Stephen Reese

All Categories for Stephen Reese

Network Traffic Capture in Virtual Enviroments

Detecting Tor traffic with Bro network traffic analyzer

Online Information Security Analysis Tools and Resources

Building Apache and ModSecurity from source

Detecting Tor network traffic with YaF and Python

Detecting Tor network traffic with SiLK

Passive DNS collection and analysis using YaF and Mediator

Running Moloch

Running SnortAD

Mailing Lists

Podcasts

Decoding XOR payload using first few bytes as key

Block Command and Control requests using ASA 5500

Amazon S3 Server-Side Encryption using GSUtil

Block IRC and other communications with McAfee VirusScan

Variance in rwfilter results from netflow v5 and YaF

Configure YAF on Linux for NetFlow collection from a network tap or SPAN

Configure SiLK on Linux for NetFlow collection from a Cisco router

Running NIX Retina and Nessus vulnerability scans with least privileges

Blocking evil with the Enhanced Mitigation Experience Toolkit EMET

Insecure Library Loading Could Allow Remote Code Execution

Keeping your hardware safe and avoiding the evil maid

A few tools that may help rid of malware

A few simple computing tips

TrueCrypt on my Dell notebook

Using metasploit to pwn MS06-067

Erase slack space on Microsoft Vista

Encrypting a secondary drive (PGP or TrueCrypt)

SQL injection attack on a PostgreSQL database (t_jiaozhu)

Running UAC and some other tricks to keep your computer running smoothly

Using Common Sense to Secure your Information

Botnets that make money but at whos expense

New phishing techniques to fool online users