Ladders.com spam pissed me off today.

Good Monday morning, Russell,

“I can’t believe you wrote that in an email.”

It’s bad enough when your friend or colleague tells you that.

But what happens when your email is tweeted, passed around online, and ridiculed by some of the nastier people you’ve never met?

Perhaps you wrote something a little unkind, or impolitic, or snide. Or, worse yet, you wrote something that reveals that you need to review your moral bearings in the world — it was harmful, crass, prejudiced or offensive.

Your mother might have told you “don’t put anything in writing that you wouldn’t want to see on the front page of the New York Times.”

In today’s social media world, you should assume that everything you write in email, post on Facebook, or tweet, will eventually end up on the screen of the person in the whole world who you would like to see it least.

Because whoever is the most embarrassing person in the world to see what you just wrote, is online too.

And they’re going to see it. As will all your future employers, customers, colleagues, and friends.

So for the New Year, make a new promise to yourself, to never ever ever ever ever ever ever ever ever send embarrassing emails

Marc Cenedella

My response:

Who cares what people say or think on the Internet? An employer that scans that kind of crap and nitpicks a person to death like the thought police is a huge red flag for someone whom I don’t want anything to do with let alone work for.  It’s the Internet. People say stupid shit all day, every day. Their opinions, outlook, mood, viewpoints and situations can change by the second. Anyone that doesn’t understand that should take a hard look in the mirror because they are too uptight and everyone makes mistakes. Especially them. The only difference between mistakes that are published online and the idiotic things that people do when they think no one is watching, is that someone was watching. How many idiotic things do you do every day that someone could criticize you for? How would you feel if you got outed for it?

TCPView is cool.

So, I may have got owned by something I dunno. I started seeing some installation requests for suspicious packages as part of an update. It looked a lot like this: Mutex, mAH, Process Ironically they were packaged in with an update for Comodo Firewall. At least on my side they were. I’m not sure that was a legitimate update I just did lol.

That got me looking at netstat to check if there were any obvious connections going out. A little digging later I tripped over an application for Windows called TCPView which tables out all your current TCP and UDP connections, shows the application that is running as well as the process ID.  If someone were to get a meterpreter session the first thing they would try to do is to migrate it to lsass or svchost or another Windows process deep within the kernel. TCPView easily maps which processes have connections going on and which port they are on as well as where they are outbound to. Right click and you can do a whois. It even works on ipv6. With this tool a migrated meterpreter session would stand out like a sore thumb and that’s why this is a nice visual aid.

Get TCPView here: TCPView

There is also a viewer which allows you to look at exactly what is being driven by svchost.exe This is handy because there are always many instances of this in task manager.
SVCHost.exe Viewer

Another handy tool built right into Windows is the Event Viewer which will show you any error messages that have been logged today on your system. Application crashes etc.

 

 

USB to IDE/SATA Adapter.

Image and video hosting by TinyPic

In two different instances I’ve had a couple people ask me if I could migrate their files off of crashed computers onto their new machines just in the last month. This has always been one of those pain in the ass jobs that friends and family give to anyone whom they think has computer skills. That makes me a prime target. (Little do they know)

I picked up this USB to IDE/SATA adapter (or rather IDE/SATA to USB adapter is probably the proper way of describing it.) It comes with an AC adapter so you don’t have to worry about power and you just plug the hard drive into the one end and the USB adapter into your computer and it acts like a USB thumb drive except it’s not. It’s a hard drive plugged in there. (holy carp! lol) Actually it supports laptop drives and CD/DVD devices as well.

Pretty cool and definitely a handy tool to have kicking around.

Leadership From Within

Image and video hosting by TinyPic

So I picked up this book on the weekend while I was at the library picking out books for my son. It was for sale and I got it for $0.25.  The title is Leadership from Within by Peter Urs Bender. I didn’t realized the author had signed it until I got home.

I started reading it yesterday and it’s a bit like medicine.
Here are a few really good morsels that I’ve read through so far and I’m only on chapter 2.

“Leadership is the art of getting people to do what they don’t want to do and have them enjoy the experience.” Major General Lewis Mackenzie US Peacekeeping Forces Sarajevo.

Everyone has a different perspective on what leadership is.
I believe the best leaders demonstrate five key attributes. They:

– Raise Awareness
– Show Direction
– Create Results
– Demonstrate to others how to reach a goal
– Achieve progress that benefits others, not just themselves

Many people see leadership as “leading someone else.” However I believe it begins with leading ourselves.

Defined in this way, leadership is first and foremost an “inside job”. We have to be able to lead ourselves before we can lead others. Like an inventor, we must have both the vision of a new product and the ability to create it. Like an explorer, we need to know there is a “new land” and show others how to get there. Like a coach, we have to identify talents in people around us and work with them to create outstanding results for the team. Or, like a top quality manager, we have to draw on the best within us before we can do so with our people.

This inner leadership, what I call “leadership from within,” is very different from telling others what to do or the “do as I say, not as I do” approach that many of us have been taught.

“Everyone thinks of changing the world, but no one thinks of changing himself.”
Leo Tolstoy

Leadership is about being the leader of you.
Find your own vision, put it into action, and you will automatically become the leader of others.

Vision is important. But it is not enough. True leadership is the ability to turn vision into results. But I am going to give you one caution. Whatever “It” is, do not do it at any cost. Do it so you “win” and others do too. Do it with caring and respect. Do it with integrity. Fulfillment comes from having both your needs and your values satisfied. One without the other will leave you feeling incomplete.

Leadership is about reducing fear, and increasing hope.

In times of change, people are uncertain about their future. With this comes fear – of losing their jobs, economic security, company, social benefits, status, friendships, and other aspects of life they have come to value and depend upon. This fear saps motivation, reduces trust, and increases resistance.

If you need to lead people through significant change, even times of hardship, find a way to increase their hope. Inspire and demonstrate that you care about them. Improve the tangible bottom line and people’s sense of confidence. How you implement change is as important as the results you create.

The Leader From Within:
– Walks the talk
– Leads with trust and by example
– Sees shared interests
– Shares power; empowers others
– Encourages personal initiative
– Invites ideas and feedback
– Sets reasonable deadlines
– Is internally motivated (by values and principles)
– Seeks satisfaction, well-being
– Sees caring/feelings as essential

The Leader From Without:
– Says one thing does another
– Leads through fear and control
– Sees separate interests
– Tries to hold on to power
– Wants to do things his/her way
– Tells others what to do
– Sets unrealistic deadlines
– Is externally motivated by money, power, fame
– Is driven by fear and pressure
– Disregards / puts down others feelings

It goes on and on like this. Paragraph after paragraph , page after page of inspirational vindication. I love it. What an awesome book!!

How I Study.

I wonder if I study in a way that is similar to others. I  dunno but I go in circles.  I learn a bunch about a topic, I get the overview. The next step is actually physically doing it.  There could be months between the overview and the action. I have to fully understand the theory. Once I have that down, I go on to trying things out. I run into snags. If I get super stuck, I change the topic entirely. Learn something completely different or revisit an earlier topic where I was previously stuck. Eventually, I circle back. Something clicks. I make a breakthrough then it just keeps going around and around. I also go off in different directions throughout this process either because I find I have to know about another topic in order to understand the one that I’m working on, or because something gets my attention. I just keep circling around it like a shark in a tornado. It’s only when I look back at the starting point that I realize how much ground I’ve actually covered. The more I learn, the more I need to learn.

A journey through Bookmarks and Links.

A journey through Bookmarks and Links. A.K.A It’s Always Windy On Garbage Day.

I make a habit of bookmarking everything that I find cool, whether it’s a code bit or a tactic or a tutorial on something. When I go back and look at everything I’ve read it’s like a road map to how I got to where I am now and where I’m going. There is some gold in here if you take the time…

SecurityFocus
SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet’s largest and most comprehensive database of computer security knowledge and resources to the public. It also hosts the BUGTRAQ mailing list.
How To Remove Passwords Using Offline NT Password & Registry Editor
A complete tutorial, with screenshots, on how to use Offline NT Password & Registry Editor to remove or delete a Windows password.
InfoSec News
Offline NT Password & Registry Editor Review
Offline NT Password & Registry Editor is a Windows password reset/remover tool that works nearly 100% of the time. See my complete review of ONTP&RE.
Cracking linux password with john the ripper – tutorial
This simple tutorial shows you how to use john the ripper to carry out dictionary based brute force attacks and crack passwords.
Offline Windows pw & reg-editor, bootdisk
▶ Cracking WPA & WPA2 with Aircrack-ng – YouTube
Tutorial 7 – This exercise will demonstrate how to use a dictionary attack to crack WPA and WPA2 wireless security. It will show how to use airodump to captu…
Cão Fila de São Miguel | Dogs and Puppies
Exploit Windows XP SP3 Using Metasploit (msfconsole) | Information Security Berserker
PuppyLinux: How to configure wifi from the commandline
Puppy Linux Documentation Wiki – it is a Wikka
wireless – How do I connect to a WPA wifi network using the command line? – Ask Ubuntu
802.11 frames : A starter guide to learn wireless sniffer traces | Getting Started with Wireless | Cisco Support Community | 5956 | 52391
Engage, collaborate, co-create, and share with your fellow experts on any Cisco technology or solutions in technical support forums in six different languages. Participate in live expert events and join the ongoing technical support forum in our communities.
802.11 Sniffer Capture Analysis – Management Frames and Open Auth | Other Wireless – Mobility Subjects | Cisco Support Community | 5921 | 101431
Engage, collaborate, co-create, and share with your fellow experts on any Cisco technology or solutions in technical support forums in six different languages. Participate in live expert events and join the ongoing technical support forum in our communities.
Wireless LAN – Wikipedia, the free encyclopedia
Port 5343 (tcp/udp) :: SpeedGuide.net
SG Ports Services and Protocols – Port 5343 tcp/udp information, official and unofficial assignments, known security risks, trojans and applications use.
This guy is  awesome
Part of CIS 166 – this is how to read the output from wireshark to learn what issues there are with a network from an information security viewpoint.
▶Dan Morrill- How to read Wireshark Output – YouTube
Part of CIS 166 – this is how to read the output from wireshark to learn what issues there are with a network from an information security viewpoint.
WinPcap – Home
Service Name and Transport Protocol Port Number Registry
List of TCP and UDP port numbers – Wikipedia, the free encyclopedia
SampleCaptures – The Wireshark Wiki
Cisco TrustSec and Identity Services Engine Training (Preview) – YouTube
Do you want to learn how to apply a specific security policy for a user based on their Active Directory group? Do you want to learn how to apply a security p…
Cisco Certified Network Associate – CCNA
Continuing Education Certificate Program – This certificate will help prepare you to obtain the Cisco Certified Network Associate certification, which has become one of the most recognized industry credentials among networking professionals.
A Taxonomy of Coding Errors that Affect Security
Category:OWASP Top Ten Project – OWASP
CWE – CWE List List Version 2.8
Common Weakness Enumeration (CWE) is a list of software weaknesses.
Taxonomy – Insight-9.1
GrammaTech Static Analysis
GrammaTech’s CodeSonar is a static analysis tool for C, C++, Java, and binary code that is recognized by developers for providing deep and comprehensive code analysis.
The Web Application Security Consortium / Threat Classification
Exploits Database by Offensive Security
Windows NT – User Mode to Ring 0 Escalation Vulnerability
Windows NT User Mode to Ring 0 Escalation Vulnerability
MS Windows Server Service – Code Execution Exploit (MS08-067) (Univ)
MS Windows Server Service Code Execution Exploit (MS08-067) (Univ)
RawUDP – A Class to Craft Custom UDP Packets – CodeProject
An article showing how to use the RawUDP class to quickly create UDP packets and then how to send them with WinPCap; Author: Emmanuel Herrera; Updated: 23 Dec 2008; Section: Internet / Network; Chapter: General Programming; Updated: 23 Dec 2008
How to craft UDP packets and send them with WinPCap – CodeProject
An article describing how to create custom UDP packets and then send them through the Internet using WinPCap.; Author: Emmanuel Herrera; Updated: 21 Dec 2008; Section: Internet / Network; Chapter: General Programming; Updated: 21 Dec 2008
01 :: CCNA R&S Exam Course :: Introduction – YouTube
Join one of the most highly regarded and experienced CCIE instructors in the industry, CCIEx3 #8593 Brian McGahan (R&S, Security, SP), for this comprehensive…
▶ 01 :: CCNA R&S Exam Course :: Introduction – YouTube
Join one of the most highly regarded and experienced CCIE instructors in the industry, CCIEx3 #8593 Brian McGahan (R&S, Security, SP), for this comprehensive…
Cracking of wireless networks – Wikipedia, the free encyclopedia
The Legend of Zelda: Ocarina of Time – Secret Sound – YouTube
This was uploaded because it wasn’t on YouTube yet. :3 Majora’s Mask uses the same exact sound clip, I believe. To download, right click the link and hit “Sa…
Forging a single Deauth packet – Questions – Hak5 Forums
Forging a single Deauth packet – posted in Questions: Hey,first post here and I hope I am on the right thread.

I am trying to send a single deauth frame. Normally I can send those with aireplay-ng but the -0 1 option actually sends a bach of 128 not 1. This might not be the best idea if the admin is running an IDS for example.

I’ve been trying to find alternative tools for the job with not much luck.

Does anyone know if there is a tool or a way with the aircrack-ng suite to do t…

tcp-deauth – Google Search
Certifications – IT Certification and Career Paths – Cisco Systems
Scapy
Codenomicon Defensics – Defend, then Deploy
Codenomicon DEFENSICS preemptive security and robustness testing solutions empower customers to mitigate unknown and published threats in products and services prior to release or deployment – before systems are exposed, outages occur and zero-day attacks strike
zzuf – Caca Labs
PROTOS_Test-Suite_c04-wap-wsp-request – OUSPG
Protos – OUSPG
Ethical Hacking and Penetration Testing: Fuzzers – The ultimate list
Peach 3 Fuzzing Platform
Fuzz Testing of Application Reliability
antiparser
Codenomicon Fuzz-o-Matic | Codenomicon FuzzoMatic
Codenomicon DEFENSICS preemptive security and robustness testing solutions empower customers to mitigate unknown and published threats in products and services prior to release or deployment – before systems are exposed, outages occur and zero-day attacks strike
Codenomicon Products and Services for Industrial Control Systems (ICS/SCADA)
Codenomicon DEFENSICS preemptive security and robustness testing solutions empower customers to mitigate unknown and published threats in products and services prior to release or deployment – before systems are exposed, outages occur and zero-day attacks strike
Codenomicon LTD – YouTube
▶ From Fuzzing to creating an exploit – YouTube
The whole process from fuzzing an application to creating an exploit for it, please visit my blog to read everything. http://poc-hack.blogspot.com/2011/10/fr…
Reverse Engineering Resources – Decompilers
Next generation RecStudio decompiler design
Hex Blog | State-of-the-art code analysis
HexRays
The IDA Disassembler and debugger is a multi-processor disassembler and debugger hosted on the Windows, Linux and Mac OS X Platforms.
The Amazing King – EIP Redirection
Buffer Overflows – Help Understanding EIP and ESP Interaction
All,As some of you know from my last thread I have been working w/ Lupin’s tutorials on buffer overflow exploits. In the first tutorial located here: The Grey Corner: Stack Based Windows Buffer Overflow Tutorial Lupin details how the EIP and ESP registers interact:

The part I don’t understand is when the EIP register is set back to the value of the ESP register. In his example, the EIP points to 77daaf0a which has a JMP ESP instruction. once the CPU jumps to the ESP, is the EIP

The Grey Corner: Stack Based Windows Buffer Overflow Tutorial
Best Tutorial on Metasploit Basics. How-to Penetration Testing and Exploiting with Metasploit + Armitage + msfconsole – YouTube
In this Video we show you how to exploit machines with Metasploit, Armitage, and msfconsole. Thumbs up & Subscribe if you like it 🙂 Links: Links: Facebook:…
Top 10 Wireshark Filters (by Chris Greer)
Author Profile – Chris Greer is a Network Analyst for Packet Pioneer. Chris has many years of experience in analyzing and troubleshooting networks. He regularly assists companies in tracking down the source of network and application performance problems using a variety of protocol analysis and monitoring tools including Wireshark. When he isn’t hunting down problems at the packet level, he can be found teaching various analysis workshops at Interop and other industry trade shows. Chris also delivers training and develops technical content for several analysis vendors. He can be contacted at chris (at) packetpioneer (dot) com. The filtering capabilities of…
LoveMyTool – Building an Open Community for Network Management and Monitoring: Chris Greer
Dedicated to customer testimonials and expert reviews of their favorite “out-of-band” network security and performance monitoring tools including protocol analysis, application performance, web experience, network discovery, database security, intrusion detection, malware control, SOX, HIPAA and PCI compliance auditing, forensics, deep packet inspection, VoIP and IPTV service assurance, etc.
Overview – mona – Corelan Team Project Repository
Redmine
Shellcoding in Linux – OpenSecurity
Introducing LiveDump.exe | Exploring the Microsoft Windows crash dump stack
As mentioned in my previous blog post this afternoon, it appears Microsoft has added back the ability to dump physical memory to disk (in the form of a dump file) from user mode via NtSystemDebugControl. I wrote a quick proof-of-concept tool and generated what appears to be a 250mb kernel bitmap dump: Loading Dump File…
Offensive Computer Security Home Page (CIS 4930 / CIS 5930) Spring 2014
W. Owen Redwood | LinkedIn
Free Offensive Security Class | NoVA Infosec
This past spring Prof. Xiuwen Liu and W. Owen Redwood taught the first of their Offensive Security classes at Florida State University. Courses like this a…
Reverse Shell Cheat Sheet | pentestmonkey
Fuzzing and Exploit Development 101 – YouTube
This video is an introduction to exploit development and fuzzing.This lecture covers a fuzzing overview, the basics of exploit development, environment varia…
OpenSecurity – YouTube
A Channel to Support Free and Open Information Security Education. OpenSecurity is a non-profit venture to promote Free and Open Information Security Educati…
Exploit Development: Mona.py – The Exploit Writer’s Swiss Army Knife – YouTube
Complete tutorial on Mona.py’s usage. Ajin Abraham @ajinabraham OpenSecurity http://www.opensecurity.in
[PentesterLab] Bootcamp
KernelMode.info • View topic – Win32/Poweliks
Open Security Firefox Addon Exploit Suite – OpenSecurity
DanMcInerney/LANs.py · GitHub
LANs.py – Inject code and spy on LAN users
Exploit Research and Development Megaprimer – OpenSecurity
Five Best Programming Languages for First-Time Learners
If you’re thinking of learning to code, the language you decide to pick up first has a lot to do with what you’re trying to learn, what you want to do with the skill, and where you want to eventually go from there. Still, some languages are easier to pick up than others, have a community dedicated to teaching, or offer more useful skills once you learn them. Here are five of the best, based on your nominations.
RJ45-sized Linux networking server goes IPv6 · LinuxGizmos.com
Lantronix announced an IPv6 certified version of its tiny, RJ45-sized embedded Linux networking server called the XPort Pro Lx6 aimed at IoT applications.
rebind – DNS Rebinding Tool – Google Project Hosting
Part 1: How I owned your OS before you installed it – DamnSecure.org
Part 1: How I Owned Your OS Before You Installed It Most of the blog posts I read these days describe very clever, highly technical and quick attack …
Offensive Computer Security Home Page (CIS 4930 / CIS 5930) Spring 2014
Offensive Security 2013 – FSU – Lecture2: Linux Overview – YouTube
This is the second video recorded course lecture for CIS5930/CIS4930 “Offensive Security” from Spring 2013 at the Florida State University Computer Science D…
Offensive Security Home Page (CIS 4930 / CIS 5930) Spring 2013
Managed IT Services and Business IT Support | Buffalo, Hamilton, Toronto | Binatech
Binatech provides IT Consulting, Business Computer Support, Network Services, and Technology Solutions in Buffalo, New York, and Toronto and Western NY small businesses.
▶ Python Exploit Development – YouTube
A crash course in exploitation development. Learn how to use metasploit tools to create a python proof of concept code from scratch.
rebind_0-3-4.tar.gz – rebind – Rebind v0.3.4 – DNS Rebinding Tool – Google Project Hosting
Metasploit Unleashed
Twitter / Search – #niagaracareer
The latest and best tweets on #niagaracareer. Read what people are saying and join the conversation.
A way to link to a specific part of a youtube video
Is there a way to link to a specific part of a YouTube video? Yes.
Python Tutorials, more than 300, updated March 2, 2009 and carefully sorted by topic and category
Msfconsole Commands – Metasploit Unleashed
Generating Payloads – Metasploit Unleashed
Resize all images in a folder using Bash mogrify command | Blupixel IT Blog – Articoli e Tutorial Informatica e Programmazione
Resize all images in a folder using Bash mogrify command
MEGA
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 50GB now!
Using the Database – Metasploit Unleashed
Bypass antivirus with Shikata Ga Nai encoder – Cornel du Preez Weblog
cornel@Kraken:~$ cat life | grep experiences
▶ Quick Intro to gdb – YouTube
Just a quick overview of some often-used gdb (and related) commands, including: gcc -g to compile a program and include debugging information start – begin e…
Solü > For Job Seekers > Available Jobs
IT Recruitment & Staff Niagara
IT Recruitment agency in the Niagara Region from Niagara Falls and St Catharines to Hamilton, Ontario. We recruit PC / Network support staff as well as DBAs,
Cisco Binary Game
The Binary Game is all about adding up combination of binary numbers.
▶ Binary Numbers in 60 Seconds – YouTube
Understand how binary numbers work, including how to read binary numbers, and create your own.
How To Install Linux, Apache, MySQL, PHP (LAMP) stack on Ubuntu | DigitalOcean
This tutorial explains how to install Apache, how to install MySQL, how to change the root MySQL password, how to install PHP, and how to see what libraries are available. LAMP stack is a group of open source software used to get web servers up and ru
Installing VMware Tools
VMware is the global leader in virtualization software, providing desktop and server virtualization products for virtual infrastructure solutions.
Example: Installing Windows XP as a Guest Operating System
VMware is the global leader in virtualization software, providing desktop and server virtualization products for virtual infrastructure solutions.
VMware KB: VMware assessment of Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278, aka “Shellshock”)
The VMware Knowledge Base provides support solutions, error messages, and troubleshooting guides
Nagios Deployment Automation Tips and Tricks
Your description goes here.
Careers at Niagara Health System
Careers at Niagara Health
Louisiana Tech University – How to Find a Computer’s MAC Address (Windows 7 and Vista)
Louisiana Tech University Computing Center
Setting a Static IP Address in Windows 7 – PortForward.com
How to set a static IP address in Windows 7
Network Administrator Jobs | Workopolis.com
1180 Network Administrator jobs available. Find the best Network Administrator jobs on Workopolis.com and Apply Now!
The Internet Applications Company – Inline Internet Systems, Inc.
Inline is a developer of e-business software tools and services including iHTML Merchant, InTelaCart and oPAYc. We provide a variety of Internet based applications to facilitate global ecommerce.
The Internet Applications Company – Inline Internet Systems, Inc.
Inline is a developer of e-business software tools and services including iHTML Merchant, InTelaCart and oPAYc. We provide a variety of Internet based applications to facilitate global ecommerce.
Nagios XI: Server (CentOS) and Client (Linux & Windows) Setup Tutorial – YouTube
A tutorial on how to configure Nagios XI server and clients (Linux and Windows). Nagios XI is a monitoring and alerting software package that notify system a…
Nagios – Documentation
Nagios is the industry-standard in IT infrastructure monitoring. Nagios provides enterprise-class Open Source monitoring of hosts, services, applications, and networks. Learn why organizations around the world trust Nagios to handle their IT infrastructure monitoring and business process continuity.
Coding in Assembly 04 02. Linux Installation – YouTube
04 02. Linux Installation
ASM and OLLYDBG Tutorial – YouTube
I NEVER CLAIMED OWNERSHIP OF ANY OF THE SONGS SO FUCK YOU COPYRIGHT! ASM and OLLYDBG Tutorial I take no credits for this tutorial the original tutorial can b…
Offensive Security 2013 – FSU – Lecture5: Reverse Engineering (x86) Workshop Day 1 – YouTube
This is the 5th video recorded course lecture for CIS5930/CIS4930 “Offensive Security” from Spring 2013 at the Florida State University Computer Science Depa…
Msfencode – Metasploit Unleashed
XI_Virtual_Machine_Notes.pdf
Local Jobs Jobbank..gc.ca Computer Network Technicians (NOC 2281-B) – Hamilton–Niagara Peninsula Region, Ontario – jobs (local) – Job Bank
Systems Testing Technicians (NOC 2283-B) – Hamilton–Niagara Peninsula Region, Ontario – jobs (local) – Job Bank
CentOS Linux: Add Static Routing
Explains how to configure and add static routes on CentOS Linux servers, desktop and laptop based systems.
Set static IP on CentOS 6 via command line | Jack Stromberg
How to set a static IP the proper way! | Sudo JuiceSudo Juice
Setting a static IP in Ubuntu isn’t as simple as it used to be. Here are the instructions on how to set a static IP in Ubuntu 10+.
Clickback.com Automated Email lead generation with email | Marketing Technology Landscape
Call the leading email lead generation for auotmated email lead gen. Our marketing technology landscape provides email services globally.
VMware Workstation 10 Documentation Center
IT Jobs & IT Careers | Expertise in IT Career Management | TEKsystems
TEKsystems acts as your IT career advocate. We offer our IT consultants more job opportunities for a lasting IT career.
Jobs Available | TEKsystems
TEKsystems has 11 jobs available now with outstanding organizations around the world. Learn more and apply today on TEKsystems.com.
wtf tech jobs on kajiji lol
Find job opportunities in Ontario : IT jobs, programmer, project manager, developer positions and more careers on Kijiji, free online classifieds in Canada.
Free Software QA Tutoring/Consulting Service | programmers, computer | City of Toronto | Kijiji
tutor/consultant background: a seasoned senior software quality control analyst (international software testing qualifications board (istqb) certified tester) with 15 years it industry experience offers free software qa training for job hunters. professional working experience for some well known clients including top 5 banks and financial institutions. skilled in creating comp
S.i. Systems Ltd – View Jobs
Our People Click™. S.i. Systems is Canada’s partner of choice for on demand professionals. We offer a unique approach to staffing with 100% satisfaction guarantees, fully insured candidates and our proven MatchGuide™ system.
Systems Administrator (Ubuntu Linux) | programmers, computer | Ottawa | Kijiji
position title: systems administrator (ubuntu linux) we seek a systems administrator for support of developers and 24/7 hospitality systems. position overview we are looking for an individual to join our information systems department to provide daily support for both in-house and cross-border infrastructure. the systems administrator is responsible for the provisioning, instal
Software Niagara DevTricks – PHP Niagara Users Group (ON) (St Catharines, ON) – Meetup
Software Niagara hosts DevTricks on the third Monday of the month. DevTricks is a casual meetup where anyone can teach others about software technology, computer setups, programming languages, and so
Software Niagara Forum
Discussion forum for the Software Niagara community
Americana Resort Niagara Falls | Waves Indoor Waterpark | Gallery
Come and see all the fun you can have at Americana Waves Waterpark and Resort in our photo gallery.
NetflixFixer
Telling you which Netflix episodes are out of order so you don’t ruin the ending.
Shadowgate (2014) review – AdventureGamers.com
The reimagined 1987 classic blends a fresh new look and sound with faithfully punishing old-school sensibilities.
Show or hide Track Changes revision marks – Word
Dsiplay Word 2007 document changes inline, as ScreenTips instead of balloons, by type of edit or reviewer, and hide comments when printing.
Viewing and using EXIF data – Digicamhelp
Reputation-Based Approach for Spam Filtering Whitepaper | Cloudmark
Cloudmark provides carrier-grade messaging security and infrastructure solutions for the world’s most demanding fixed, mobile and social networks.
Application testing technician (Applications Engineer) – Burlington, ON – Job Posting – Job Bank
Evertz – Careers @ Evertz
Opportunities for employment at Evertz Microsystems
Blue Hat SEO – Advanced SEO Tactics
Public & Criminal Records | Free Background Search | Dirtsearch.org
A free background check that searches public, criminal, arrest, civil, speeding, tickets, jail, inmate, prison, divorce, arrest records for free.
List of social networking websites – Wikipedia, the free encyclopedia
Startup Jobs – AngelList
See 1000s of startup jobs at the best startups. Get salary, equity and funding info upfront. Apply privately with one click. No recruiters, no spam. 4000+ startups hiring.
Free People Search | PeekYou
PeekYou’s free people search engine allows you to find and contact anyone online. Find social links, photos, work history, alumni info, family and more.
Events, Shows & Festivals | Niagara Falls Tourism
Niagara Falls’ most comprehensive events listing. Find concerts, festivals, sporting events and more.
Cineplex.Com – Cineplex Odeon Niagara Square
7555 Montrose Road, L2H 2E9, Niagara Falls, ON L2H 2E9
Cineplex.com – Showtimes
Get local movie showtimes and buy movie tickets for your favourite Cineplex theatre.
Ridgeway Amenities & Attractions | The Shops, The Charm, The History | Ridgeway Ontario
How To Set Up a Firewall Using IPTables on Ubuntu 14.04 | DigitalOcean
The iptables firewall is a great way to secure your Linux server. In this guide, we’ll discuss how to configure iptables rules on an Ubuntu 14.04 server.
eLearnSecurity – IT Security training courses for individuals and corporations
IT Security training courses
SANS Information Security Training | Cyber Certifications | Research
Information security training, network & cyber security training, certification, and research in cyber defense, pentesting, ethical hacking, digital forensics.
SANS Institute
Computer security training, certification and free resources. We specialize in computer/network security, digital forensics, application security and IT audit.
Nping – Network packet generation tool / ping utiliy
Nping is an open source tool for network
packet generation, response analysis and response time measurement. It is free
and open source and runs on Linux, *BSD, Windows and Mac OS X.
TheLadders provides confidential access to relevant recruiters, professional-level jobs, and expert career advice | TheLadders.com
Archives Shortcode — Support — WordPress.com
You can quickly and easily create an archive index of your WordPress.com blog’s posts using the shortcode. To create an archive index for your blog, simply following the instructions in this support doc.
CIDR SUBNET MASK CHEATSHEET & ICMP TYPE CODES
CIDR SUBNET MASK CHEATSHEET ICMP TYPE CODES again.net/cidr
Events | St. Catharines Downtown Association
City of Welland: Events Calendar
City of Port Colborne • Events Calendar
Port Colborne is a city on Lake Erie, at the southern end of the Welland Canal, in the Niagara Region of southern Ontario, Canada near Niagara Falls.
Fort Erie, Ontario – Tourism
Niagara-on-the-Lake: Events
Upcoming events in Niagara-on-the-Lake, Ontario, Canada
It’s a CARLOTTA THING | Teespring
If you’re a CARLOTTA then this shirt is for you! LIMITED EDITION HOODIE ONLY $39.99 – ends soon Sale may end early so get yours now!
vBulletin – Not So Secure Anymore « Exploits Database by Offensive Security
Bugtraq: vBulletin remote admin injection exploit
Website Security – Bash “Shell Shock” Vulnerability Impacts CPANEL Users | Sucuri Blog
A very big vulnerability was just disclosed that targets BASH on NIX based operating systems. In this post we specifically address the impact to website owners.
Tools: Metasploit Exploit Module For vBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection | Offensive Security Blog V2.0
▶ Kali Linux – Lesson 3 – Bruteforce FTP – YouTube
JackkTutorials shows you how to bruteforce an FTP Server with Medusa and xHydra Quick Links ——————- Check out some of these links —————…
Infographic: How to Recover from a Google Penguin Penalty using Ahrefs – Ahrefs Blog
Ahrefs have come up with a new infographic that has detailed steps including screenshots and instructions telling you what you exactly need to do to recove
Our Mission | SQA Canada
About – Toronto ON | IT Weapons Inc.
IT Weapons is a privately held, award-winning IT consulting, cloud solutions, and managed services firm. We were founded in June of 2000, by Ted Garner and Jason MacBean. Our team maintains the highest levels of industry certification in all aspects of business-related IT. We operate 4 state-of-the-art and highly secure Data Centres across Canada. We are Canada’s only IT service provider that jointly holds SAS-70 and SSAE-16 accreditation, an ITIL certified Service Desk staffed day and night, and designation by the Controlled Goods Program of Canada for the management and storage of data related to National Security and Defense.
Contact IT Weapons – 904.494.1040 or 866.202.5298 – Toronto ON | IT Weapons Inc.
Head Office 7965 Goreway Drive, Unit 1 Brampton, ON Canada L6T 5T5 Phone: 905. 494. 1040 Toll Free: 1. 866. 202. 5298 Client Services: 905. 494. 3010 Fax: 905. 494. 3000 Email: (mailto:)<br
Careers – Toronto ON | IT Weapons Inc.
Current Opportunities <a href=’images/pdf/CitrixandVDIConsultantweb. pdf’ ta
dnsenum – Backtrack 5 – Information Gathering – Network Analysis – DNS Analysis – dnsenum – Question Defense
dnsenum – Backtrack 5 – Information Gathering – Network Analysis – DNS Analysis – dnsenum | Question Defense
CrackStation’s Password Cracking Dictionary (Pay what you want!)
Download CrackStation’s password cracking wordlist.
dnstracer Backtrack
hackingDNA is a network security website with tutorials on Penetration Testing , Windows Hacking , Networking m Opearating systems . In this page we share other resources with you .From this website you learn as a security professional and think like a hacker
Information Gathering Using Maltego – InfoSec Institute
The first phase in security assessment is to focus on collecting as much information as possible about a target application. According to OWASP, informatio
THC-IPv6-Attack-Toolkit – aldeid
arping – Backtrack 5 – Information Gathering – Network Analysis – Identify Live Hosts – arping – Question Defense
arping – Backtrack 5 – Information Gathering – Network Analysis – Identify Live Hosts – arping | Question Defense
Download Wordlist Password Collections | franx47
Good day ppl, Happy weekend for you all there. There are lot of wordlist or password collection we can easily find on the net. We can find from hacking/cracking site, torrent, or any file hosting. But, sometimes the files have been divided into multiple download links and ofcourse we have to click many times to…
HOWTO : TCP flooding with HPING3 !!! – YouTube
In this video I go over how to do a HPING3 tcp flood against a local gateway please visit my website @ http://www.seanmancini.com !
Hping3 Examples – Firewall testing | 0DAYsecurity.com
Many examples of diverse usages of the tool Hping3
How To using NetDiscover
How to using NetDiscover.Netdiscover is an active/passive address reconnaissance tool, mainly developed for those wireless networks without DHCP server, when you are wardriving. It can be also used on hub/switched networks. (Source NetDiscover )

Disclaimer: This information is for educational purposes only and not to commit a crime!
If you do something that causes you to hose your box don’t come kicking and screaming on the forums!
All IP Address’ MAC Address’ etc. have been munged!

Hack Like a Pro: Using Netdiscover & ARP to Find Internal IP and MAC Addresses « Null Byte
Welcome back, my fledgling hackers! A number of you have written me in recent weeks asking how to find IP addresses of a potential target. There are numerous ways to do this, but in this tutorial I will show you how to use a tool built into BackTrack that leverages Address Resolution Protocol or ARP to discover live hosts on the network. As you know, ARP is used to map MAC addresses to IP addresses on an internal network. The router and switches send out broadcast ARP requests to all the MAC addresses on the network asking them to respond with their IP addresses. Each system will then
Backtrack 5 R3 – Netifera ~ BackTrack network flaws Tutorials
Chapter 18. Nping Reference Guide
NMAP Vulnerability Scanning Tests
NMAP DOS
Ostinato Packet/Traffic Generator – YouTube
Screencast for Ostinato packet/traffic generator (http://ostinato.org/). Ostinato is an open-source, cross-platform (Windows, Linux, BSD, Mac OSX) packet cra…
ostinato – Packet/Traffic Generator and Analyzer – Google Project Hosting
UserGuide – ostinato – User Guide including a QuickStart – Packet/Traffic Generator and Analyzer – Google Project Hosting
UserGuide – ostinato – User Guide including a QuickStart – Packet/Traffic Generator and Analyzer – Google Project Hosting
Ostinato – PacketLife.net
Cheat Sheets – PacketLife.net
Packet Captures – PacketLife.net
tcpdump | I Smell Packets
Posts about tcpdump written by cchristianson
Backtrack 5 : PBNJ Information Gathering : Network Analysis : Identify Live Hosts : pbnj – Question Defense
Backtrack 5 : Information Gathering : Network Analysis : Identify Live Hosts : pbnj | Question Defense
scanpbnj: install_driver(CSV) failed: Can’t locate DBD/CSV.pm in @INC – Question Defense
scanpbnj: install_driver(CSV) failed: Can’t locate DBD/CSV.pm in @INC | Question Defense
PBNJ – Home
PBNJ is a network suite to monitor changes that occur on a network over time.
http://spl0it.org/files/PBNJ-sysadmin-article-feb07.html
PBNJ 1.14 Released – Diff Your Nmap Results – Darknet – The Darkside
PBNJ is a network tool that can be used to give an overview of an machine or multiple machines by identifying the details about the services running on the
Stream Control Transmission Protocol – Wikipedia, the free encyclopedia
Packet fragmentation versus the Intrusion Detection System (IDS) Part 1
Packet fragmentation and how it can affect the IDS.
Packet fragmentation versus the Intrusion Detection System (IDS) Part 2
More advanced fragrouter options to attempt IDS evasion.
Add a static IP route: TCP/IP
Adding a TCP/IP Route to the Windows Routing Table
http://dev.inversepath.com/ftester/README
Download FTester 1.0 for Linux – Softpedia
FTester (The Firewall Tester) is a tool designed for testing firewalls filtering policies and Intrusion Detection System (IDS).
Fun with HexInject and USB protocols « SECURITY ADVENTURES
Did you know that pcap (http://www.tcpdump.org/) libraries can capture raw USB traffic? I had noticed several times the presence of various USB interfaces in wireshark but so far I’ve never tried to play with them: On your system should appear similar interfaces. If not you can refer to this guide: http://wiki.wireshark.org/CaptureSetup/USB In this short post…
▶ EC521 Group7 Fragroute – YouTube
Final Project for EC521, Group 7 of Boston University in Fall 2013 Introduction of Fragroute
pytbull – IDS/IPS Testing Framework – documentation
Pytbull is a flexible Python based Intrusion Detection/Prevention System (IDS/IPS) Testing Framework for Snort, Suricata and any IDS/IPS that generates an alert file
Pytbull – YouTube
pytbull is an Intrusion Detection/Prevention System (IDS/IPS) Testing Framework for Snort, Suricata and any IDS/IPS that generates an alert file. It can be u…
Snort – YouTube
Setup Snort IDS on Windows 7 – YouTube
How to setup Snort IDS system on Windows 7 workstation.
SniffJoke – Defeating Interception Framework | ClubHACK Magazine
In India we were waiting to see any ‘hacking’ magazine to come in life and the wait was getting little longer. So finaly ClubHack decided to come out with its own 1st Indian “Hacking” Magazine called CHmag.
Backtrack Autoscan
hackingDNA is a network security website with tutorials on Penetration Testing , Windows Hacking , Networking m Opearating systems . In this page we share other resources with you .From this website you learn as a security professional and think like a hacker
#!/bin/the hacker’s choice – THC
Backtrack 5 Tutorial – Lanmap2 – YouTube
How to use Lanmap2, a network mapping tool found in Backtrack 5.
Backtrack 5 Tutorial – Lanmap2
Scapy Backtrack and Kali Linux Tutorial – YouTube
Find us on: Twitter https://twitter.com/Th3G33k5 Facebook https://www.facebook.com/groups/InfoSecArchives/
Scapy – YouTube
Using scapy to create a very basic TCP/IP packet. For high resolution security videos check out http://www.vimeo.com/channel16443 To find out more about hack…
SYN Flooding with Scapy and Python | Jamesdotcom
ARP Cache Poisoning with Scapy | Jamesdotcom
Scapy Primer | ClubHACK Magazine
In India we were waiting to see any ‘hacking’ magazine to come in life and the wait was getting little longer. So finaly ClubHack decided to come out with its own 1st Indian “Hacking” Magazine called CHmag.
Man page of SCAPY
Irongeek’s Information Security site with tutorials, articles and other information.
Transparent Web Traffic Hijacking With Scapy, Squid, DansGuardian, and BackTrack4
This article is all about my attempt at traffic shaping/modification; how I hacked together a transparent web proxy that allows traffic modification, and ARP-spoofed my house’s network in order to do so.
Passive Bluetooth Monitoring in Scapy
Passive Bluetooth Monitoring in Scapy
Discovering Hidden SSIDs with Wireshark and Scapy » cloud101
What Is Scapy? – InfoSec Institute
Scapy is a Python interpreter that enables you to create, forge, or decode packets on the network, to capture packets and analyze them, to dissect the pack
Some Practical ARP Poisoning with Scapy, IPTables, and Burp | WebstersProdigy
ARP poisoning is a very old attack that you can use to get in the middle. A traditional focus of attacks like these is to gather information (whether that information is passwords, auth cookies, CSRF tokens, whatever) and there are sometimes ways to pull this off even against SSL sites (like SSL downgrades and funny…
python – Scapy arp poisoning not working for me – Stack Overflow
Backtrack 5 & Scapy Python Dependecies | What Justin’s Thinking
Project 9: Intro to scapy (15 pts.)
Backtrack 5 R2 – Scapy
Hallo!I am using the Live-Cd Backtrack 5 R2 Gnome. The installed version of scapy of this Live-CD is v2.0.1. In this version, I think there is a bug. When I am executing an ELF that uses scapy, it allways gives an error that tells me that tcpdump is not installed despite it is installed. I found out that the error comes from a wrong path definition in the file the linux.py.

But the ELF I want to execute needs scapy v2.2.0. Therefor I went to http://www.secdev.org/projects/scapy/,

Scapy Tutorial – YouTube
This is a tutorial on the use of scapy. This is the first in a series that I plan to release over the course of the next several days.
▶ Packet Injection with Scapy – YouTube
This tutorial will introduce the principle of using Scapy in Backtrack 5 R2 to perform packet injection onto a network. Specifically, I will show how to inje…
▶ PORT SCANNING WITH SCAPY in BackTrack – YouTube
Like us on Facebook : https://www.facebook.com/mrlearningsspot Subscribe me : https://www.youtube.com/user/mrlearningspot PORT SCANNING WITH SCAPY in BackTra…
Scapy Tutorial 2 – YouTube
This is part two about the use of scapy. It covers using scapy to SYN scan and use of using the make_table() function. TCP traceroute functionality and how t…
ARPing with Scapy – YouTube
▶ Basic UDP session Hijacking with Scapy – YouTube
Music: Cockney Rejects – The Rocker
scapy tutorial – YouTube
scapy is a Python framework for crafting and transmitting packets. Its a basic tutorial. If you have any doutes please make commands
▶ Scapy Client Probes – YouTube
Full Course: http://www.pentesteracademy.com/course?id=14
Traceroute and Scapy Jeremy Druin @webpwnized – YouTube
Video notes and download a this URL soont: http://www.irongeek.com/i.php?page=videos/traceroute-and-scapy-jeremy-druin-webpwnized
Creation of Ghost Network Computers using SCAPY and Python – YouTube
This video shows that by using SCAPY and python it is possible to create ghostly machines on a network that don’t actually exist. The point being, that if yo…
Ping with Scapy – YouTube
Scapy is a great packet manipulation tool written in pyton. this is a quick look in to the functionality of it.
Sniffing With Scapy – YouTube
Kali Linux Tutorial-Security by Penetration Testing : Network Discovery with Scapy part 1 – YouTube
Send Packets Using Scapy – YouTube
using scapy to disrupt TCP communication – YouTube
the video desribed how to handcraft tcp/ip packet in scapy and then disrupt the onging client server communication
▶ Scapy Part2 Creating Packets – YouTube
A bit more Scapy
▶ Arp DOS with Scapy/TcpKill on BackBox – YouTube
http://www.clshack.com Arp DOS with Scapy/TcpKill on BackBox.
□Scapy□ – YouTube
a little oce with final cut pro x
▶ scapy_1.mp4 – YouTube
Scapy basics
ESC1112 SniffJokes – YouTube
ESC 2K11 1112 Sniffjoke, un progetto che senza ESC non sarebbe proseguito (vecna)
How to Convert an IDE HDD to USB | eHow
How to Convert an IDE HDD to USB. An internal IDE hard drive is converted to an external USB drive through the use of an IDE-to-USB adapter. This adapter transforms the IDE data interface into a USB plug, which is automatically recognized by Windows 7 when inserted into an available USB port. This adapter does not supply power to the drive, so an…
USBGeek — USB 2.0 to SATA/IDE Cable with Power Adapter
▶ ARP Cache Poisoning – YouTube – nice explanation of arp
Python for Hackers – Networkers Primer (Sockets, Webserver Scapy!) – YouTube
In this video Patrick Schallner & Rene Schallner two really smart guys explain how to use sockets and scapy!!! with Python, a lot to learn from these video.
▶ Reassembling Captured Traffic with Xplico – YouTube
Share your videos with friends, family, and the world
Unchecky – Keeps your checkboxes clear
Xplico – Open Source Network Forensic Analysis Tool (NFAT)
Netcraft | Internet Research, Anti-Phishing and PCI Security Services
MITM , Without any dedicated tools using manual method ( man in the middle attack ) – YouTube
Man in the middle done using hexedit and wireshark ( network analizer ), thanks to “Thanx got to Lamont Granquist & fyodor for their hexdump()” lol Tools use…
▶ BinGoo! – A Linux Bing and Google Dorking Tool – YouTube
This is a demo of my new tool BinGoo! which is a Google and Bing dork tool. It has lots of features including: Bing Dorker, Google Dorker, Mass Scan options,…
Phenoelit IRPAS Cisco Attack Suite
GRE Attacks
IRPAS_Suite Protos
hackingDNA is a network security website with tutorials on Penetration Testing , Windows Hacking , Networking m Opearating systems . In this page we share other resources with you .From this website you learn as a security professional and think like a hacker
ferzip.com | irpas IRPAS (Internetwork Routing Protocol Attack Suite)

IRPAS

IRPAS contains at the moment the following tools: * cdp This program …

▶ Miranda-python ( Stop connection of the router target with the network ) – YouTube
[ Miranda.py ] is a Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices, particularly Internet G…
How to use sslscan in kali linux | Geeky Shows
How to use sslscan in kali linux
SMB HOWTO: Accessing an SMB Share With Linux Machines
▶ Introduction to SNMP – Simple Network Management Protocol – YouTube
Download braa 0.8 for Linux – Softpedia
Braa is a tool for making SNMP queries.
SNMP Analysis – dotslashbacktrack.com
You searched for snmp – InfoSec Institute
Vulnerability Assessment of SNMP Service – I – InfoSec Institute
Background: This is the first article out of a series of articles that I am planning to write on vulnerability assessment of SNMP Service. SNMP – also know
Holy shit this is awesome. pentest.sh – phillips321 – My code repo for my scripts – Google Project Hosting
phillips321.co.uk
SANS Penetration Testing | Pen Test Privilege Escalation Through Suspended Virtual Machines | SANS Institute
SANS Penetration Testing blog pertaining to Pen Test Privilege Escalation Through Suspended Virtual Machines
networkrepairs.ca
Hack Like a Pro: How to Crack Private & Public SNMP Passwords Using Onesixtyone « Null Byte
Welcome back, my novice hackers! In a recent tutorial, I showed how the SNMP protocol can be a gold mine of information for reconnaissance on a potential target. If you haven’t already, I strongly suggest that you read it before progressing here, as little of this will make much sense without that background. Cracking SNMP Passwords with Onesixtyone The MIB database, created by SNMP, contains extensive information on every device on the network. While SNMPv1 is very insecure and SNMPv3 is very secure, many companies still use SNMPv1. As such, the community public string (password) that
Hack Like a Pro: How to Exploit SNMP for Reconnaissance « Null Byte
Welcome back, my rookie hackers! The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). Many rookie hackers are not even aware of it, but it can prove to be a treasure trove of information, if you understand how it works and how to hack it. How SNMP Can Help You Access Network Devices SNMP runs on UDP (connectionless and efficient) on port 161 and enables a network administrator to gather information on and manage
Bug Resolution in the Internet Age – YouTube
Share your videos with friends, family, and the world
“Installing Splunk Enterprise 6 On Linux” – YouTube
Share your videos with friends, family, and the world
Your download is starting… | Splunk
Splunk indexes and makes searchable data from any app, server or network device in real time including logs, config files, messages, alerts, scripts and metrics.
Entry level software testing Toronto – Trovit Jobs
Learn Pentesting Online
Pentester Academy
▶ Exploiting Simple Buffer Overflow on Win32 – YouTube
IMMUNITY : Knowing You’re Secure
▶ Selenium Tutorial 1 – Selenium IDE Training Selenium WebDriver Training Selenium Training – YouTube
How to report bugs effectively? by Inder P Singh This bug reporting video tutorial explains how to report defects, how to write a bug report completely and c…
Thank you for downloading PyCharm
Python 3.4 Programming Tutorials – YouTube
Tons of sweet computer related tutorials and some other awesome videos too!
2. Built-in Functions — Python 2.7.8 documentation
Trailside Bar and GrillFort Erie Ontario – 365 Things To Do – presented by Trailside
Fort Erie Ontario – 365 Things To Do. You might be surprised with how much there is to do in Fort Erie, Ridgeway, Crystal Beach and Stevensville.
Mr. Bart | Cisco certification and other topics
Cisco certification and other topics (by Mr. Bart)
Master Test Plan Template
Master Test Plan
Example Test Strategy – Software Testing Articles/ Help Guide on Tools Test Automation, Strategies, Updates
Example software test strategy document to be used for testing in an agile project
Agile Testing – Example Agile Test Strategy and Agile Test Plan – YouTube
How to become a Software Testing Expert in your team or company? Who is a software testing expert? A professional who is very highly skilled in software test…
Exploiting Simple Buffer Overflow – The Stack – YouTube
Software and Testing Training – YouTube
This video explains sections of an example Agile Test Strategy in detail. Then it explains how to convert an Agile test strategy to an Agile test plan. See t…
Online IT Training Videos & IT Certification Training | CBT Nuggets
Online IT training videos and IT certification training for IT professionals at all levels. We offer training videos for Cisco, Microsoft, VMware, and more!
OU Knowledge Network
ccnaguide.pdf
Cisco Networking Academy – Cisco Systems
The Networking Academy program delivers ICT training to help improve career and educational opportunities for individuals in communities around the world
Cisco.com Login Page
SWEET!! Google Hacking Database, GHDB, Google Dorks
Even more awesome google dorks. GHDB « Hackers For Charity
Hackers for Charity is a non-profit organization that leverages the skills of technologists. We solve technology challenges for various non-profits and provide food, equipment, job training and computer education to the world’s poorest citizens.
CCNA Exploration 4.0 Curriculum / Course Material installers, for offline viewing ⋆ Catzie.net Blog
Catzie, Philippines, travel, games, programming
[SOLVED] Cisco CCNA Offline Exploration 4.0 Launch Problems – MabZiCLe | MabZTech
Failed CCNA yesterday – The Cisco Learning Network
Hi all, This was my first experience of a Cisco exam and thought I would post how it went… So I took my CCNA 200-120 exam yesterday m
CCENT/CCNA ICND1 100-101 Official Cert Guide: 9781587143854: Computer Science Books @ Amazon.com
CCENT/CCNA ICND1 100-101 Official Cert Guide: 9781587143854: Computer Science Books @ Amazon.com
CCENT ICND1 100-101 Network Simulator: Wendell Odom, Sean Wilkins: 9780789750433: Books – Amazon.ca
CCENT ICND1 100-101 Network Simulator: Wendell Odom, Sean Wilkins: 9780789750433: Books – Amazon.ca
ISTQB Certified Tester Foundation Level (Course Only) – ISTQB Courses
Protection ring – Wikipedia, the free encyclopedia
Segmentation fault – Wikipedia, the free encyclopedia
Exit status – Wikipedia, the free encyclopedia
Dump analyzer – Wikipedia, the free encyclopedia
objdump – Wikipedia, the free encyclopedia
objdump(1): info from object files – Linux man page
objdump displays information about one or more object files. The options control what particular information to display. This information is mostly useful …
disassembly – Converting assembly code to c – Reverse Engineering Stack Exchange
IDA: with Hexrays Disassembler, Debugger, Reassembler.
The IDA Disassembler and debugger is a multi-processor disassembler and debugger hosted on the Windows, Linux and Mac OS X Platforms.
IDA Debugger: Overview
The IDA Disassembler and debugger is a multi-processor disassembler and debugger hosted on the Windows, Linux and Mac OS X Platforms.
Whoa. GNU Debugger – Wikipedia, the free encyclopedia
WinDbg – Wikipedia, the free encyclopedia
General protection fault – Wikipedia, the free encyclopedia
Page fault – Wikipedia, the free encyclopedia
Welcome to WinDbg.info
Thinking debugging? Think http://www.windbg.info.
Common WinDbg Commands (Thematically Grouped)
Common WinDbg Commands (Thematically Grouped), by Robert Kuster.
WinDbg. From A to Z!
A quick start and introduction to WinDbg. 111 slides with examples, by Robert Kuster.
Categories – www.windbg.info
Thinking debugging? Think http://www.windbg.info.
Simple shellcode obfuscation | Fun Over IP
Command Line Kung Fu: Episode #143: Unicode to Shellcode
SQL Injection Labs « SecurityTube Trainings
IPsec VPN Penetration Testing with BackTrack Tools – Open Source For You
This article outlines the value of penetration-testing VPN gateways for known vulnerabilities and also shows you how to prevent a breach into the internal network.
UA-Tester – Information Gathering Tool | Tutorial | Backtrack 5 R3 ~ COMPUTER KORNER
A Place To Learn About various security techniques, hacking, coding, programming.
List of tools in BackTrack – Secpedia
This is a list of software tools comes installed with BackTrack listed according to the menu structure in BackTrack. Some software tools fits into multiple categories thus can be found in multiple sections. The actual distribution comes installed with more software than listed here, like text editors and accessibility improvement software.
Aldeid HackTheWeb (Google Dork Engine)
Aldeid HackTheWeb est un portage Web de GoogleHacks.
XSSed | Cross Site Scripting (XSS) attacks information and archive
Providing the latest information on XSS (cross-site scripting) vulnerabilities. Advisories, news articles, tutorials and an archive of XSS vulnerable websites.
▶ Using dirb Web Crawler to List Directories – YouTube
Dirb is a small script built into Backtrack that uses brute force to crawl through directories on a provided site. This tutorial shows how to use dirb.
▶ WOW this is really exciting.[ Golismero.py + WPScan.rb ] – YouTube
Golismero web tool on BackTrack 5 R2 http://www.abh-sec.com
One Entrepreneur’s Perspective
BackTrack 5R1 Cracking MS SQLServer – YouTube
Using Backtrack 5R1 and metasploit we exploit a MSSQL instance on a Server 2003 box. We brute force the SA account, and with that, gain administrative access…
cool song backtrack 5 r3 wordlist generator with crunch! – YouTube
http://safe-linux.com Wordlist: http://safe-linux.com/wordlist This Video shows you how to get a Wordlist in Backtrack5.
Evanescence – Erase This Lyrics | MetroLyrics
Lyrics to ‘Erase This’ by Evanescence. It’s too late to change your mind / Even though this fragile world is tearing apart at the seams / You can’t wash these
SQL Injection with SQL Ninja and Metasploit Hacking Tutorial – YouTube
SQL Ninja Tutorial, Visit: http://HOWTOHACKCLASS.COM
Using SQL Ninja In Metasploit For Basic SQL Injection Attacks.
In this blog I will show you a pretty sweet tool called SQL Ninja in the Metasploit Framework. There are a lot of SQL injection tools out there but this one is
Shipping methods for Dreamweaver, WordPress, CSS and Responsive design shopping cart software
How to set up shipping on your Ecommerce Template store.
Bluediving – Next generation bluetooth security tool
Bluediving – Next generation bluetooth security tool
BlueDiving – YouTube
▶ LOL Bluetooth Scanning From BASH – YouTube
The Scoville Heat Scale for Chilli Peppers and Hot Sauces from ChilliWorld. Compare relative heats all the way to Blair’s 6 A.M. – pure capsaicin.
The Scoville Heat Scale for Chilli Peppers and Hot Sauces from ChilliWorld. This table gives a comparison of the heat in fresh chillies of different varieties ranks them with a number of popular chilli sauces.
3 Reasons to Never Take Another Job
▶ OWASP Mantra – Broken Authentication – YouTube
Share your videos with friends, family, and the world
Tutorials | OWASP Mantra
Introducing PassiveRecon by Justin Morehouse
PassiveRecon provides information security professionals with the ability to perform “packetless” discovery of target resources utilizing publicly available information. Mozilla add-on library URL: ad
WakaTime · Fully automatic time tracking for programmers.
Fully automatic time tracking for your text editor.
Courses | HackerYou
SearchSecurity_Screencast_OWASPMantra
Mantra Open Discussion Forums
Running Mantra and Firefox together
Where ever we go, we always used to hear some people saying that it could have been great if it is possible to run OWASP Mantra and Firefox together. Today, we will be discussing how you can make it p
Style Guide for Python Code | Python.org
The official home of the Python Programming Language
Misconfigured Apache sites expose user passwords, other private data | Ars Technica
System status pages are publicly viewable on thousands of sites.
c# – Redirecting Input/Output of cmd.exe – Stack Overflow
Shellcode Tutorial 9: Generating Shellcode Using Metasploit | Project Shellcode
Reversing Malware Command and Control: From Sockets to COM | M-unition
M-unition- The Ammunition You Need to Find Evil and Solve Crime
internet explorer – Is it possible to run the VBScript file(.vbs) from the browser? – Stack Overflow
Sniffing SSL traffic using MITM attack / ettercap, fragrouter, webmitm and dnsspoof.
Hey guysThis is my method of sniffing and decrypting ssl traffic on a network.

Before reading on this guide is for educational purposes only. I take no responsibility from what people do with this info.

First thing is to get fragrouter. I don’t know if you can use other tools provided with the backtrack, there are 100 ways to skin a cat and this is just my way.

http://packetstormsecurity.nl/UNIX/IDS/nidsbench/fragrouter.html

▶ PyCharm Overview – YouTube
Share your videos with friends, family, and the world
Pycharm Documentation
Pycharm Keyboard Shortcuts You Cannot Miss
Getting Started with PyCharm – PyCharm – Confluence
Python Programming Tutorials – YouTube
Tons of sweet computer related tutorials and some other awesome videos too!
pycharm error highlighting – Stack Overflow
Online Python Compiler Execute Python Script Online
Execute Python Script Online – You can compile and run, execute your source code related to Java, JSP, Cold Fusion, C, C++, Pascal, Fortran, PHP, Perl, Ruby and Python programs onnline using your browsers, iPhone, iPad or any other online device like smart TV using this virtual Linux / Unix Server.
Your Niagara Region calendar of activities and events in your community
Plan your Niagara Region activities with this free Niagara Region calendar that features your choice of events and services taking place in your community. Find information on everything from blood donor clinics to sports registration days and more.
WordPress › MobileView by ColorLabs & Company « WordPress Plugins
WordPress › Hueman « Free WordPress Themes

Unsorted Bookmarks

Download Microsoft Visual Basic 6.0 Common Controls from Official Microsoft Download Center
Download Microsoft Visual Basic 6.0 Common Controls at the Official Microsoft Download Center
CDBurnerXP: Free CD and DVD burning software
Free CD, DVD, ISO, HD-DVD and Blu-Ray burning software with multi-language interface. Everyone, even companies, can use it for free.
* Creating a custom wordlist for john the ripper > jason schaefer
Rainbow Hash Cracking
Services
Codenomicon DEFENSICS preemptive security and robustness testing solutions empower customers to mitigate unknown and published threats in products and services prior to release or deployment – before systems are exposed, outages occur and zero-day attacks strike
mona.py – the manual | Corelan Team
This document describes the various commands, functionality and behaviour of mona.py. Released on june 16, this pycommand for Immunity Debugger replaces
MEGA
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 50GB now!
VMWare Downloads
eBay Online Customer Support Phone #
eBay Application
Biggest password cracking wordlist with millions of words – Hack Reports
Biggest password cracking wordlist , bruteforce,Hacking Tools, hashcat, John the Ripper,password cracking,wordlists, hack reports, security blog, hacking tools download, networking tools,Security tools
Protection ring – Wikipedia, the free encyclopedia

Testing Every Single Aspect Of Backtrack 5r3.

Yup. Kali has been around for a while but it seems to have issues on my hardware.
I’ve been going through every program in Backtrack and reading up as part of an overview prior to testing every single little thing there is to test. It’s been a big build up and there is a ton of stuff there.  This is gonna be cool.What happens when you take a jinx and give them Backtrack to try and sort it out and attack things in their own lab? I dunno, but we’re gonna find out.

 
Image and video hosting by TinyPic
Stay tuned

Default Logins and Passwords for Networked Devices

http://www.governmentsecurity.org/_/articles/default-logins-and-passwords-for-networked-devices.html

Manufacturer Model OS Version Login Password
3Com 1.25 root letmein
3Com Super Stack 2 Switch Any manager manager
3Com AccessBuilder® 7000 BRI Any
3Com CoreBuilder 2500
3Com Switch 3000/3300 manager manager
3Com Switch 3000/3300 admin admin
3Com Switch 3000/3300 security security
3Com Cable Managment System SQL Database (DOSCIC
DHCP)
Win2000 & MS DOCSIS_APP 3Com
3Com NAC (Network Access Card) adm none
3Com HiPer ARC Card v4.1.x of HA adm none
3Com CoreBuilder 6000 debug tech
3Com CoreBuilder 7000 tech tech
3Com SuperStack II Switch 2200 debug synnet
3Com SuperStack II Switch 2700 tech tech
3Com SuperStack / CoreBuilder admin
3Com SuperStack / CoreBuilder read
3Com SuperStack / CoreBuilder write
3Com LinkSwitch and CellPlex tech tech
3Com LinkSwitch and CellPlex debug synnet
3Com Superstack II 3300FX admin
3Com Switch 3000/3300 Admin 3Com
3Com 3ComCellPlex7000 tech tech
3Com Switch 3000/3300 monitor monitor
3Com AirConnect Access Point n/a comcomcom
3Com Superstack II Dual Speed 500 security security
3Com OfficeConnect 5×1 at least 5.x PASSWORD
3Com SuperStack 3 Switch 3300XM admin
3Com Super Stack 2 Switch Any manager manager
3Com SuperStack II Switch 1100 manager manager
3Com SuperStack II Switch 1100 security security
3Com super stack 2 switch any manager manager
3Com Office Connect Remote 812 root !root
3Com Switch 3000/3300 admin admin
3Com OCR-812
3Com
3Com NBX100 2.8 administrator 0000
3Com Home Connect User Password
3Com OfficeConnect 5×1 at least 5.x estheralastruey
3Com SuperStack II Switch 3300 manager manager
3Com Superstack
ACC Routers netman netman
Acc/Newbridge Congo/Amazon/Tigris All versions netman netman
Acc/Newbridge Congo/Amazon/Tigris All versions netman netman
adaptec
Adaptec RAID Storage Manager Pro All Administrator adaptec
adtran tsu 600 ethernet module 18364
Adtran TSU 120 e ADTRAN
Adtran TSU 120 e ADTRAN
Aironet All
alcatel
Alcatel 1000 ANT Win98
alcatel speed touch home
Alcatel/Newbridge/Timestep VPN Gateway 15xx/45xx/7xxx Any root permit
Alcatel/Newbridge/Timestep VPN Gateway 15xx/ Any root permit
Alcatel/Newbridge/Timestep VPN Gateway 15xx/ Any root permit
Allied Tenysin R130 Manager friend
Alteon ACEswitch 180e (telnet) admin blank
Alteon Web Systems All hardware releases Web OS 5.2 none admin
APC MasterSwitches apc apc
APC Any Firmware Pri apcuser apc
Apple Network Assistant 3.X None xyzzy
Apple Airport 1.1 none public
Arrowpoint any? admin system
Ascend All TAOS models all admin Ascend
Ascend Pipeline Terminal Server answer
Ascom Timeplex Routers Any See notes
AT&T Starlan SmartHUB 9.9 N/A manager
AWARD Any BIOS AWARD_SW
Axent NetProwler manager WinNT administrator admin
Axis NPS 530 5.02 root pass
AXIS StorPoint CD100 4.28 root pass
AXIS 200 V1.32 admin
Axis 2100 Network Camera Linux (ETRAX root pass
bay cv1001003
bay
Bay
Bay / Nortel ARN 13.20 Manager (caps count !)
Bay Network Routers All User
Bay Networks ASN / ARN Routers Any Manager Manager
Bay Networks Baystack NetICs
Bay/Nortel Networks Accelar 1xxx switches Any rwa rwa
Bay/Nortel Networks Remote Annex 2000 Any admin IP address
BEA Weblogic 5.1 system weblogic
BEA
bewan
Bintec all Routers Any admin bintec
Bintec
Biodata BIGfire & BIGfire+ all biodata
Biodata all Babylon-Boxes all Babylon
Borland interbase
Borland Interbase Any politcally correct
Borland/Inprise Interbase any SYSDBA masterkey
BreezeCom AP10, SA10 BreezeNET PR
BreezeCOM Station Adapter and Access Point 4.x Super
BreezeCOM 3.x Master
BreezeCOM Station Adapter and Access Point 2.x laflaf
Brocade Silkworm admin password
Buffalo/MELCO AirStation WLA-L11 root (cannot be changed) (no password by default)
Cabletron any any
Cabletron NB Series Any inuvik49
Cabletron routers and switches * * blank blank
Cayman 3220-H DSL Router GatorSurf 5. Any
celerity
Chase Research Iolan+ iolan
Cisco Any Router and Switch 10 thru 12 cisco cisco
Cisco ConfigMaker Software any? n/a cmaker
CISCO Network Registrar 3.0 ADMIN changeme
CISCO N/A N/A pixadmin pixadmin
Cisco routers Not sure…j san-fran
Cisco VPN 3000 Concentrator admin admin
Cisco Net Ranger 2.2.1 Sol 5.6 root attack
cisco 1600 12.05
cisco 1601
cisco
cisco
Cisco MGX * superuser superuser
cisco 1601
cisco
Cisco
cisco
Cisco any aany IOS no default login no default password
CISCO arrowpoint
cisco
cisco
cisco
Cisco 2503
Cisco
cisco
Cisco IDS (netranger) root attack
cisco
cisco 1600
CMOS BIOS ESSEX or IPC
Cobalt RaQ * Qube* Any admin admin
Com21
Comersus Shopping Cart 3.2 Win 95/98/NT admin dmr99
Compaq Insight Manager Administrator administrator
Compaq Insight Manager operator operator
Compaq Management Agents All administrator none
compaq
copper mountain
Coppercom
Coyote-Point Equaliser 4 Free BSD eqadmin – Serial port only equalizer
Coyote-Point Equaliser 4 Free BSD root – Serial port only
Coyote-Point Equaliser 4 Free BSD look – Web Browser only (Read a look
Coyote-Point Equaliser 4 Free BSD touch – Web Browser only (Write touch
Cyclades MP/RT super surt
D-Link DI-704 admin
D-Link DI-701 2.22 (?)
Dell PowerVault 50F WindRiver (E root calvin
Dell PowerVault 35F root calvin
Dell Powerapp Web 100 Linux RedHat 6.2 root powerapp
dell
Digiboard Portserver 8 & 16 any root dbps
DLink DI-206 ISDN router 1.* Admin Admin
Dlink Dl-106 ISDN router 1234
DLink DL-701 Cable/DSL Gateway/Firewall year2000
Dlink DFE-538TX 10/100 Adapter Windows 98
dlink di704 admin
DLink DI 106 winnt administrator @*nigU^D.ha,;
Dupont Digital Water Proofer Sun Sparc any root par0t
eci
Efficient
Elron Firewall 2.5c hostname/ip address sysadmin
emai hotmail
Ericsson ACC netman netman
Ericsson (formerly ACC) Any router all netman netman
Extended Systems ExtendNet 4000 / Firewall all Versions admin admin
Extended Systems Print Servers admin extendnet
Extreme All Summits admin
extreme black diamond
Extreme All All Admin
Flowpoint 144, 2200 DSL Routers ALL password
FlowPoint 144, 2200 DSL Routers ALL admin
Flowpoint 2200 Serial Num
Flowpoint 2200 Serial Num
fore
Fore Systems ASX 1000/1200 6.x ami
Foundry Networks ServerIronXL Any
fujitsu l460
Future Networks FN 110C Docsis cablemodem Any
gatway solo9100 win95
General Instruments SB2100D Cable Modem test test
gonet fast abd234
Hewlett Packard HP Jetdirect (All Models) Any none none
Hewlett Packard MPE-XL HELLO MANAGER.SYS
Hewlett Packard MPE-XL HELLO MGR.SYS
Hewlett Packard MPE-XL HELLO FIELD.SUPPORT
Hewlett Packard MPE-XL MGR CAROLIAN
Hewlett Packard MPE-XL MGR CCC
Hewlett Packard MPE-XL OPERATOR COGNOS
Hewlett Packard MPE-XL MANAGER HPOFFICE
hp 4150
hp
IBM AS/400 qsecofr qsecofr
IBM AS/400 qsysopr qsysopr
IBM AS/400 qpgmr qpgmr
IBM NetCommerce PRO 3.2 ncadmin ncadmin
IBM LAN Server / OS/2 2.1, 3.0, 4. username password
IBM 2210 RIP def trade
IBM DB2 WinNT db2admin db2admin
IBM Lotus Domino Go WebServer (net.commerce edition) ANY ? webadmin webibm
IBM AS400 Any QSECOFR QSECOFR
IBM RS/6000 AIX root ibm
IBM OS/400 QSECOFR QSECOFR
IBM AS400 QSRVBAS QSRVBAS
IBM AS400 QSRV QSRV
ibm as400
IBM AS/400 OS/400 QUSER QUSER
IBM AS/400
IBM ra6000 AIX Unix
IBM AIX
Imperia Software Imperia Content Managment System Unix/NT superuser superuser
Intel 510T Any admin
Intel All Routers All Versions babbit
Intel All Routers All Versions babbit
Intel Intel PRO/Wireless 2011 Wireless LAN Access Point Any Intel
Intel wireless lan access Point comcomcom
Ipswitch Whats up Gold 6.0 Windows 9x a admin admin
janta sales 254 compaq janta sales janta211
janta sales 254 compaq janta sales janta211
Jetform Jetform_design Jetform
Kawa
LANCAST
Lantronix LPS1-T Print Server j11-16 any system
Lantronix MSS100, MSSVIA, UDS10 Any system
Lantronix LSB4 any any system
Lantronix Printer and terminalservers system
LGIC Goldstream 2.5.1 LR-ISDN LR-ISDN
Linkou School bill bill
Linkou School bill bill
Linksys Cable/DSL router Any admin
Linksys BEFSR7(1) OR (4) Standalone R blank admin
linksys
Linksys BEFSR41 (blank) admin
Livingston Livingston_portmaster2/3 !root blank
Livingston Livingston_officerouter !root blank
Lucent Portmaster 2 !root none
Lucent Cajun Family root root
lucent Portmaster 3 unknown !root !ishtar
Lucent Packetstar (PSAX) readwrite lucenttech1
Lucent AP-1000 public public
lucent dsl
lucent
macromedia freehand 9
MacSense X-Router Pro admin admin
mcafee
microcom hdms unknowen system hdms
Micron bios
Microrouter (Cisco) Any Any letmein
Microrouter (Cisco) Any Any letmein
Microsoft Windows NT All Administrator
Microsoft Windows NT All Guest
Microsoft Windows NT All Mail
Microsoft SQL Server sa
Microsoft Windows NT 4.0 pkoolt pkooltPS
Microsoft NT start
MICROSOFT NT 4.0 free user user
Microsoft Windows NT 4.0 admin admin
MICROSOFT NT 4.0 free user user
Microsoft
microsoft
Microsoft Ms proxy 2.0
microsoft
mICROSOFT
Microsoft Key Managment Server Windows NT 4 password
Microsoft
Motorola Motorola-Cablerouter cablecom router
Motorola Motorola-Cablerouter cablecom router
motorola cyber surfer
msdloto msdloto
msdloto
Multi-Tech RASExpress Server 5.30a guest none
Nanoteq NetSeq firewall * admin NetSeq
NetApp NetCache any admin NetCache
Netgaer RH328 1234
Netgear RH348 1234
Netgear ISDN-Router RH348 1234
Netgear RT311 Any Admin 1234
Netgear RT314 Any Admin 1234
Netgear RT338 1234
Netgear RT311/RT314 admin 1234
netgear DG834G admin password
netlink rt314
Netopia R7100 4.6.2 admin admin
Netopia 455 v3.1
Netscreen NS-5, NS10, NS-100 2.0 netscreen netscreen
NeXT NeXTStep 3.3 me
Nokia – Telecom NZ M10 Telecom Telecom
Nortel Meridian 1 PBX OS Release 2 0000 0000
Nortel Contivity Extranet Switches 2.x admin setup
Nortel Norstar Modular ICS Any **ADMIN (**23646) ADMIN (23646)
Nortel Norstar Modular ICS Any **CONFIG (266344) CONFIG (266344)
Nortel Networks (Bay) Instant Internet Any
Northern Telecom(Nortel) Meridian 1 m1link
Novell NetWare Any guest
Novell NetWare any PRINT
Novell NetWare Any LASER
Novell NetWare Any HPLASER
Novell NetWare Any PRINTER
Novell NetWare Any LASERWRITER
Novell NetWare Any POST
Novell NetWare Any MAIL
Novell NetWare Any GATEWAY
Novell NetWare Any GATE
Novell NetWare Any ROUTER
Novell NetWare Any BACKUP
Novell NetWare Arcserve CHEY_ARCHSVR WONDERLAND
Novell NetWare Any WINDOWS_PASSTHRU
novell
ODS 1094 IS Chassis 4.x ods ods
Optivision Nac 3000 & 4000 any root mpegvideo
Oracle 8i 8.1.6 sys change_on_install
Oracle Internet Directory Service any cn=orcladmin welcome
Oracle 7 or later system manager
Oracle 7 or later sys change_on_install
Oracle 7 or later Any Scott Tiger
Oracle 8i all internal oracle
oracle
oracle
oracle co. Database engines every sys change_on_install
Osicom(Datacom) Osicom(Datacom) sysadm sysadm
Pandatel EMUX all admin admin
PlainTree Waveswitch 100 default.password
RapidStream RS4000-RS8000 Linux rsadmin rsadmin
realtek 8139
Remedy Any Any Demo
Research Machines Classroom Assistant Windows 95 manager changeme
Rodopi Rodopi billing software ‘AbacBill’ sql database rodopi rodopi
Samba SWAT Package Linux Any Local User Local User password
schoolgirl member ich hci
Securicor3NET Monet any manager friend
Securicor3NET Cezzanne any manager friend
SGI all all root n/a
SGI Embedded Support Partner IRIX 6.5.6 Administrator Partner
SGI IRIX ALL lp lp
SGI IRIX ALL OutOfBox, demos, guest, 4DGifts (none by default)
SGI IRIX ALL EZsetup
Shiva LanRover any? root
Shiva AccessPort Any hello hello
Shiva Any? Guest blank
SMC Barricade admin
soho nbg800 unknown admin 1234
Solaris
sonic wall any firewall device admin password
SonicWall Any Firewall Device admin password
SpeedStream
Spider Systems M250 / M250L hello
Sprint PCS SCH2000 see notes Menu – 8 – 0 (see notes) 040793
Ssangyoung SR2501 2501
Sun SunOS 4.1.4 root
Sun Solaris
surecom ep3501/3506 own os admin surecom
Symnatec
SysKonnect 6616 default.password
SysKonnect 6616 default.password
Tekelec Eagle STP eagle eagle
Telebit netblazer 3.* setup/snmp setup/nopasswd
Terayon TeraLink Getaway admin password
Terayon TeraLink 1000 Controller admin password
Terayon TeraLink 1000 Controller user password
Terayon TeraLink Getaway user password
terayon 6.29 admin nms
Terrayon
Titbas SCO haasadm lucy99
TopLayer AppSwitch 2500 Any siteadmin toplayer
Toshiba TR-650 V2.01.00 admin tr650
toshiba 480cdt
toshiba
TrendMicro ISVW (VirusWall) any admin admin
Trintech eAcquirer App/Data Servers t3admin Trintech
Ullu ka pattha Gand mara Gandoo Bhosda Lund
USR TOTALswitch Any none amber
Vina Technologies ConnectReach 3.6.2 (none) (none)
voy
WatchGuard FireBox 3-4.6 wg (touch password)
Webmin Webmin Any Unix/Lin admin
Webramp 410i etc… wradmin trancell
Win2000 Quick Time 4.0 Englisch
Windows 98 se 98 se
Wireless Inc. WaveNet 2458 n/a root rootpass
Xylan Omnistack 1032CF 3.2.8 admin password
Xylan Omnistack 4024 3.4.9 admin password
Xylan Omniswitch 3.1.8 admin switch
xyplex mx-16xx setpriv system
Zyxel ISDN-Router Prestige 1000 1234
zyxel prestige 300 series zynos 2.* 1234
Zyxel ISDN Router Prestige 100IH 1234
Zyxel prestige 300 series any
Zyxel prestige 600 series any
ZYXEL 641 ADSL 1234
Zyxel prestige 128 modem-router any 1234
Zyxel ISDN-Router Prestige 1000
Zyxel ISDN-Router Prestige 1000
zyxel

443 Block

I had an idea this morning. If you’re local or in the router, you could turn off 443. It’s human nature for people to do things insecurely just to get it to work out of frustration. By blocking SSL there is a very high chance they’ll just say URRGGGGG!! and  sign in over regular http and give up their credentials to your sniffer.