Infosec Blogs/Podcasts

NIP Tip – iOS Kid Mode

May 9, 2013
By
Christmas Toys iPhone

Someone on the twitters posted about this feature the other day and I just think it’s one of the coolest hacks to emulate a “guest” mode for iOS 6 devices. I can see this coming in very handy when your kids ask to use your iPhone or iPad and although you usually trust them,...
Read more »

Tags: , , , , , ,
Posted in Infosec Blogs/Podcasts | 6 Comments »

Free Tor Bridges Available in Amazon EC2

May 7, 2013
By
Tor Cloud

Bruce Schneier posted an interesting comment the other day pointing to an ArsTechnica article that emphasized the need for more Tor bridges to keep the anonymity service from being blocked. Supporters can create bridges manually using pluggable transports, the most common of which is obfs2. Due to detection issues the Tor Project created a...
Read more »

Tags: , , , , ,
Posted in Infosec Blogs/Podcasts | 6 Comments »

NIP Tip – DNS Zone Transfers

May 7, 2013
By
Zone Transfer

As part of reconnaissance Domain Name Service (DNS) servers can provide the bad guys with pertinent data to further their attack. One of the key methods for extracting this information are zone transfers. With just a few quick commands a DNS server will gladly cough up a sensitive list of sub-domains if it isn’t...
Read more »

Tags: , , , ,
Posted in Infosec Blogs/Podcasts | 2 Comments »

Cain & Abel Update Two Years in the Making

May 6, 2013
By
Cain & Abel

In it’s first update in over two years the creators of the free Windows-based Cain & Abel password cracking tool released version 4.9.44 yesterday. As you can see in the change list below most of the updates were to include Windows 8 support. You can download the latest version over on it’s project page....
Read more »

Tags: , , , , ,
Posted in Infosec Blogs/Podcasts | 2 Comments »

Starbucks Wifi Risk Infographic

May 5, 2013
By
Starbucks Coffee

I just love Starbucks (yep, I’m in one right now as I write this) as we’ve written about before so I just had to repost this infographic from ThreatMetrix. Thanks to Bill Brenner for bringing it to our attention. For ultimate security the basic takeaway is use your own wireless access, such as tethering...
Read more »

Tags: , , ,
Posted in Infosec Blogs/Podcasts | 2 Comments »

Free Crypto Tutorial by Peter Gutmann

May 1, 2013
By
Peter Gutmann Book

Here’s another great free resource we came across for those those looking to extend their knowledge in the security field. In this twelve part series the legendary Peter Gutmann, of the 35 pass wipe fame, covers all the basics of cryptography in 973 slides. Entire books could be written on each of the topics...
Read more »

Tags: , ,
Posted in Infosec Blogs/Podcasts | 2 Comments »

NSA … Hacking Adversaries Since 1997

April 30, 2013
By
NSA

For those history buffs out there the National Security Agency (NSA) has recently released a trove of declassified documents, many pertaining to their development of cyber offensive capabilities as early as 1997. Obviously, don’t expect to learn anything super-secret here but the 98 documents do provide some context of where they came from and...
Read more »

Tags: , , ,
Posted in Infosec Blogs/Podcasts | 5 Comments »

SATF – Security Awareness Training Framework

April 29, 2013
By
Security Awareness Training Framework

At the AIDE conference last week I had the chance to catch Bill “@oncee” Gardner’s talk on new Security Awareness Training Framework (SATF). Well … at least new to me. Started in late 2011 by K.C. “@k0nsp1racy” Yerrid, it’s goal is to create a free and open source framework that security practitioners can use...
Read more »

Tags: , , , ,
Posted in Infosec Blogs/Podcasts | 8 Comments »

REMnux on Hak5

April 25, 2013
By
Hak5

We came across this nice video of Shannon “@snubs” Morse giving a quick overview of Lenny Zeltzer’s recently updated REMnux distro. It starts around 1 minute in and lasts about 7 minutes. At around the 5 minute mark, Shannon covers Lenny’s excellent cheatsheet for those needing a quick reference or just getting started. Enjoy! #####...
Read more »

Tags: , ,
Posted in Infosec Blogs/Podcasts | 1 Comment »

REMnux Install Guide

April 21, 2013
By
REMnux

In our continued quest to become the ultimate REMnux fanbois we thought we’d point to a recent post by Lenny Zeltser that provides a basic overview of how to setup and install the popular malware analysis distro. The article covers using both the Open Virtualization Format (OVF) and VMware’s own proprietary format for most VMware...
Read more »

Tags: , , , ,
Posted in Infosec Blogs/Podcasts | 1 Comment »


About Us

Founded in 2008, NoVA Infosec is dedicated to the community of Metro DC-based security professionals and whitehat hackers involved in the government and other regulated verticals. Find out more on our About Us page.