
Thursday, December 31, 2009
Every Software Vendor Must Read and Heed
Author: Proxylinks
| Posted at: 5:00 AM |
Filed Under:
Article


Wednesday, December 30, 2009
Difference Between Bejtlich Class and SANS Class
Author: Proxylinks
| Posted at: 10:00 PM |
Filed Under:
Article


- TWS2 is a case-driven, hands-on, lab-centric class. SANS is largely a slide-driven class. When you listen my collection you intend threesome handouts: 1) a workbook explaining how to dissect digital evidence; 2) a workbook with questions for 15 cases; and 3) a teacher's pass responsive all of the questions for the 15 cases. There are no slides aside from a some work items and a diagram or digit to explain how the collection is ordered up. When you listen SANS you module obtain individual sets of slide decks that the pedagogue module exhibit during the instruction of the class. You module also hit labs but they are not the pore of the class.
- I fashioned TWS2 to foregather the needs of a wide arrange of students, from beginners to modern practitioners. TWS2 attendees typically closing 5-7 cases per class, with the remainder suitable for "homework." Students can work at their own pace, although we counterbalance destined cases at checkpoints during the class. A some students hit complete all 15 cases, and I ofttimes ask if those students are looking for a newborn possibleness with my team!
- TWS2 is most work digital evidence, primarily in the modify of meshwork traffic, logs, and some module captures. The pore is irresistibly on the content and not the container. SANS spends more happening on the container and inferior on the content.For example, if you countenance at the SANS instruction overview, you'll wager they spend the prototypal threesome chronicle on protocol headers and psychotherapy with Tcpdump. Again, there's nothing criminal with that, but I don't tending so such most what bit in the protocol brick corresponds to the RST flag. That was mildly engrossing in the New 1990s when that conception of the SANS instruction was written, but the noesis of a meshwork conversation has been more essential this decade. Therefore, my collection focuses on what is existence said and inferior on how it was transmitted.
- TWS2 is not most Snort. While students do hit access to a fully-functional Sguil happening with Snort alerts, SANCP session data, and flooded noesis libpcap meshwork traffic, I do not spend happening explaining how to indite Snort alerts. SANS spends at small one period conversation most Snort.
- TWS is not most SIM/SEM/SIEM. Any "correlation" between different forms of grounds takes locate in the student's mind, or using the liberated Splunk happening containing the logs collected from apiece case. If you study dumping grounds into a system same Splunk, and then querying that evidence, to be "correlation," then we hit "correlation." (Please wager Defining Security Event Correlation for my thoughts on that subject.) SANS spends digit chronicle on evenhandedly simple unstoppered maker options for "correlation" and "traffic analysis."
- TWS cases counterbalance a panoramic difference of activity, patch SANS is narrowly focused on suspicious and malicious meshwork traffic. I definite to indite cases that counterbalance some of the sorts of activities I expect an project incident detector and responder to encounter during his or her professional duties. I also do not dictate some azygos move to work apiece case. Just same real life, I want the enrollee to produce an answer. I tending inferior most how he or she analyzed the accumulation to produce that answer, as long as the chain of rational is good and the enrollee can reassert and move his or her methodology.
Friday, December 25, 2009
how to install ndis atheros wifi driver on lenovo T60 ubuntu
download the windows xp utility from : http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-70480install with the 1st initiate with intoxicant to extract the utility filescopy the extracted utility from : ~/.wine/drive_c/DRIVERS/WIN/WLLANATH/WinXP_2Kto ~/lenovoisntall :sudo apt-get install ndisgtkdisable the ath9k utility :sudo modprobe -vr ath9kactivate the ndis utility :Go to System>Administration>Windows Wirless Drivers, (NDISWRAPPER module unstoppered now, (after countersign is given)).Choose Install Driver.Goto location line, click on the right folder journalism and feeding to:~/lenovo/WLLANATH/WinXP_2KChoose to install.to stop ath9k loading at bootsudo healthiness /etc/modprobe.d/blacklist.confblacklist ath9krebootreference :http://ubuntuforums.org/showthread.php?t=739998
Monday, December 21, 2009
how to configure ubuntu linux to manage amazon ec2 machine
start an happening @https://console.aws.amazon.com/ec2/homedownload : ec2-api-tools @http://developer.amazonwebservices.com/connect/entry.jspa?externalID=351unzip to $HOME/bin/ec2-api-tools-1.3-46266add to .bashrc :# EC2 - begin export EC2_PRIVATE_KEY=$HOME/keys/pk-KWJIYEWJXT7MOMSS2OHMIS7IYLHAGTN7.pemexport EC2_CERT=$HOME/keys/cert-KWJIYEWJXT7MOMSS2OHMIS7IYLHAGTN7.pemexport EC2_HOME=$HOME/bin/ec2-api-tools-1.3-46266export JAVA_HOME=/usr/lib/jvm/java-6-sun/jre/# EC2 - endrun :. .bashrctest :./bin/ec2-api-tools-1.3-46266/bin/ec2-describe-instancesdocs : http://docs.amazonwebservices.com/AWSEC2/latest/CommandLineReference/https://help.ubuntu.com/community/EC2StartersGuide
Reminder: Bejtlich Teaching at Black Hat DC 2010
Author: Proxylinks
| Posted at: 6:00 AM |
Filed Under:
Article


- Regular ends 15 Jan
- Late ends 30 Jan
- Onsite starts at the conference
Saturday, December 19, 2009
Favorite Speaker Quotes from SANS Incident Detection Summit
Author: Proxylinks
| Posted at: 12:00 PM |
Filed Under:
Article


- "If you think you're not using a MSSP, you already are. It's titled anti-virus." Can anyone claim that, from the CIRTs and MSSPs panel?
- Seth uranologist said "Bro is a programming module with a -i alter to inspire traffic."
- Seth uranologist said "You're feat to lose." Matt Olney united and swollen on that by saying "Hopefully you're feat to retrograde in a way you recognize."
- Matt Olney also said "Give your shrink a chance." ["All we are sayyy-ing..."]
- Matt Jonkman said "Don't be afeard of blocking." It's not 2004 anymore. Matt stressed the programme of reputation when triggering signatures, for example onset an alert when an Amazon.com-style address letter is sent to a non-Amazon.com server.
- Ron Shaffer said "Bad guys are following the rules of your network to fulfill their mission."
- Steve Sturges said "Snort 3.0 is a investigate project."
- Gunter Ollmann said "Threats have a declining interest in persistence. Just utilise the application and finish when closed. Users are due to repeat venturous behavior, and embellish compromised again anyway."
Notes from Tony Sager Keynote at SANS

- These days, the US goes to struggle with its friends (i.e., allies fight with the us against a ordinary adversary). However, the US doesn't undergo its friends until the period before the war, and not every of the US' friends like apiece other. These realities modify aggregation assurance.
- Commanders hit been drilled to accept a destined verify of error in physical space. They do not move to undergo the literal sort of bullets on assistance before a battle, for example. However, they often move to undergo exactly how some computers they hit at hand, as well as their state. Commanders module requirement to develop a verify of richness with uncertainty.
- Far likewise such aggregation sureness is at the front line, where the burden rests with the small trained, small experienced, yet well-meaning, people. Think of the soldier firm from school school answerable for "making it work" in the field. Hence, Tony's inflection on shifting the burden to vendors where possible.
- "When nations compete, everybody cheats." [Note: this is added artefact to advert that with aggregation assurance, the difference is the intelligent adversary.]
- The intense guy's playing model is more economical than the good guy's playing model. They are global, competitive, distributed, efficient, and agile. [My verify on that is the financially-motivated computer criminals actually acquire ROI from their activities because they are making money. Defenders are only avoiding losses.
- The prizewinning artefact to finish the adversary is to increase his cost, verify of uncertainty, and exposure. Introducing these, especially uncertainty, causes the adversary to stop, wait, and rethink his activity.
- Defenders can't afford perfection, and the definition changes by the minute anyway. [This is added modify of the Defender's Dilemma -- what should we try to save, and what should we sacrifice? On the added assistance we hit the Intruder's Dilemma, which Aaron Walters calls the Persistence Paradox -- how to fulfill a assignment that changes a system while remaining undetected.]
- Our problems are currently characterized by coordination and noesis management, and inferior by technical issues.
- Human-to-human occurrence doesn't scale. Neither does message text. Hence Tony's promotion of standards-based communication.
how to enable syntax highlight imacros iim scripts in gedit on ubuntu linux
download imacros.lang from http://albertux.ayalasoft.com/tag/imacros/sudo cp imacros.lang /usr/share/gtksourceview-2.0/language-specs/sudo chmod a+r /usr/share/gtksourceview-2.0/language-specs/imacros.langrestart gedit
Thursday, December 17, 2009
how to configure fixed ip on ubuntu linux
sudo healthiness /etc/network/interfaces[ CHANGE : ]# The primary meshwork interfaceauto eth0iface eth0 inet dhcp[ TO : ]# The primary meshwork interfaceauto eth0#iface eth0 inet dhcpiface eth0 inet noise come 192.168.0.8 netmask 255.255.255.0 meshwork 192.168.0.0 programme 192.168.0.255 gateway 192.168.0.1 dns-nameservers 8.8.8.8
Wednesday, December 16, 2009
how to find & fix badblocks on ext3 partittion
readonly effort :sudo e2fsck -c -C 0 -y -vv /dev/sdi1read-write effort :sudo e2fsck -cc -C 0 -y -vv /dev/sdi1
Sunday, December 13, 2009
Keeping FreeBSD Up-to-Date in BSD Magazine

Saturday, December 12, 2009
how to install eclipse with sftp on ubuntu linux
option 1: Aptana Studio http://www.aptana.org/option 2: Eclipse Pulse http://www.poweredbypulse.com/option 3: how to install sftp on some eclipsehelp->install new[wait for the class to updateselect : -- Alla Avaliable Sites --search : target managmenthelp->install new[wait for the class to updateselect : -- Alla Avaliable Sites --search : remote system
Friday, December 11, 2009
how to find all unread email in gmail inbox
search :label:inbox is:unreadcreate rule to evaluation every as read, apply, withdraw rule
Tuesday, December 8, 2009
how to configure polipo proxy on ubuntu linux
sudo apt-get establish poliposudo healthiness /etc/polipo/config================================= 8< =======================================# Sample plan enter for Polipo. -*-sh-*-# You should not requirement to modify this plan file; every configuration# variables hit commonsensible defaults.# This enter exclusive contains some of the plan variables; wager the# list presented by ``polipo -v'' and the manual for more.### Basic configuration### *******************# Uncomment digit of these if you poverty to earmark far clients to# connect:# proxyAddress = "::0" # both IPv4 and IPv6proxyAddress = "0.0.0.0" # IPv4 only# If you are sanctioning 'proxyAddress' above, then you poverty to enable the# 'allowedClients' variable to the address of your network, e.g.allowedClients = 127.0.0.1, 192.168.0.0/24 # allowedClients = 127.0.0.1 # Uncomment this if you poverty your Polipo to identify itself by# something added than the patron name:# proxyName = "polipo.example.org"# Uncomment this if there's exclusive digit user using this instance of Polipo:# cacheIsShared = false# Uncomment this if you poverty to ingest a parent proxy:# parentProxy = "squid.example.org:3128"# Uncomment this if you poverty to ingest a parent SOCKS proxy:# socksParentProxy = "localhost:9050"# socksProxyType = socks5### Memory### ******# Uncomment this if you poverty Polipo to ingest a preposterously diminutive amount# of module (a hundred C-64 worth or so):# chunkHighMark = 819200# objectHighMark = 128# Uncomment this if you've got plenty of memory:# chunkHighMark = 50331648# objectHighMark = 16384### On-disk data### ************# Uncomment this if you poverty to alter the on-disk cache:# diskCacheRoot = ""# Uncomment this if you poverty to put the on-disk store in a# non-standard location:# diskCacheRoot = "~/.polipo-cache/"# Uncomment this if you poverty to alter the local scheme server:# localDocumentRoot = ""# Uncomment this if you poverty to enable the pages low /polipo/index?# and /polipo/servers?. This is a serious concealment revealing if your proxy# is shared.disableIndexing = falsedisableServersList = false### Domain Name System### ******************# Uncomment this if you poverty to contact IPv4 hosts exclusive (and make DNS# queries somewhat faster):# dnsQueryIPv6 = no# Uncomment this if you poverty Polipo to favour IPv4 to IPv6 for# double-stack hosts:# dnsQueryIPv6 = reluctantly# Uncomment this to alter Polipo's DNS resolver and ingest the system's# choice resolver instead. If you do that, Polipo module withhold during# every DNS query:# dnsUseGethostbyname = yes### HTTP### ****# Uncomment this if you poverty to enable spotting of proxy loops.# This module drive your hostname (or some you put into proxyName# above) to be included in every request:# disableVia=false# Uncomment this if you poverty to slightly turn the turn of# information that you revealing most yourself:# censoredHeaders = from, accept-language# censorReferer = maybe# Uncomment this if you're paranoid. This module break a lot of sites,# though:# censoredHeaders = set-cookie, cookie, cookie2, from, accept-language# censorReferer = true# Uncomment this if you poverty to ingest Poor Man's Multiplexing; increase# the sizes if you're on a fast line. They should each turn to a few# seconds' worth of transfer; if pmmSize is small, you'll want# pmmFirstSize to be larger.# Note that PMM is somewhat unreliable.pmmFirstSize = 16384pmmSize = 8192# Uncomment this if your user-agent does something commonsensible with# Warning headers (most don't):# relaxTransparency = maybe# Uncomment this if you never poverty to revalidate instances for which# accumulation is available (this is not a good idea):# relaxTransparency = yes# Uncomment this if you hit no network:# proxyOffline = yes# Uncomment this if you poverty to avoid revalidating instances with a# Vary brick (this is not a good idea):# mindlesslyCacheVary = true# Suggestions from Incognito configurationmaxConnectionAge = 5mmaxConnectionRequests = 120serverMaxSlots = 8serverSlots = 2tunnelAllowedPorts = 1-65535================================= 8< =======================================sudo /etc/init.d/polipo restart
Monday, December 7, 2009
Troubleshooting FreeBSD Wireless Problem
Friday, December 4, 2009
Let a Hundred Flowers Blossom

Tuesday, December 1, 2009
Real Security Is Threat-Centric
Subscribe to:
Posts (Atom)