Bookmarks
Insecurity
- http://www.cert.org/search_pubs/search.php
- Hacking tools are not black magic tricks
- The Open Source Security Testing Methodology Manual - Wikipedia, the free encyclopedia
- Security Testing
- SANS Institute - Packet Sniffing In a Switched Environment
- This paper focuses on the threat of packet sniffing in a switched environment, briefly explores the effect in a non-switched environment, and covers ways to mitigate the threat of network sniffing in both non-switched and switched environments.
Program Tuts and Mans
- Basic Encryption Concepts, Keys, Password, DES, Blowfish.
- DataStronghold.com - Crafting Routing protocols using Nemesis
- Google Webmaster Tools
- Installing metasploit framework3 - Ubuntu Forums
- John the Ripper Tutorial
- Manpage of NEMESIS
- One-way Web Hacking
- SecurityDocs: Comment on NetCat Tutorial
- Directory of information security articles, white papers, and documents
- w3af - Web Application Attack and Audit Framework
- w3af is a Web Application Attack and Audit Framework
- Netcat – The TCP/IP Swiss Army Knife
- Nessus 3 on ubuntu dapper | SubVS
- InformIT: Security Through Penetration Testing: Internet Penetration > 1 Network Enumeration/Discovery
- Penetration Testing and Network Defense: Performing Host Reconnaissance > Active Host Reconnaissance
- Security Forums :: View topic - Tutorial: crafting routing protocols using nemesis
- Share your knowledge & discuss all aspects of Computer & Internet Security via a worldwide community
- Guide to network security
- This guide introduces you to the main components in whole network security.
- FOSSwire » Bullet proof your server #2 - SSH
- Welcome to FOSSwire, a blog about free and open source software. FOSSwire offers news, tutorials, and articles for the open-sourced individual and/or enterprise.
- Intrusion Detection: Snort, Base, MySQL, and Apache2 On Ubuntu 7.10 (Gutsy Gibbon) (Updated) | HowtoForge - Linux Howtos and Tutorials
- Packet Injection 101 beginner tutorial using raw sockets at Security-Freak.Net
- Free online network utilities - traceroute, nslookup, automatic whois lookup, ping, finger
- Free online network utilities, including traceroute, nslookup, dig, automatic whois lookup, ping, finger, and our own Domain Dossier and Email Dossier. Some source code included.
- Remote OS Detection using TCP/IP Fingerprinting (2nd Generation)
- SecuriTeam™ - VNC Password Brute Force utility released
- Beyond Security® will help you expose your security holes and will show you what the bad guys already know about your hosts and network. Use our Automated Scanning service to perform a full security audit of your site, and find the latest security news and tools on Beyond Security®'s SecuriTeam™ web site.
- Tools - Offensive-security.com
Wireless
- AirTraf > About
- Cracking WPA-PSK
- Hacking Techniques in Wireless Networks
- Jon Udell: Cracking WEP in 10 minutes
- Jon Udell's roles as writer, analyst, and developer intersect here on this weblog.
Intros
- Introduction to Network Security
- Introduction to Network Vulnerability Testing - White Paper
- Network security, lesson 3: Penetration testing
- Network Security Vendor Technology Document Directory
- Directory of Network Security IT webinars, case studies, white papers, reports and vendor data to educate you about Network Security vendors.
- How to hack articles and Hacking Tutorials
- Computer and network security articles and hacking prevention resources for the government.
- The Hack FAQ: Table of Contents
- Buffer Overflow demo: Embry-Riddle, NSF Scholarships for Service Grant
- Java applet animation of the widespread buffer overflow programming flaw and security attack.
- Buffer-overflow attacks: How do they work?
- Smashing the Stack for Fun and Profit by Aleph One
- An excellent (if a bit dated) article/tutorial on exploiting buffer overflow vulnerabilities. It was written by Aleph One for Phrack 49.
- Title
- OWASP Testing Guide Appendix C: Fuzz Vectors - OWASP
- Testing for SQL Injection - OWASP
- Fuzzing: Brute Force Vulnerability Discovery
- In this excerpt from <i>Fuzzing: Brute Force Vulnerability Discovery</i>, learn about SPIKE, one of the most popular and widely used fuzzing frameworks.
- Getting started with hping3 -- hping network security tool
- The hping security tool is a TCP/IP packet generator and analyzer with scripting capabilities. It is mainly used for firewalls auditing, network problems tracking, and penetration tests.
- Misc Network Security Articles & Tutorials
- WindowSecurity.com provides Windows security news, articles, tutorials, software listings and reviews for information security professionals covering topics such as firewalls, viruses, intrusion detection and other security topics.
- Securitytools: FUZZING
- Penetration Testing - GIAC Research in the Common Body of Knowledge
- ISECOM - Making Sense of Security
Networking
- Introduction to TCP/IP
- Internet Protocols (IP)
- Learn Networking - How to Subnet a Network
- TCP / IP Protocols: ICMP UDP FTP HTTP Reference Page
- TCP / IP Protocols: ICMP UDP FTP HTTP Protocols. WAN, LAN, ATM data communications and telecommunications
- Improving Snort performance with Barnyard
- Improve Nagios' performance with intrusion-detection tool streamlining tool, Barnyard.
- HardwareCentral - Ultimate Guide to Networking: Part One.
- Does the world of networking have you confused? Learn everything you've always wanted to know in Part One of HardwareCentral's Ultimate Networking Guide!
Protocols
- FTP Technical Guide
- Visit FTPplanet.com for everything FTP related. There is a section for everyone whether you're a webmaster, online auctioneer, game fanatic, MP3 enthusiast, new user or a file transfer expert. Search FTP sites for that elusive file, read the 'FTP Site of The Week', participate in
discussion groups, and read and review our list of more than 500 related resources.If it has to do with
FTP, you'll find it at FTPplanet.com.
- What is FTP?
- NetBIOS - Wikipedia, the free encyclopedia
- ARP
- How DHCP Technology Works
- How IT Works: How Simple is SMTP? -- TechNet Magazine, November • December 2005
- How IT Works: How Simple is SMTP? -- TechNet Magazine, November • December 2005
- How does DHCP work?
- Internet Group Management Protocol Overview
- Internet Group Management Protocol (IGMP) is the MGMD protocol used for IPv4 multicast groups.
- SSL and TLS
- How Does Secure Socket Layer (SSL) Work?
- A description of SSL, how it works, and what security it provides. Written for the layman.
- UDP: the User Datagram Protocol
- Understanding the ICMP Protocol (Part 2)
- In part one of the article we covered what the ICMP protocol actually was, and what it was used for. Further to that we also looked at one of the most common ICMP message types seen; the ping packet. This last part on ICMP will cover other various types of ICMP error messages that can commonly be seen traversing the Internet.
- Understanding the ICMP Protocol (Part 1)
- Can you imagine a world where there are no traffic lights, stop signs, and other ways to control daily life? Well, just imagine what the Internet would be like then without the ICMP protocol. It would quickly become an unwieldy mess without it. In this article we will explore just what the ICMP protocol is, and how it works.
- SSH Protocol Overview
- Telnet RFCs
- A listing and discussion of RFCs that describe the telnet protocol.
- DNSRD: What is DNS?
- What is DNS: high-level explanation of the Domain Name System
- HTTP Protocol Overview
- USUS - telnet: the protocol to log into other computers
- A guide for journalists on how to use telnet.
- Howstuffworks "What is a packet?"
- I've heard that data travels in packets on a computer network. What is a packet, and why do networks use them?
- Explanation of the Three-Way Handshake via TCP/IP
- This article is intended for audiences who are familiar with Transmission Control Protocol/Internet Protocol (TCP/IP) and discusses the process of the TCP three-way handshake that occurs between a client and server when initiating or terminating a...
- Howstuffworks "How Routers Work"
- Routers are a vital component of the Internet -- they comprise an intricate network that delivers millions of e-mail messages every day. Find out how routers deliver packets to the correct address.
- Introduction
misc
- Manpage of PCAP
- Manpage of TCPDUMP
- SSH - Community Ubuntu Documentation
- SSH over Tor
- TechFest - OSI Model Overview
- TechFest OSI Model Overview
- Using nslookup, dig, and host
Eyecandy
- RGB Hex Triplet Color Chart
- Web Design Group's RGB Values Page
- Wallpapers - Customize.org
- Customize.org - Download Themes, Skins, Wallpapers and Icons for Windows from the original skin site!
- ether's deviantART gallery
- The table of equivalents / replacements / analogs of Windows software in Linux. (Official site of the table)
- wallpaper by *EvilTHelL on deviantART
- http://www.pixelgirlpresents.com/images/desktops/plastic_queer/run-2-withouttxt_1600.jpg
- Wallpapers for PC and Mac desktops. » GUIStyles.com | Windows Styles, Gui, Themes, Skins, Mac Visual Styles, MSStyles, iTunes Skins, Styler Toolbar, Miranda, Firefox, Customize, Icons, Wallpapers, Gnome Mac Skins, KDE Themes
- Wallpapers for PC and Mac desktops.
- Wallpapers Gallery | Vladstudio.com - free desktop wallpapers, high resolution, widescreen and dual-monitor images, web design and development
- Dual Screen Wallpapers
- Dual Screen Wallpapers, desktop wallpapers, wallpaper, wallpapers,Dual Screen Wallpapers wallpaper, Dual Screen Wallpapers wallpapers,Dual Screen Wallpapers computer background
Bookmarks Toolbar Folder
- Ubuntu Forums
- Electronic Frontier Foundation | Defending Freedom in the Digital World
- Network Security Blog
- Network security articles and hacking prevention resources for the government and general public. Covering all aspects of Computer Hacking, including tutorials and exploit downloads.
- Digg / All News & Videos
CLI and Bash
- Bash Guide for Beginners
- Symlink - Linux 101
- linux_file_structure.jpg (image)
- start [Ubuntu Document Storage Facility]
- Understanding Linux file permissions
- In a secure multi-user environment like Linux, file permissions access
rights are defined. However, these access rights can cause problems for
new users who are used to the access-anything style of DOS/Windows.
This is a short guide aimed at such novice users that explains the
basics and also the commands that are used to manage and administer
these permissions.
- http://ubuntuforums.org/attachment.php?attachmentid=50685&d=1195456430
- http://photos1.blogger.com/blogger/3370/2500/1600/GNULinuxupdatedw4.0.jpg
- http://enacit1.epfl.ch/logiciel_libre/another-linux-distribution-timeline.png
- Linux Commands Line
- Linux Commands Line : The most complete and updated list of commands on linux - over 350 commands divided into argoments! LinuxGuide.it
- VLC is not insallable, can't play DVD with Totem - Ubuntu Forums
- VLC is not insallable, can't play DVD with Totem Absolute Beginner Talk
- Interactive Linux kernel map
- Network Management: Covering today's Network topics
- Articles: Installing Linux on a Dead Badger: User's Notes, by Lucy A. Snyder
- ASTALAVISTA - hacking & security community | ASTALAVISTA - the hacking and security community
- :: Vexade.co.uk :: | The Best Photo And Video Blog In The World
- Network Security - Network World
- The latest wireless network security news, analysis and research from Network World.
- Darknet - The Darkside
Python
- Non-Programmer's Tutorial for Python/Contents - Wikibooks, collection of open-content textbooks
- Learn Python in 10 minutes | Poromenos' Stuff
- Catherine: pyOraGeek: cx_Oracle and Ubuntu
- Catherine: pyOraGeek: cx_Oracle and Oracle XE on Ubuntu
- One Day of IDLE Toying
- Cutting-edge Think tank | Ethical Hacker Outfit | GNUCITIZEN
- xkcd - A webcomic of romance, sarcasm, math, and language - By Randall Munroe
Grab Bag
- Metasploit Framework Web Console 3.0
- ASM Tutorial/Ready to Start!
- Server Message Block - Wikipedia, the free encyclopedia
- SNMP Tutorial Part 1: An Introduction to SNMP
- SNMP tutorial, and introduction to SNMP: SNMP has achieved widespread acceptance since its creation in 1988 as a short-term solution to manage elements in the growing Internet and other attached networks.
- Social Media in the 1990’s | Copy Brighter
- URL PARSE!