Skip to main content

Posts

Showing posts from May 2, 2010

Sample Penetration Test Report

Thanks to offensive-security.com they have provided a penetration test report. In this report it contains the tools they used such as nmap, the white hats(Known as hackers), social engineering, and etc. Also, They include the current network configuration, the network drawing, and afterwords the reports discuss what steps were taken to improve the network infrastructure. File Name: offsec-sample-report.pdf Date Created: 05/04/2010 File Size: 1.36 MB Download Now

Netwars Competition

The NetWars game is a collection of computer and network security challenges. It is designed to represent real-world security issues: their flaws and their resolutions. Each player can follow an independent path based on individual problem solving skills, technical skills, aptitude, and creativity. The game is played in a fun but safe environment using the technology that drives our lives every day. The game starts when a player downloads and starts a CD-ROM image on a PC or in a virtual environment such as VMware Player. The image contains a brief tutorial and the game's full instructions. The player must find a hidden key within the image that is downloaded and then uses that key to enter an online environment where knowledge of security vulnerabilities and their exploits can be turned into points. Upcoming Competitions   June 18-20, 2010 PST September 17-19, 2010 November 5-7, 2010 December 17-19, 2010 April 29 - May 1, 2011 Click Here to read more

Internal Threat

In today's world, it is the internal employee and other internal threats that are the biggest security concerns for any organization. There are a lot of measures to ensure that one is well protected from the external threat but most companies do not concentrate that much on the internal threats. Follow the best practices for to mitigate internal risks. A few of my suggestions:   Have a well defined Internal Risk Assessment Program and Group.   Ensure that you empower this group with the powers to take corrective measures against errant employees and also that the top management toes the line too.   Conduct periodic internal risk audits. It would be better if these audits are sudden in nature.   Ensure that all documents and other sensitive data are adequately protected and access to the same is well documented and logged religiously.   No compromise/diversion from the existing policies defined whoever may be the person submitting a request.   If possible, install DLP

Detecting Computer Malware

In today’s world cybercriminals are putting forth every effort to make malware difficult to detect. Successfully, I might add. Ever confident, I thought I would have a go at providing information on how to make their job a little tougher. This requires you to know your system inside out which means what process are normal and which applications were installed by you. This is tricky and at the same time risky. Terminating a memory resident program that is critical to a system may cause some undesirable results, such as displaying the Blue Screen of Death or even triggering the system to restart. It is advisable to check if a specific memory-resident program is indeed alien to the system, which is not an easy task. You can either consult your operating system manual or search for that program in an Internet search engine. If the search returns no results or does not indicate a relation to any recent malware, it is best that you leave it alone Read More File Name: Detecting Computer Ma

Registry Hack for Microsoft Windows

When XP first appeared, there was a lot of conversation about the new interface, both good and bad. In spite of the initial complaints, most users stick with the default settings rather than reverting to the Classic interface found in previous Windows versions. File Name: Windows Reg.pdf File Size: 457KB Date Created: 05/03/2010 Download Now

Microsoft Windows Blue Screen of Death

I'm pretty sure anyone that had used a computer a computer have seen the blue screen of death which is a way for the computer saying a driver or hardware/software had a communication error and was unable to recover. Usually restarting the computer will fix the issue. It is also, a good idea to keep a log of when blue screen of death pop up. The deafult setting for blue screen of death is that computer is going to restart automatic everytime. Windows keeps a copy of the error message in the Event Viewer .  File Name: BSOD.pdf File Size: 643KB Date Created: 05/03/2010 Download Now