General Network Security

A Logo

Feel free to include my content in your page via my
RSS feed Follow @irongeek_adc Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


(追記) (追記ここまで)



General Network Security

General Network Security

While my video tutorials seem to get the most attention, I also have many written articles that may help you understand various InfoSec topics. As I write new articles they will be placed on this page for easy location.

Articles

Unicode Security Notes Page (Posted 09/18/2013)
Security and Software Defined Networking: Practical Possibilities and Potential Pitfalls
This is a short paper I wrote for class involving SDN (OpenFlow specifically) and it's potential ramifications in the infosec world. (Posted 12/16/2012)
Raspberry Pi Recipes
On this page I'll be posting little security ideas for the Raspberry Pi. (Posted 06/28/2012)
Running an I2P Svartkast on the Raspberry Pi: Even more cheap hardware to leave on someone else's network
This is sort of a sequel to a previous article I wrote titled "Running an I2P Svartkast on the Raspberry Pi: Even more cheap hardware to leave on someone else's network". In that article I answer the obvious question of what the hell a Svartkast is, as well as show how to make one out of a Raspberry Pi. (Posted 06/21/2012)
Out of Character: Use of Punycode and Homoglyph Attacks to Obfuscate URLs for Phishing
This is the paper I was working on in last semester's class. Hope it is helpful. (Posted 06/07/2012)
I2P/Tor Workshop Notes (Posted 08/02/2011)
Links for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking
A general collection of resources that can help you profile someone before a pentest. If you have more high quality, low noise resources, please contact me. I'd eventually like to add some of the links to the Pentest Standard. (Posted 04/28/2011)
Crude, Inconsistent Threat: Understanding Anonymous
Just a little something to help explain Anonymous to the media and other organizations. I'm working on a presentation for the Central Ohio Infosec Summit. (Posted 03/28/2011)
Economics of Information Security Paper Reviews and Notes
These are my write-ups and notes for the papers I've been reading in the "Economics of Information Security" class I'm enrolled in. I'm guessing most of my readers won't get much out of them unless they have read, or plan to read, the same papers. (Posted 03/02/2011)
Plug and Prey: Malicious USB Devices
A little paper I wrote for my masters in security informatics, and presented at Shmoocon 2011. (Posted 01/27/2011)
Privacy Papers Write-up (Posted 12/25/2010)
Dirty Diffie-Hellman Calculator (Like dirty Santa, but geekier)
A little Christmas game I came up with for my local ISSA's holiday get together. It illustrates how the Diffie-Hellman key exchange works, and has a calculator to help with the math. (Posted 12/02/2010)
Network King of the Hill Write-ups
I thought this might be of interest to those of you who like hacker war games, and want to put on their own event. This contest happened at the Louisville Infosec 2010. Martin from Question-Defense and I are polishing it up and plan to run the same sort of NetKotH event at Hack3rcon. (Posted 10/10/2010)
Identifying the true IP/Network identity of I2P service hosts
This is my project proposal for the "Advanced Topics in Privacy" class I'm in. Please share with me your thoughts and ideas. Or at the very least, try out I2P and see how you can use it alongside Tor. (Posted 10/08/2010)
How to Change Your MAC Address (MAC Spoofing) in Linux and Windows Update (Posted 12/27/2006)
The Joys of Skiddy Baiting (Posted 08/27/2006)
Hacker Con Wi-Fi Hijinx Pamphlet (Posted 05/11/2006)
IPIterator: The IP Iterator. (Posted 03/25/2006)
Tony's Ethernet Tap (Posted 02/18/2006)
Caffeinated Computer Crackers:
Coffee and Confidential Computer Communications (Posted 02/15/2006)
Counter WMF Exploit with the WMF Exploit
I used H D Moore's "Windows XP/2003/Vista Metafile Escape() SetAbortProc Code Execution" revision 1.12 Metasploit module to create a WMF file that automatically runs "regsvr32 -u shimgvw.dll" to counter the exploit. Clicking the link may run code on your computer or crash your browser if you are using IE so click with caution. More of a fun experiment than anything. (Posted 01/03/2006)
Keymail the KeyLogger:An E-mailing Key Logger for Windows with C Source. (Posted 12/20/2005)
Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins) (Posted 9/11/2005)
Wigle-to-Google-Earth Script (Posted 7/26/2005)
Fun with Ettercap Filters (Posted 6/13/2005)
PacketFountain: Network Sniffing Screensaver (Posted 5/03/2005)
Auditor security collection boot CD notes (compiled by Douglas Lancaster ) (Posted 3/25/2005)
A Quick Intro to Sniffers (Posted 2/01/2005)
Irongeek's Signature Image (Posted 9/16/2004)
What can you find out from an IP? (Updated 9/03/2004)
Basics of Arpspoofing/Arppoisoning Update (Posted 8/09/2004)
Linux and Logs, a quick primer by my buddy Isaac (Posted 4/8/2004)
Pocket PC SSH Client (Posted 4/6/2004)
How to Change Your MAC Address in Linux and Windows (Posted 3/23/2004)
Irongeek's JetDirect Hack Program (Posted 3/14/2004)
HP Printer Display Hack (Posted 3/12/2004)
ADSReaper for collecting info about Windows boxes using WMI and ADS (Posted 3/10/2004)
DeWormer 0.5 Installer DeWormer is a package that tries to alert an attacking host that they may have a worm on their machine. It does this in two ways, by trying it e-mail the root user and by sending a win popup message to the box. It also logs activity to a web page. Real Old

Hacking Illustrated

The Hacking Illustrated videos can now be found on their own page here:

http://www.irongeek.com/i.php?page=security/hackingillustrated

(追記) (追記ここまで)

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast

AltStyle によって変換されたページ (->オリジナル) /