nmap-online |
http://puck.nether.net/netops/nocs.cgi | nmap tweaker |
http://www.enc.com.au/itools/nslookup.php | nocs list |
http://www.nsa.gov/snac/ | nslookup |
http://numbr.com/ | nsa standards |
http://www.allthreats.com/index.pl/ | numbr |
http://www.owasp.org/index.php/OWASP_Testing_Guide_v2_Table_of_Contents | online net/file scan |
http://www.packetfocus.com | owasp testing guide |
http://skullsecurity.org/wiki/index.php/Passwords | packetfocus |
http://www.penetrationtests.com | password lists |
http://code.google.com/p/pentest-bookmarks/wiki/BookmarksList | penetration testing |
http://www.iana.org/assignments/port-numbers | pentesting-bookmarks |
http://www.iss.net/security_center/advice/Exploits/Ports/ | ports list |
http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers | o |
http://www.neohapsis.com/neolabs/neo-ports/ | o |
http://andrew.triumf.ca/cgi-bin/port | o |
http://reusablesec.googlepages.com/drcrack | ports lookup |
http://plain-text.info/ | rainbow gen |
http://nediam.com.mx/winhashes/ | rainbow online |
http://crushmachine.com/rip.php | o |
http://www.robtex.com/ | reverse ip tool |
http://seclists.org/ | robtex dns tool |
http://www.securitydistro.com/ | seclists |
http://www.securityfriday.com/Topics/index.html | securitydistro |
http://www.serversniff.net | securityfriday |
http://www.shodanhq.com | serversniff |
http://ferruh.mavituna.com/makale/sql-injection-cheatsheet// | shodan (search) |
http://www.networking4all.com/en/support/tools/site+check | sql-i cheatsheet |
https://www.ssllabs.com/ssldb/index.html | ssl check |
https://www.ssllabs.com/downloads/SSL_Server_Rating_Guide_2009-draft10.pdf | o |
http://www.sysinfo.org/startupinfo.html | o |
http://cb.vu/unixtoolbox.xhtml | startup list |
http://www.vs-db.info | unix toolbox |
http://www.wardriving.com/ | vs-db (vulnerable sites) |
http://www.wigle.net/ | wardriving |
http://www.corecom.com/html/wlan.html | wigle |
http://www.l-com.com/familylist.aspx?id=2149 | wireless corner |
http://www.danets.com | wireless gear |
http://bengross.com/wireless.html | o |
http://www.digininja.org/projects/cewl.php | wireless links |
http://www.remote-exploit.org/codes_wyd.html | wordlist makers |
ftp://ftp.ox.ac.uk/pub/wordlists/ | o |
http://theargon.com/achilles/wordlists/ | wordlists |
http://www.totse.com/en/hack/word_lists/index.html | o |
http://www.openwall.com/passwords/wordlists/ | o |
http://www.outpost9.com/files/WordLists.html | o |
http://packetstormsecurity.org/Crackers/wordlists/ | o |
http://ha.ckers.org/xss.html | o |
http://www.xssed.com | xss cheatsheet |
http://atlas.arbor.net/ | xssed |
http://www.cyberdefender.com/early_alert_center.html | atlas |
http://www.dshield.org/ | cyberdefender |
http://worldmap.f-secure.com/vwweb_1_2/en/previous_day | dshield |
http://www.internetpulse.net/ | f-secure |
http://weather.uci.edu/ | internet pulse |
http://www.mynetwatchman.com/ | internet weather |
http://phishery.internetdefence.net/rtmonitor.cgi | mynightwatchman |
http://www.security-database.com | phishing monitor |
http://www.senderbase.org | security-database |
http://www.shadowserver.org/wiki/ | senderbase |
http://www.networkintrusion.co.uk/radar.htm | shadowserver |
https://gtoc.iss.net/issEn/delivery/gtoc/index.jsp | talisker radar |
http://www.f-secure.co.uk/security_center/virus_world_map.html | threat level |
http://www3.ca.com/securityadvisor/virusinfo/default.aspx | world virus map |
http://www.f-secure.com/virus-info/ | ca |
http://us.mcafee.com/virusInfo/ | f-secure |
http://www.messagelabs.com/Threat_Watch | mcafee |
http://www.symantec.com/enterprise/security_response/index.jsp | messagelabs |
http://www.trendmicro.com/vinfo/ | symantec |
http://www.virus.org/ | trend |
http://www.viruslist.com/eng/index.html | virus.org |
http://anubis.iseclab.org/ | viruslist |
http://safebrowsing.clients.google.com/safebrowsing/diagnostic?site=site.com | anubis (file/url) |
http://linkscanner.explabs.com/linkscanner/default.aspx | google diags (url) |
http://safeweb.norton.com/ | linkscanner (url) |
http://onlinelinkscan.com/ | nortonsafeweb (url rep) |
http://www.siteadvisor.com/ | onlinelinkscan (url) |
http://www.stopbadware.org/home/reportsearch | siteadvisor (url) |
http://www.trustedsource.org/urlcheck/ | stopbadware (url) |
http://www.virustotal.com/en/indexf.html | trustedsource (url rep) |
http://wepawet.iseclab.org/ | virustotal (file) |
http://www.giac.org/practical.phpl | wepawet (file/url) |
http://www.howtoforge.com | giac papers |
http://www.infosecwriters.com/ | howto forge |
http://www.bastille-linux.org/jay/security-articles-jjb.html | infosecwriters |
http://www.networkuptime.com/nmap/index.shtml | jay beale papers |
http://www.openrce.org/articles/ | nmap |
http://www.orkspace.net/secdocs/ | open reverse engi |
http://www.secmanager.com/ | orkspace |
http://www.techtutorials.com/ | secmanager papers |
http://www.blackhat.com | techtutorials |
http://www.blackhat.com/html/bh-multimedia-archives-index.html | blackhat |
http://www.cccure.org/ | media |
http://searchsecurity.techtarget.com/content/0,290959,sid14_gci1011810,00.html?Offer=SEwnsecschool104 | cccure |
http://www.defcon.org/ | cissp training |
http://dmiessler.com/writing/infoseccerts/ | defcon |
http://www.imiti.org/ | guide to infosec certs |
http://www.issa-ps.org/ | imiti |
https://www.learnsecurityonline.com/index.php | issa-ps |
http://www.offensive-security.com/metasploit-unleashed/ | learnsecurityonline |
http://www.nanog.org/ispsecurity.html | metasploit unleased |
http://www.offensive-security.com/ | nanog |
http://www.isecom.org/projects/opst.shtml | offensive security |
http://www.sans.org/ | opst |
http://www.security-briefings.com/blog/index.php | sans |
http://www.shmoocon.org/ | securitybriefings |
http://www.sensepost.com/training.html | schmoocon |
http://www.simulationexams.com/ | sensepost |
http://www.toorcon.org/ | simulation exams |