Thursday, July 11, 2013
keylogging
I tried out many Windows keyloggers today, and was thoroughly disappointed in them all. They all installed as programs, with obvious names to boot. This made them very easy to detect. I was hoping to see one that was virtually undetectable, but none were. It's sad, because I can't practice looking out for the truly malicious ones that get installed. Ah well, maybe those don't exist. ;)
youtube-mp3.org
A German interested in computer science named Philip Matesanz owns the url http://www.youtube-mp3.org. This site allows users to type the url of a video posted to youtube.com and have the audio ripped and downloaded so you can listen to it offline. This site, like the spitting of the atom has legitimate purposes, but most know the atom followed by an "-ic bomb" like most know these sites for illegally copying and using copyrighted material without paying for a license to listen to it. This practice is not morally correct, but it is hard to stop those using it illegitimately without infringing upon the rights of those who do.
Tuesday, July 9, 2013
Friday, July 5, 2013
JPS is mean.
JPS is a windows executable that can do many things. Some are silly, like crazy mouse, while others render the system completely inoperable, like a check-box for disabling the registry. Pretty crazy stuff! Fortunately on your computer you have anti-virus software, right?
Thursday, July 4, 2013
Happy 4th of July!
Hping3 is a magnificent tool. It crafts custom TCP/IP packets for various functions including a DOS attack. Companies without constant alert programs could find that their programs designed for sniffing traffic quickly run out of memory, or, if given more time, their hard drive is filled up, and can log no further intrusions. I also learned about session hijacking programs, and was reminded of the importance of the https protocol. Any simple http request is sent in plain-text with no verification of authenticity. I changed a Google search request on a client computer with a man-in-the-middle attack. Now, with the encrypted version of that search, I can either not know what is going on, due to encryption, or decrypt and change it. However, I cannot re-encrypt it and pretend to be Google, so the client knew that the page was not actually from Google, and detected my hijack. At my school, the proxy server they use to censor the Internet for students does have ssl certificates for the computers to use, but my school doesn't implement them, which has taught their students to ignore these critical ssl warnings! --Though, on some level I do appreciate that they did that, for my own purposes ;)
Wednesday, July 3, 2013
Zenmap vs. nmap
Zenmap and nmap have few differences. Nmap is a text based network scanning tool. Zenmap itself is merely a gui that makes the process of creating nmap commands easier, as the user does not need to remember every switch. Then it executes the command and logs the information discovered, like what hosts are on the network, and what ports these hosts have open. This makes Zenmap easier to use. However, those who use nmap often would most likely consider it better, as it is usually faster to type out commands than to navigate menus.
Tuesday, July 2, 2013
Subscribe to:
Posts (Atom)