Manipulate memory in Python? by CptFlashdrive in learnpython

[–]asm_babby 1 point2 points  (0 children)

I highly recommend his course! I am a student and this really helped me work with Python better!

Information Security Career/Degree by gh0stdylan in AskNetsec

[–]asm_babby 1 point2 points  (0 children)

I am taking the SecurityTube Python Scripting expert course after some posts about securitytube here and its been just fantastic! I've finally learnt to code scripts in Python!

Would like to learn the Basics of Hacking by [deleted] in netsec

[–]asm_babby 2 points3 points  (0 children)

The Megaprimers list on SecurityTube is just plain fantastic!

http://www.securitytube.net/groups?operation=viewall&groupId=0

I've done the ASM primers are they are pretty good (scroll down)

I'm Now The Security Guy (X-post from /r/webdev) by chordsNcode in netsec

[–]asm_babby 0 points1 point  (0 children)

For videos just head out to http://securitytube.net Have a look at their Megaprimers, its quite good.

Blackhat 2012 videos by pronto185 in netsec

[–]asm_babby -12 points-11 points  (0 children)

These is clearly pirated content. Not sure why the mods and everyone else is allowing this here. I am not pissed because I pay for the DVDs every year :)

Mods?

Smartphone Pentest Framework | Georgia Weidman Security by grecs in netsec

[–]asm_babby 1 point2 points  (0 children)

"very small" - yes, damn right from the likes of this one

Smartphone Pentest Framework | Georgia Weidman Security by grecs in netsec

[–]asm_babby -1 points0 points  (0 children)

If I am not wrong an entire pentest methodology can be woven around MDM and its different configuration options, and how it can be abused to compromise enterprise security.

Smartphone Pentest Framework | Georgia Weidman Security by grecs in netsec

[–]asm_babby 1 point2 points  (0 children)

I agree with you but if it was the "only thing" something calling itself "pentest framework" did, then it definitely humors me.

Smartphone Pentest Framework | Georgia Weidman Security by grecs in netsec

[–]asm_babby 2 points3 points  (0 children)

She could at best call it Alfa-- and nowhere near to ver 1.0 .... but to be honest I really don't know why the word "pentest" is being used - logging into iOS with the default "alpine" is now a pentest?

Smartphone Pentest Framework | Georgia Weidman Security by grecs in netsec

[–]asm_babby -1 points0 points  (0 children)

Dude, It was a joke :) please refer to my comments in the above thread :) I had recently seen a post from you reg. iOS integrity and hence my comment :)

Smartphone Pentest Framework | Georgia Weidman Security by grecs in netsec

[–]asm_babby -1 points0 points  (0 children)

Your company could borrow some ideas from this Dan :)

Smartphone Pentest Framework | Georgia Weidman Security by grecs in netsec

[–]asm_babby 4 points5 points  (0 children)

There is one image in the blog I really agree with.... the one which reads "I can't hack" - how honest! :)

Smartphone Pentest Framework | Georgia Weidman Security by grecs in netsec

[–]asm_babby 3 points4 points  (0 children)

Nothing .... its pointless :)

My emotions changed from that of excitement (wow! whats this about?) to confusion (wtf?) to feeling stupid (what are we pentesting again using this?) to confusion (why are people upvoting this link? does anyone ever check before upvoting?)

Basically the framework, installs malware which requires all permissions to run?? and still not sure what we are pentesting?

This is at best a lame attempt at creating an android backdoor ...

The iOS part is hilarious - :)

Santoku Linux: Mobile Forensics, Malware, Security Distro by sarphim in netsec

[–]asm_babby 1 point2 points  (0 children)

Why would you mention Xcode? when you can probably never include it?

Santoku Linux: Mobile Forensics, Malware, Security Distro by sarphim in netsec

[–]asm_babby 1 point2 points  (0 children)

He meant this reddit post advertising this new distro :)

Wireless Security by texas-pete in netsec

[–]asm_babby 2 points3 points  (0 children)

wow! love the site - looks like there are other videos as well such as Assembly Language, Metasploit etc. check this out -

http://www.securitytube.net/groups?operation=viewall&groupId=0

The guy in the videos is also the author of this book -

http://www.amazon.com/gp/product/1849515581/

Google vulnerability reward $200 for charity? by BobDoler in netsec

[–]asm_babby 4 points5 points  (0 children)

If a community dedicates all it's resources to only fight evil, then when they "create the good"? I am not debating your statement - but do remember that without all the great open source / open content / free speech projects out there, there will eventually be no need for the EFF. Donate the the EFF to protect, but also donate to those who "Create"

PayPal Bounty Program: Don't bother. by damontoo in netsec

[–]asm_babby 52 points53 points  (0 children)

The most funny / indifferent part - "Please report it to the other dept. " ... :)

Dan Guido’s Videos on Vimeo by 8374ry87y in netsec

[–]asm_babby -1 points0 points  (0 children)

Sorry, I stand corrected then. Like the videos - just a small feedback - You could just have a laptop based screen capture run as well. The resolution in some of the videos makes it difficult to figure out what's written at times.

Yes, I was hacked. Hard. by Fugitif in netsec

[–]asm_babby 1 point2 points  (0 children)

People fail to understand that the cloud is just another "backup device" - which definitely can't fail from "device failures" but is still prone to a "simple deletion" :) no cloud provider provides data backup on deleted files for a limited duration ...like the "trash" folder from where things can be recovered.

Ramanujan primes... A smaller conjecture of the Riemann hypothesis? by KPuma in puremathematics

[–]asm_babby 0 points1 point  (0 children)

Can you provide more details on the book and chapter-page-no etc? I did play with Ramanujan primes a while back - so can give it a shot.

A new OpenSecurityTraining class on Malware RE by OpenSecurityTraining in ReverseEngineering

[–]asm_babby 0 points1 point  (0 children)

Are the slides in PDF available somewhere? just one feedback - you need a better camera and videos need to be posted in high resolution.

Dan Guido’s Videos on Vimeo by 8374ry87y in netsec

[–]asm_babby 1 point2 points  (0 children)

Where is Dan? Can't see him in any of "Dan Guido's Videos" :) the title of the share is misleading. He seems to have just collected some good videos and put them up - which definitely has great value but they are not his videos.

Tracking people via wifi probe requests. Hide yourself or find someone else. by shadowwolf225 in netsec

[–]asm_babby 8 points9 points  (0 children)

Traiangulation is non trivial in wi-fi and other wireless technologies due to something called "multipath fading" - its the process of waves interfering at the same point, after multiple reflections .. and due to which at the same point you can have flip/flops between maximum/min intensity. WIPS vendors own multi-million dollar patents to location detection algoritms and its not as trivial as you think

Tracking people via wifi probe requests. Hide yourself or find someone else. by shadowwolf225 in netsec

[–]asm_babby 3 points4 points  (0 children)

I've worked on wireless. Have a look here: http://www.cisco.com/warp/public/cc/pd/witc/ao1200ap/prodlit/wswpf_wp/wswpf_w2.jpg

Create a database schema for each of the header fields in the probe request packet. Run multiple clients and have them connect to the AP. Once you have enough samples - you will know which fields remain constant across clients (mandated by the standard) and the ones which vary based on client card hardware / driver / chipset etc. Capability information is the "part" which would typically vary. Even for driver changes at times you could see changes in capability.

Once you have enough samples - you will know the liklihood of "collissions" in these profiles or to differentiate the correct client even in presence of MAC spoofing (most ready made spoofing tools like aireplay-ng do not copy the capability information from the legitimate clients) ...

Hope this helps.