Bookmarks

Insecurity

http://www.cert.org/search_pubs/search.php
Hacking tools are not black magic tricks
The Open Source Security Testing Methodology Manual - Wikipedia, the free encyclopedia
Security Testing
SANS Institute - Packet Sniffing In a Switched Environment
This paper focuses on the threat of packet sniffing in a switched environment, briefly explores the effect in a non-switched environment, and covers ways to mitigate the threat of network sniffing in both non-switched and switched environments.

Program Tuts and Mans

Basic Encryption Concepts, Keys, Password, DES, Blowfish.
DataStronghold.com - Crafting Routing protocols using Nemesis
Google Webmaster Tools
Installing metasploit framework3 - Ubuntu Forums
John the Ripper Tutorial
Manpage of NEMESIS
One-way Web Hacking
SecurityDocs: Comment on NetCat Tutorial
Directory of information security articles, white papers, and documents
w3af - Web Application Attack and Audit Framework
w3af is a Web Application Attack and Audit Framework
Netcat – The TCP/IP Swiss Army Knife
Nessus 3 on ubuntu dapper | SubVS
InformIT: Security Through Penetration Testing: Internet Penetration > 1 Network Enumeration/Discovery
Penetration Testing and Network Defense: Performing Host Reconnaissance > Active Host Reconnaissance
Security Forums :: View topic - Tutorial: crafting routing protocols using nemesis
Share your knowledge & discuss all aspects of Computer & Internet Security via a worldwide community
Guide to network security
This guide introduces you to the main components in whole network security.
FOSSwire » Bullet proof your server #2 - SSH
Welcome to FOSSwire, a blog about free and open source software. FOSSwire offers news, tutorials, and articles for the open-sourced individual and/or enterprise.
Intrusion Detection: Snort, Base, MySQL, and Apache2 On Ubuntu 7.10 (Gutsy Gibbon) (Updated) | HowtoForge - Linux Howtos and Tutorials
Packet Injection 101 beginner tutorial using raw sockets at Security-Freak.Net

Free online network utilities - traceroute, nslookup, automatic whois lookup, ping, finger
Free online network utilities, including traceroute, nslookup, dig, automatic whois lookup, ping, finger, and our own Domain Dossier and Email Dossier. Some source code included.
Remote OS Detection using TCP/IP Fingerprinting (2nd Generation)
SecuriTeam™ - VNC Password Brute Force utility released
Beyond Security® will help you expose your security holes and will show you what the bad guys already know about your hosts and network. Use our Automated Scanning service to perform a full security audit of your site, and find the latest security news and tools on Beyond Security®'s SecuriTeam™ web site.
Tools - Offensive-security.com

Wireless

AirTraf > About
Cracking WPA-PSK
Hacking Techniques in Wireless Networks
Jon Udell: Cracking WEP in 10 minutes
Jon Udell's roles as writer, analyst, and developer intersect here on this weblog.

Intros

Introduction to Network Security
Introduction to Network Vulnerability Testing - White Paper
Network security, lesson 3: Penetration testing
Network Security Vendor Technology Document Directory
Directory of Network Security IT webinars, case studies, white papers, reports and vendor data to educate you about Network Security vendors.
How to hack articles and Hacking Tutorials
Computer and network security articles and hacking prevention resources for the government.
The Hack FAQ: Table of Contents
Buffer Overflow demo: Embry-Riddle, NSF Scholarships for Service Grant
Java applet animation of the widespread buffer overflow programming flaw and security attack.
Buffer-overflow attacks: How do they work?
Smashing the Stack for Fun and Profit by Aleph One
An excellent (if a bit dated) article/tutorial on exploiting buffer overflow vulnerabilities. It was written by Aleph One for Phrack 49.
Title
OWASP Testing Guide Appendix C: Fuzz Vectors - OWASP
Testing for SQL Injection - OWASP
Fuzzing: Brute Force Vulnerability Discovery
In this excerpt from <i>Fuzzing: Brute Force Vulnerability Discovery</i>, learn about SPIKE, one of the most popular and widely used fuzzing frameworks.
Getting started with hping3 -- hping network security tool
The hping security tool is a TCP/IP packet generator and analyzer with scripting capabilities. It is mainly used for firewalls auditing, network problems tracking, and penetration tests.

Misc Network Security Articles & Tutorials
WindowSecurity.com provides Windows security news, articles, tutorials, software listings and reviews for information security professionals covering topics such as firewalls, viruses, intrusion detection and other security topics.
Securitytools: FUZZING
Penetration Testing - GIAC Research in the Common Body of Knowledge
ISECOM - Making Sense of Security

Networking

Introduction to TCP/IP
Internet Protocols (IP)
Learn Networking - How to Subnet a Network
TCP / IP Protocols: ICMP UDP FTP HTTP Reference Page
TCP / IP Protocols: ICMP UDP FTP HTTP Protocols. WAN, LAN, ATM data communications and telecommunications
Improving Snort performance with Barnyard
Improve Nagios' performance with intrusion-detection tool streamlining tool, Barnyard.
HardwareCentral - Ultimate Guide to Networking: Part One.
Does the world of networking have you confused? Learn everything you've always wanted to know in Part One of HardwareCentral's Ultimate Networking Guide!

Protocols

FTP Technical Guide
Visit FTPplanet.com for everything FTP related. There is a section for everyone whether you're a webmaster, online auctioneer, game fanatic, MP3 enthusiast, new user or a file transfer expert. Search FTP sites for that elusive file, read the 'FTP Site of The Week', participate in
discussion groups, and read and review our list of more than 500 related resources.If it has to do with
FTP, you'll find it at FTPplanet.com.
What is FTP?
NetBIOS - Wikipedia, the free encyclopedia
ARP
How DHCP Technology Works
How IT Works: How Simple is SMTP? -- TechNet Magazine, November • December 2005
How IT Works: How Simple is SMTP? -- TechNet Magazine, November • December 2005
How does DHCP work?
Internet Group Management Protocol Overview
Internet Group Management Protocol (IGMP) is the MGMD protocol used for IPv4 multicast groups.
SSL and TLS
How Does Secure Socket Layer (SSL) Work?
A description of SSL, how it works, and what security it provides. Written for the layman.
UDP: the User Datagram Protocol
Understanding the ICMP Protocol (Part 2)
In part one of the article we covered what the ICMP protocol actually was, and what it was used for. Further to that we also looked at one of the most common ICMP message types seen; the ping packet. This last part on ICMP will cover other various types of ICMP error messages that can commonly be seen traversing the Internet.
Understanding the ICMP Protocol (Part 1)
Can you imagine a world where there are no traffic lights, stop signs, and other ways to control daily life? Well, just imagine what the Internet would be like then without the ICMP protocol. It would quickly become an unwieldy mess without it. In this article we will explore just what the ICMP protocol is, and how it works.
SSH Protocol Overview
Telnet RFCs
A listing and discussion of RFCs that describe the telnet protocol.
DNSRD: What is DNS?
What is DNS: high-level explanation of the Domain Name System
HTTP Protocol Overview
USUS - telnet: the protocol to log into other computers
A guide for journalists on how to use telnet.

Howstuffworks "What is a packet?"
I've heard that data travels in packets on a computer network. What is a packet, and why do networks use them?
Explanation of the Three-Way Handshake via TCP/IP
This article is intended for audiences who are familiar with Transmission Control Protocol/Internet Protocol (TCP/IP) and discusses the process of the TCP three-way handshake that occurs between a client and server when initiating or terminating a...
Howstuffworks "How Routers Work"
Routers are a vital component of the Internet -- they comprise an intricate network that delivers millions of e-mail messages every day. Find out how routers deliver packets to the correct address.
Introduction

misc

Manpage of PCAP
Manpage of TCPDUMP
SSH - Community Ubuntu Documentation
SSH over Tor
TechFest - OSI Model Overview
TechFest OSI Model Overview
Using nslookup, dig, and host

Eyecandy

RGB Hex Triplet Color Chart
Web Design Group's RGB Values Page
Wallpapers - Customize.org
Customize.org - Download Themes, Skins, Wallpapers and Icons for Windows from the original skin site!
ether's deviantART gallery
The table of equivalents / replacements / analogs of Windows software in Linux. (Official site of the table)
wallpaper by *EvilTHelL on deviantART
http://www.pixelgirlpresents.com/images/desktops/plastic_queer/run-2-withouttxt_1600.jpg
Wallpapers for PC and Mac desktops. » GUIStyles.com | Windows Styles, Gui, Themes, Skins, Mac Visual Styles, MSStyles, iTunes Skins, Styler Toolbar, Miranda, Firefox, Customize, Icons, Wallpapers, Gnome Mac Skins, KDE Themes
Wallpapers for PC and Mac desktops.
Wallpapers Gallery | Vladstudio.com - free desktop wallpapers, high resolution, widescreen and dual-monitor images, web design and development
Dual Screen Wallpapers
Dual Screen Wallpapers, desktop wallpapers, wallpaper, wallpapers,Dual Screen Wallpapers wallpaper, Dual Screen Wallpapers wallpapers,Dual Screen Wallpapers computer background

Bookmarks Toolbar Folder

Ubuntu Forums
Electronic Frontier Foundation | Defending Freedom in the Digital World
Network Security Blog
Network security articles and hacking prevention resources for the government and general public. Covering all aspects of Computer Hacking, including tutorials and exploit downloads.
Digg / All News & Videos

CLI and Bash

Bash Guide for Beginners
Symlink - Linux 101
linux_file_structure.jpg (image)
start [Ubuntu Document Storage Facility]
Understanding Linux file permissions
In a secure multi-user environment like Linux, file permissions access
rights are defined. However, these access rights can cause problems for
new users who are used to the access-anything style of DOS/Windows.
This is a short guide aimed at such novice users that explains the
basics and also the commands that are used to manage and administer
these permissions.
http://ubuntuforums.org/attachment.php?attachmentid=50685&d=1195456430
http://photos1.blogger.com/blogger/3370/2500/1600/GNULinuxupdatedw4.0.jpg
http://enacit1.epfl.ch/logiciel_libre/another-linux-distribution-timeline.png
Linux Commands Line
Linux Commands Line : The most complete and updated list of commands on linux - over 350 commands divided into argoments! LinuxGuide.it
VLC is not insallable, can't play DVD with Totem - Ubuntu Forums
VLC is not insallable, can't play DVD with Totem Absolute Beginner Talk
Interactive Linux kernel map

Network Management: Covering today's Network topics
Articles: Installing Linux on a Dead Badger: User's Notes, by Lucy A. Snyder
ASTALAVISTA - hacking & security community | ASTALAVISTA - the hacking and security community
:: Vexade.co.uk :: | The Best Photo And Video Blog In The World
Network Security - Network World
The latest wireless network security news, analysis and research from Network World.
Darknet - The Darkside

Python

Non-Programmer's Tutorial for Python/Contents - Wikibooks, collection of open-content textbooks
Learn Python in 10 minutes | Poromenos' Stuff
Catherine: pyOraGeek: cx_Oracle and Ubuntu
Catherine: pyOraGeek: cx_Oracle and Oracle XE on Ubuntu
One Day of IDLE Toying

Cutting-edge Think tank | Ethical Hacker Outfit | GNUCITIZEN
xkcd - A webcomic of romance, sarcasm, math, and language - By Randall Munroe

Grab Bag

Metasploit Framework Web Console 3.0
ASM Tutorial/Ready to Start!
Server Message Block - Wikipedia, the free encyclopedia
SNMP Tutorial Part 1: An Introduction to SNMP
SNMP tutorial, and introduction to SNMP: SNMP has achieved widespread acceptance since its creation in 1988 as a short-term solution to manage elements in the growing Internet and other attached networks.
Social Media in the 1990’s | Copy Brighter
URL PARSE!

Site hosted by Angelfire.com: Build your free website today!