Recent content by infosecwriter

  1. I

    Conferences (2008)?

    thanks for the list Complete
  2. I

    Questions about certification

    I have and I work with ISC2 as a SME. I am a professional hacker (pen tester, red team expert). There are many names. "hacker" isn't a bad term. It is only "marketed" as evil by those that like to throw around hot keywords to sell their point. If you think that the term "hacking" is bad...
  3. I

    Wireless Access Point defense has a great project for WPA rainbow tables. The key could be 25 characters, but if it's a basic phrase it may still be vulnerable. If it has the makings of a "secure" password, you are right... it is near impossible at the moment. It doesn't really matter how long a WEP key...
  4. I

    Does ISP usually log incoming connections to hosts?

    Anything can be hacked given the right time and resources. As for logs. Yes they do, but you might have to get a lawyer to give the request. ISPs do not work well with others. Smaller ISPs do not work well, ... They may not keep logs or may have "issues" with the reliability of the...
  5. I

    Questions about certification

    lots of people knee jerk at my resume and I usually get on the top of the list. I think that is a good thing. ;) Hacking and forensics are the the worlds I focus in so if it wasn't on my resume, I would be getting the wrong jobs. IMHO, they should put reverse engineering software on...
  6. I

    Questions about certification

    ddow "Yes. CCE most helpful. CHFI is OK but I wouldn't put it on the resume, it's for knowledge only" why? it's a very hard test on v3. it has also added value to my resume. granted, it's burried amongst many others, but at the minimum it hits HR resume keyword searches. "I'd get a couple...
  7. I

    Questions about certification

    1) Would obtaining a certification now be particularly helpful in my career search? very 2) What are the differences between the certifications? (For example, does CHFI focus more on network intrusion/attack/etc. investigations than the CCE?) cce does not cover network intrusion/attack/etc...
  8. I

    Msc Dissertation Ideas

    how about develop a process for statistical analysis of flesh tones in images. Lots of resources to choose from and the community can use a decent application in this space.
  9. I

    Email inside pcap file

    Elisa You are right about multiple POP connections being held in different streams. But the entire conversation with the loggin through disconnect will be in the stream. This is everything the mail client sees. This includes the entire email including attachments. I like using it because I...
  10. I

    Email inside pcap file

    depending on the type of email you are trying to get out of the pcap file and what program dumped it. For example if you are able to view it in wireshark, just use the filter 'POP' (this will list all the pop protocol commands including password) 'ip contains ""' (this will...
  11. I

    Wireless Access Point defense

    PreferredUser Firewall software means nothing. An exploit or race condition can disable the local firewall. Account access is important unless there is no password or the target uses the same password for everything... I sniff networks and grab passwords (red teaming). I attempt to use the...
  12. I

    Wireless Access Point defense

    Truth is, WiFi is easy to hack even if it wasn't open. For example, I can crack WEP in less then 10 minutes. Once this is done, I can start an ARP poison attack and hijack all the traffic including encrypted traffic (all your passwords are belong to me). I can boot up Paros Proxy and inject a...
  13. I

    Protect from Denial of Service Attack?

    In truth, the best way to protect yourself is to keep your head low and don't tick off a hacking group... ;) I know several groups that are always looking for something to do. Patches are good, but unless you are Microsoft or Google and can afford the extra resources, there is no real protection.
  14. I

    DoD Clearance

    Get a job with a government contracting company or a government job. They give you the need to know and sponsor the clearance.
  15. I

    Protect from Denial of Service Attack?

    Keep patched. this will protect you from DoS attacks. DDoS attacks are a little different. Depending on if it is malformed packets or just basic resource starvation (full connect()), there are different solutions. Stay patched, block bad traffic, and distribute the server through a...

About us

  • Our community began in 2004. Since this time, we have grown to have over 29,000+ members within the DFIR & Cyber Security community.

    We are happy to announce that this forum is now under new ownership with the goal to once again become the main Digital Forensics Forum on the internet for DFIR, OSINT and Cyber Security.

    If you can think of ways to help us improve, please let us know.

    We pride ourselves on offering unbiased, critical discussion among people of all different backgrounds.

    We are working every day to make sure our community is one of the best.

Quick Navigation

User Menu