This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Topics - Axon
« on: February 22, 2014, 11:26:01 pm »
CrunchPwn is a penetration testing repository/addition for CrunchBang Linux, it can be installed on top of existing environment or downloaded as an ISO.
Just another Pentest distro. Just how many of them out there
« on: February 22, 2014, 07:57:17 pm »
Here is a list of security tools that have been collected from the internet. These tools are specifically aimed toward security professionals and enthusiasts/hobbyists for testing and demonstrating security weaknesses.http://gexos.github.io/Hacking-Tools-Repository/
« on: February 17, 2014, 06:56:20 pm »
So it turns out that Cyanogemod’s built in updater gets it’s update information by contacting http://download.cyanogemod.org/api
Note the http:// part there. It also turns out there’s no signature verification of the flashable .zip file that the custom recovery uses to update. What this means is that anyone who can MITM your connection (Which means the NSA to anyone who can manipulate the BGP routing table all the way down to anyone who can own your router/has access to your local LAN/WLAN) can change where the cyanogenmod update looks for the image file that CM will flash.https://kyhwana.org/blog/2014/02/17/cyanogenmods-updater-vulnerable-to-mitm-attack/
« on: February 06, 2014, 11:22:00 pm »
This is DARPA Open Catalog, which contains a curated list of DARPA-sponsored software and peer-reviewed publications. The DARPA Open Catalog organizes publically releasable material from DARPA programs.http://www.darpa.mil/OpenCatalog/index.html
« on: January 31, 2014, 07:33:48 pm »
The android IMSI catcher detector is an android based project to detect and (hopefully one day) avoid fake base stations (IMSI-Catchers) in GSM/UMTS Networks.
With IMSI-Catchers being exponentially popular lately, and with an explosion of various "bastards" with governments and criminals all the same, using it. Anyone can now buy an IMSI-Catcher (or build a cheap one on his own). In addition they can all crack the A5.1-3 encryption on the fly!.https://github.com/SecUpwN/Android-IMSI-Catcher-Detector
Project size is around 85mb, it contains papers and ebooks about GSM protocols and related subjects, some papers are in German.
« on: January 30, 2014, 05:51:22 pm »
wifijammer is a python tool used to continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards seem to effectively jam within about a block's range with heavy access point saturationhttps://github.com/DanMcInerney/wifijammer
« on: January 29, 2014, 01:15:16 pm »
The GSM Security Map website compares the protection capabilities of mobile networks from different countries worldwide. Networks are rated in their protection capabilities relative to a reference network that implements all protection measures that have been seen “in the wild”.
« on: January 25, 2014, 06:16:21 pm »
Does anyone know any software (preferably open source) for numbers pattern recognition? I'm looking for a software where the user inputs a set of numbers, then the software will do a pattern recognition, after that the software will generate numbers based on the patterns.
« on: January 23, 2014, 05:13:06 pm »
Publication Date: December 18, 2013
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained.
• Provides detailed explanations of the complete penetration testing lifecycle
• Complete linkage of the Kali information, resources and distribution downloads
• Hands-on exercises reinforce topics
« on: January 22, 2014, 09:18:00 pm »