Information Security Bookmarks

Saturday, November 07, 2009

Below is a list of bookmarks dealing with information security. The list has not been thoroughly reviewed so please let me know if something is out of date and should be removed. One of the most helpful sites to me when I began researching info sec was a blog post with a bunch of bookmarks, hopefully this will be similarly helpful to you.

Information Security Companies
Antivirus, anti-spyware, anti-spam, firewall. Protect yourself with Panda Security
Beyond Security - Automated Vulnerability Assessment and Management
CSC: Consulting, Systems Integration and Outsourcing
Damballa > - The Front Line Against Bot Armies
Digital Armaments for Intelligence
Dreamlab Technologies
eEye Digital Security » Internet Security | Vulnerability Assessment | Computer Network Security | Vulnerability Management<BR>
esentire online security
FindNot - Anonymous Surfing, Anonymous Email & Anonymous Internet
Flylogic Engineering
FYRM Associates, Inc. - Tools
GFI - Fax server, Exchange anti-virus, anti-spam, vulnerability management and email archiving software
HBGary
Linux Internet/Network Security Software, Hardware, & Services | Guardian Digital, Inc.
MainNerve.com - Securing Critical Systems
Marshal :: Threat Research and Content Engineering (TRACE)
News and Events - [WhiteHat Security, Inc.] (Web Application Security)
SCRT - Information Security - Home
Securify. Monitor and Verify Who, What & Where on Your Network.
Security Intelligence Technology Group : Cellular Intercept Systems and Equipment
Security-Assessment.com: Advise - Assess - Assure
SolarWinds: Network Management Software – Designed by Network Engineers for Network Engineers
Sûnnet Beskerming - Commentary & Insight From Sûnnet Beskerming
Sysdream / Sécurité Informatique :: Home
Welcome to U0vd Security Corporation
Home - RSA, The Security Division of EMC
ID QUANTIQUE
Information Security Research
Authentication
Kerberos
Kerberos: The Network Authentication Protocol
Radius
An Analysis of the RADIUS Authentication Protocol
FreeRADIUS: The world&#39;s most popular RADIUS Server
Blogs
A surreptitious look over the work of an innovative startup — Subreption blog
Aviv Raff On .NET
Black Security | Main
Blog - Research - SecureWorks
Chris Shiflett: PHP and Web Application Security
Computer Security Research - McAfee Avert Labs Blog
call dwerd ptr [6c756973]
Darknet - The Darkside | Ethical Hacking, Penetration Testing & Computer Security
Determina Security Blog
Devels playground
DShield; Cooperative Network Security Community - Internet Security - dshield
F-Secure Weblog : News from the Lab
Google Online Security Blog
Hack a Day
Hackszine.com
Home
ha.ckers.org web application security lab
hiredhacker.com - relevant ramblings of an ethical hacker
invisiblethings&#39; blog
Jeremiah Grossman
Linux Security, Single Packet Authorization, Intrusion Detection, iptables Log Analysis
Liquidmatrix Security Digest
leetupload.com
Matasano Chargen
Over The Wire - PullThePlug
Panda Research Blog, leading the way in proactive malware detection
PaulDotCom&#39;s Web Site: Security Archives
PLDsoft ::: IT-Security, Coding,Programming, Security Videos, HackITs, Web Security Challenge System - Home
Prevx Blog
RETURN $ecure;
Security Vulnerability Research & Defense
System Advancements at the Monastery
Tenable Network Security
The Art of Software Security Assessment
The Turkey Curse
TrendLabs | Malware Blog - by Trend Micro
tssci security
Uninformed
ush.it - a beautiful place
Websense Security Labs Blog
Silent noise | - about spam, trojans and other nasty stuff
Network Security Research and AI
33 Bits of Entropy
Silviocesare’s Weblog
Renesys Blog
Cards
Proximity Cards
Home - PCI Security Standards Council
CD & DVD
SlySoft Forum
Communities
.:[ packet storm ]:. - http://packetstormsecurity.org/
Electronic Frontier Foundation | Defending Freedom in the Digital World
Expert Tips to Deal with Hacking
Hack In The Box :: Keeping Knowledge Free
Home - The Community&#39;s Center for Security
johnny.ihackstuff.com - Home
Network security articles and hacking prevention resources for the government and general public. Covering all aspects of Computer Hacking, including tutorials and exploit downloads.
NIST.gov - Computer Security Division - Computer Security Resource Center
Ryan1918 DOT COM :: Index
Thwack
totse.com | Technology
SecDev.org
Grand Idea Studio
Welcome to Cryptography Research
h4cky0u • The #1 hacking, security and infosec forum
Security Xploded by Nagareshwar Talekar
NCHOVY 인터넷 스톰 센터 : 홈
SecurityTube - Watch, Learn and Contribute Computer Security Videos
Malware Forge
darklab.org
Darklab consists of a number of people, that have formed a group to share knowledge and interesting informations about computer security and IT in general.
Remote Exploit Forums - Home of BackTrack
Backtrack Remote-Exploit Forums
Sécurité informatique et veille en sécurité informatique
Site de veille en sécurité informatique: derniers bulletins de sécurité informatique traduits en français, tutoriaux sur la sécurité informatique et le hacking, logiciels de sécurité internet...
Denial of Service
Denial of Service Attacks - DDOS, SMURF, FRAGGLE, TRINOO DoS, DDoS, denial of service, distributed denial of service attack, icmp, smurf, http flood, dos attack, ddos attack
Documentation
Magazines
.:: Phrack Magazine ::.
0x000000 - THE HACKER WEBZINE
2600: The Hacker Quarterly
7A69XG
: b4b0.org - zine :
:: The Bug! Magazine - Information wants to be free ::
Binary Revolution - The Revolution will be Digitized!
bUTCHERED fR0M iNSiDE - Security Magazine
Die Datenschleuder
Magazine MISC - Edition française
Black Hat : Archives Index
Black Hat Multimedia - Presentation, Audio and Video Archives
bitsavers.org
Computer System and Network Security
Home page
HydraFlux - DeepRants
INFO-SEC dot EU - Information Security, Tools, Programming and Papers
Index of /e-books
L0T3K, Digital Girlie Juice
Main Page - DocDroppers
Wiretapped - Computer Security Software etc.
Filtering
Advisories : Bypassing content filtering - security vulnerabilities database
Firewalls
ipfw howto
Forensics
Forensic Acquisition Utilities
Forensic Analysis of a Live Linux System, Pt. 1
NIST Computer Forensic Tool Testing Program
Secure Deletion of Data from Magnetic and Solid-State Memory
JDAFTS
Forums
sla.ckers.org web application security forum
Blackhat-forums- Hacking / IT Security Community
Iran Hackerz Security Team
[Habo] | Startseite
Hardening
BASTILLE-LINUX
code jmorris
Security-Enhanced Linux
Hardware
cq.cx
OpenCiphers
The Hardware Book - HwB
limor
Wii Menu 4.2: a lack of imagination
Infrastructure
Critical Infrastructure Protection
Locks
Security.Org - Investigative Law Offices January 22, 2008
TOOOL
Waag Society - TOOOL Lockpick workshops
Mac OS
Mac OS X Hacks
MrDehbuga Home
Technical Note TN2124: Mac OS X Debugging Magic
Mac Security Hacking Apple OSX
SYMWorkshop - Metalab
The Mac Security Blog
Malware
Botnets
BotHunter Free Internet Distribution Page
TrustedSource - Storm Tracker
Lowkeysoft Publications: Proxy Botnet Analysis
Shadowserver Foundation - Main - HomePage
Rootkits
Anti Rootkit Software, News, Articles and Forums
bluepillproject.org
chkrootkit -- locally checks for signs of a rootkit
invisiblethings.org
rootkit.com
Stealth MBR rootkit
Virus
29A Labs
Above the Haze-Clouds
Cryptovirology
Viruslist.com - Information About Viruses, Hackers and Spam
VirusTotal - Free Online Virus and Malware Scan
Welcome! (VX heavens)
News
Rootsecure.net | Home
SecurityFocus
Zone-H.org - IT Security Information Network
TorrentFreak | The Latest Torrent News and Filesharing Info
...And you will know me by the trail of bits
Security Absurdity
sudosecure.net
Malware Database
Operations
Legal
Summary of the Provisions of the Sarbanes-Oxley Act of 2002
COSO
Standards
ISO27k infosec management standards
ISF The Standard Of Good Practice
ITIL ®- IT Infrastructure Library
Organizations
Italia
+Ma&#39;s Reversing - main page
A/I :: Home
ALCEI
Codex Alpe Adria 2007 (0xAA.org) - Digital Culture between Alps and Beaches
FreakNet Medialab, Catania
HackIt 0x0B - 26-27-28 settembre - Palermo
Home - UIC
Horde Demoparty
IKKISOFT - Ethical Hacking, Web Application Security, Digital Freedom
Isole nella Rete
kill-9.it
Metro Olografix
s0ftpr0ject
spaghettiphreakers.tk
Winnie lives here / Winnie vive qui
www.sikurezza.org - Italian Security Mailing List | Main / Home
Antifork Research, Inc.
Big Brother Is Watching You
CPNI
Cutting-edge Think tank | GNUCITIZEN
cDc -+- COWFEED -+- cDc
DoxPara Research
Droids Corporation
eicar - Home
Grand Idea Studio
grsecurity
Hacker Factor: Computer Consulting, Solutions, and Security
Hackers For Charity.ORG
Hackers Profiling Project
Hacking Truths
Hacktivismo: News
Horst Görtz Institute for IT-Security
http://www.devhell.org/
Intruders Tiger Team Security
Irongeek.com
KD-Team - Home
LASEC
New York City 2600
Ninja Strike Force
NoWires Research Group
nologin --
o0o.nu security research [ news ]
PHENOELIT
Recurity Labs
RedTeam
Remote-Exploit.org - Supplying offensive security products to the world
Roothack.org
Rstack.org
rezen.org
SecuObs.com - L&#39;observatoire de la sécurité internet
Security Practices and Research Student Association
Security-Protocols :: Computer Security Research
Shadowserver Foundation - Main - HomePage
SRI Malware Threat Center
trifinite.org - the home of the trifinite.group
Wehnus
Welcome to DEFCON®, the Largest Underground Hacking Convention in the World
Wisec - The WIse SECurity
[FM] == FelineMenace
[ISR] Infobyte Security Research
Homepage of PaX
Remote-Exploit.org - Supplying offensive security products to the world
Remote Exploit Security Group. Offensive Security Training. Home of BackTrack, a Live CD for Security Penetration Testing.
Reconnaissance
American Civil Liberties Union
httprecon project
Internet Archive
Recurity Labs PortBunny
SITE Intelligence Group
The Art of Electronic Deduction - DocDroppers
Unicornscan
[DP] - Default DB Ports, Computer Ports, TCP/UDP Ports, Services, Protocols
[the new p0f]
Satellite
Feedhunter Rini
dvbsnoop - DVB Stream Analyzer, MPEG Analyzer
dvbsnoop - dvbsnoop is a dvb stream analyzer and monitoring tool for DVB data transmission streams and related data streams. MPEG, MHP, DSM-CC, TS, PES
PY2ADN - Ham Radio (Adinei Brochi)
UHF-Satcom.com - The #1 online resource for VHF to EHF satellite reception and monitoring
UHF-Satcom.com - the online place for VHF to EHF satcom monitoring uhf vhf shf ehf ku-band c-band p-band l-band s-band x-band
PY2BBS - Hamradio Page
Side Channel
SCA Lab
Tools
Analysis
NetSA Security Suite
Analysis Manifold
HiPPIE
NetworkMiner - Passive Sniffer & Packet Analysis Tool for Windows | Darknet - The Darkside
Goolag
Wepawet » Home
Anonymnity
https://bridges.torproject.org/
Tor: anonymity online
OnionCat – An IP-Transparent Tor Hidden Service Connector
TorCheck at Xenobite.eu - HTTP-Mode
XROXY.COM - more than just proxy
XROXY.COM - Site offers free access to the frequently updated database of open proxies via flexible user interface allowing selection of proxy properties like its type, port number, connection latency, etc.
Japanese Proxy Server
Feel free to browse the internet at school with YourProxy.com to unblock websites like Myspace, Bebo, Facebook, Friendster, hi5 and more! Designed by FreeProxyTemplates.com
PolySolve will help you with your math related needs with our powerful cgi applications
Captcha
captcha bypass captcha OCR Verification image bypass captcha decoder captcha reader
PWNtcha – caca labs
CAPTCHA bypass. Cheap and easy CAPTCHA solving
desc
CAPTCHA.ru
Open Source
TCPDUMP public repository
websnarf - HTTP Port Listener/Capture Daemon
raWPacket » HeX
packet-o-matic : the real time packet processor
Database
Top 15 free SQL Injection Scanners - Security-Hacks.com
Exploitation
The Metasploit Project
openssl-too-open
ShellForge
Injection
sqlninja - a SQL Server injection & takeover tool
squeeza
iKAT - Interactive Kiosk Attack Tool - paul <at> ha.cked.net
Durzosploit Introduction - Engineering For Fun
Main Page - Engineering For Fun
KON-BOOT - ULTIMATE WINDOWS/LINUX HACKING UTILITY :-)
a little bit of security
Fuzzing
Fuzzing Software Tools // iDefense Labs
AxMan ActiveX Fuzzer
Edge-Security - Wfuzz
IDS
libemu - shellcode detection
Packers
SecureReality
Remote
Poison Ivy RAT
reDuh - TCP Redirection over HTTP
HSC - Tools - Dns2tcp
Trace
Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources
tcptraceroute development
COTSE-Steganography Tools
CryoPID - A Process Freezer for Linux
ettercap
girardin online tools
HT Editor
Index of ftp://ftp.ee.lbl.gov/
Mercurial repositories index
Online malware scan
shimmer
Tools | iSEC Partners
Index of /code/skape
PktAnon - Packet trace anonymization
SecuriTeam™ - ArpON - ARP Management System
Category:Tools - Insurgency Wiki
VoIP
VoIP Hopper...Jumping from one VLAN to the next!
VOIPSA : Resources : VoIP Security Tools
UNIStimpy - esentire online security
TacVoIP: Hardcore VoIP Security
WarVOX: Introduction
Vulnerabilities
Luigi Auriemma
milw0rm - exploits : vulnerabilities : videos : papers : shellcode
National Vulnerability Database Home
NEOHAPSIS - Peace of Mind Through Integrity and Insight
OSVDB: The Open Source Vulnerability Database
TrustedSource - Home
URI Use and Abuse: An Unpatched Vulnerability in Web Browsers and Applications | Project Afterlight. Articles, News, Updates, and Reviews on Technology and Life.
Vulnerability and Virus Information - Secunia
VulnWatch: vulnerability disclosure list
Wabisabilabi
Vulnerabilities
Virtualization
SecuriTeam™ - Path Traversal Vulnerability in VMware&#39;s Shared Folders Implementation
OpenVAS - OpenVAS - Open Vulnerability Assessment System Community Site
War Games
The Happy Hacker -- Computers that you can legally break into!
Web
BrowserFry™
The Spanner - A tool for designers dealing with programmers dealing with designers...
PhishTank | Join the fight against phishing
ncache - Google Code
Brainspl.at
XSSed - XSS (cross-site scripting) information and vulnerable websites archive
TwitPwn
Wireless
Bluetooth
Bluetooth Penetration Testing Framework
Cell Phones
Cell phone jammer, SH066P Handheld mobile phone blocker
Free Nokia Unlock Code Generator by GSM Liberty
Nokiafree unlock phone codes calculator software
UnlockNokia.US: Nokia (GSM) Unlocking.
www.lur.nu - Free mobile content and unlocking. Get your java games and ringtones for free
Welcome to epocsoft
CSI Stick - Cell Phone Data Extraction
blog.iphone-dev.org
NeoPwn Mobile Pentesting - First Ever Network Auditing Distribution for a Mobile Phone Platform
HaRET - Handhelds.org MoinMoin Wiki
GSM
GSM-Forum
gsm - THC Wiki
GSM Interception
RFID
RFIDIOt.org - RFID IO tools
WiFi
KARMA Attacks Radioed Machines Automatically
KisMAC
Projects - fakeAP
rfakeap homepage
Softmac - Trac
kismacng – Trac
XTest:Readme
Main [Aircrack-ng]
Crack-wpa.fr Accueil, Votre portail wifi, réseaux et sécurité. Forum, tutoriels, Backtrack...
Bienvenue sur crack-wpa.fr, pour tout ce qui concerne le crack WEP et le crack WPA c'est ici que ça se passe.
Goatse at Defcon -- brought to you by airpwn
Wave Bubble

VoIP Watermarking Defenses

Wednesday, February 20, 2008

A couple of years ago (2005) the Rome Air Force Base sponsored research [1] into de-anonymizing VoIP traffic. The researchers developed a modification to the Linux Kernel which inserted a watermark into Skype VoIP traffic that is passed through a low-latency anonymizing network. A 24-bit watermark is inserted through the modulation of the inter-packet timing of data packets. This is essentially the establishment of a covert channel through a timing attack.

The attacker reads the probabilistically hidden bits in the traffic to reconstruct and identify of the originating and terminating nodes of a VoIP call. A defense against this would be to scrub your outgoing traffic to remove the covert channel or increase the probability of error in bit recovery beyond the acceptable rate. The attacker is not manipulating packets as they leave the origin, since then they would presumably already know the origin. The suggested implementation is to watermark packets as they transit through a VoIP gateway. Because of this it is necessary to scrub packets beyond the gateway; after they have been marked.

More interesting would be to alter the packet timing in a controlled manner and embed bits of your choosing. If you had enough knowledge as to how bit patterns are assigned to identities you could arbitrarily alter your identity and pose as another. You could also add incorrect watermarks to random VoIP traffic.

To detect a watermark you can exploit the embedding process. The technique relies on existing latency in the VoIP calls and is able to function with around 20ms - 30ms of latency by making a 3ms adjustment to packet arrival times. A suggestion is to make the latency as low as possible therefore making the existence of a watermark more detectable since the latency would need to be adjusted to unexpected levels. It may not be feasible to keep low latency for a long period of time but that would not necessarily be necessary. Latency could intermittently be pushed to the lowest possible levels and a check for embedded bits could be performed. The method uses the existing latency in the first minutes of the call to determine what an acceptable level of latency to add is. Exploiting this, the first minutes (or so) of the call could be made with high, but still believable, latency so the attacker embeds bits with the appropriate higher latency. Once a watermark has been embedded the latency could be significantly reduced and the alteration of packet timing should be noticeable.

Covert channels based on packet timing have many applications, beyond de-anonymization, and could be made very difficult to detect. Steganographic style embedding of traffic is a possibility as well as watermarking for authentication purposes by the originating and terminating parties.

[1] S. Chen, S. Jajodia, and X. Wang. Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet. In CCS '05. ACM, November 2005


Using Video as a Covert Channel

Tuesday, February 19, 2008

With steganography being all the rage these days why not up the ante and use video as a covert channel?  (I haven't looked around for this but I bet someone else is already doing it.)  With all the bandwidth, and the data already being put through some sort of transcoding, the opportunity to embed seems ripe.  I'm not sure how this would work, but let's assume the process is: (a) hardware camera, (b) software transcoding and compression of signal, (c) network traversal, (d) software transcoding and decompression of data, (e) video display.  We'll assume adding data before (b) and extracting data after (d) will not work due to loss from the transcoding.  To do live video stego insert a step between (b) and (c) to add data and between (c) and (d) to extract data.  The method would be rather detectable.  A better solution may be to drown yourself in transcoding and (de)compression code for a while and develop a stego (or stego capable) codec or a stego module for either a specific existing codec or any codec satisfying certain requirements.  (Do these exist already?)

Embedding of small amounts of data should be difficult to detect.  A simple (well, maybe) exercise would be to embed a chat in a video conference.  Binary files, VoIP, other video conferences, multimedia files, or any sort of network traffic are all nice things to be able to embed.

The hardest needle to find is the needle you're not looking for.

(Relatedly, it would be desirable to be able to determine if someone has found your covert channel.  How or if this could be done using lacking some sort of quantum crypto I'm not sure.  Use of an additional channel to influence the convert channel in ways known by the covert parties might work but not be provably correct.  The idea would be that when an ease dropper is present their would be some impediment to making the expected change in the channel, similar to quantum crypto.  Although, "some impediment" is pointlessly vague.)


Peter
Lubell-Doughtie

about
projects
archive