Tuesday, May 08, 2007

Today's Goodies

TP Wire Service Technology RSS feed

http://tpwireservice.com/mt/archives/technology/index.html

=====================================================
Video: Exploring Metasploit 3 and the New and Improved Web Interface - Part 1
In this video we explore the revised MSFWeb interface for the Metasploit Framework 3.0. We specifically take a look at running auxiliary modules against a server running MSSQL, and then we'll take a look at using the MSFweb GUI to run the idq exploit with the meterpreter payload.
Link
http://www.ethicalhacker.net/content/view/137/24/
Added by
Dancho Danchev
==============================================================
Video: Exploring Metasploit 3 and the New and Improved Web Interface - Part 2
In this video we explore the revised MSFWeb interface for the Metasploit Framework 3.0. We specifically take a look at running "browser" exploits where you have to get the victim to connect back to your listening Metasploit instance. We'll use the ie_createobject exploit via the MSFweb GUI, and then we'll use the wmf_setabortproc exploit using the built in msfconsole (a new addition in MSFWeb 3.0).
Link
http://www.ethicalhacker.net/content/view/136/24/
Added by
Dancho Danchev

===================================================================
PhreakNic Videos

http://phreaknic.wilpig.org/PNX/

====================================================================
Secure Back Door (SBD)
Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. It is good if you don't want to have an SSH server running all the time, and only want to start it when needed. Because it is written in only a few lines of code, it is hoped that it will be less susceptible to security exploits than a program like SSH.
Link
http://sbd.sourceforge.net/
Platform
Linux
Added by
Dancho Danchev
===================================================================
Notacon 2007 - Video
Radar, full motion video on an 8088, a great Bluetooth discussion, shock sites, stun guns, Everclear, IPTV show hosts, Demoparty/Demoscene, hacker condoms, Ethernet alternatives, fire staffs, laser data links and more.
Link
http://www.irongeek.com/i.php?page=videos/notacon2007
Added by
Dancho Danchev
==================================================================
FakeChroot - a Fake Chroot Environment to Programs
A fake chroot allows you to run programs which require root privileges on an unprivileged user account. For example, you can create a Debian bootstrap or a development environment and build packages inside a chroot'ed system using a standard non-root user account. You can then use the apt-get command to install other packages without root privileges.
Link
http://fakechroot.alioth.debian.org/
Platform
Linux
Added by
Dancho Danchev
==================================================================

0 Comments:

Post a Comment

<< Home