All Stories

SSH Proxy

This article was inspired by RSnake’s article on using Trillian behind firewalls, but takes it a few steps further to let you proxy any application that supports proxying.

In Dec 11, 2011

Cool Hacker Magazines

In my ongoing effort to learn more and stay informed about everything in the security industry, I have come across a few security focused magazines to assist me with that ideal. Over ...

In Nov 05, 2011

Remote Firefox Vulnerabilities

Brian Krebs at the Washington Post had a story about a post by Chris Soghoian who found that you can use a MITM attack to overwrite addons in Firefox. Actually, believe it or not, I w...

In Sep 09, 2011

How to Get Rid of MacDefender

A recent phishing scam has targeted Mac users by redirecting them from legitimate websites to fake websites which tell them that their computer is infected with a virus. The user is t...

In May 01, 2011

The Effect of Snakeoil Security

I’ve talked about this a few times over the years during various presentations but I wanted to document it here as well. It’s a concept that I’ve been wrestling with for 7+ years and ...

In Apr 20, 2011

Changing Email Addresses For Spam

While looking back at some of my old speeches, and after writing the last blog post it occurred to me there is another attack I haven’t heard anyone talk about. Often times spammers w...

In Apr 05, 2011

Hiding Services from NMAP Using Non-Standard Ports

Most system administrators know that using non-standard ports for some services can be a useful way to hide ports from both automated attacks and less determined attackers. In additio...

In Feb 01, 2011


DNS Rebinding in Java

Stefano Di Paola has an interesting article about DNS Rebinding in Java. Apparently he’s found a way to bring back some of the older exploits that were supposedly fixed in Java back i...

In Feb 10, 2010


Bypass Geo-Blocking With PureVPN. Best VPN