18 December, 2007

Book: Security Power Tools (2007)


A must read..I've just finished this book and I can say it is amazing for beginners and for experts in the security industry. Step by step setting and working with the most famous security tools in the world, comparison between tools, pros and cons and a lot more. Check it out ;)


by Bryan Burns (Author), Dave Killion (Author), Nicolas Beauchesne (Author), Eric Moret (Author), Julien Sobrier (Author), Michael Lynn (Author), Eric Markham (Author), Chris Iezzoni (Author), Philippe Biondi (Author), Jennifer Granick (Author), Steve Manzuik (Author), Paul Guersch (Author)

Editorial Reviews
Book Description
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.

Designed to be browsed, Security Power Tools offers you multiple approaches to network security via 23 cross-referenced chapters that review the best security tools on the planet for both black hat techniques and white hat defense tactics. It's a must-have reference for network administrators, engineers and consultants with tips, tricks, and how-to advice for an assortment of freeware and commercial tools, ranging from intermediate level command-line operations to advanced programming of self-hiding exploits.

Security Power Tools details best practices for:
  • Reconnaissance -- including tools for network scanning such as nmap; vulnerability scanning tools for Windows and Linux; LAN reconnaissance; tools to help with wireless reconnaissance; and custom packet generation
  • Penetration -- such as the Metasploit framework for automated penetration of remote computers; tools to find wireless networks; exploitation framework applications; and tricks and tools to manipulate shellcodes
  • Control -- including the configuration of several tools for use as backdoors; and a review of known rootkits for Windows and Linux
  • Defense -- including host-based firewalls; host hardening for Windows and Linux networks; communication security with ssh; email security and anti-malware; and device security testing
  • Monitoring -- such as tools to capture, and analyze packets; network monitoring with Honeyd and snort; and host monitoring of production servers for file changes
  • Discovery -- including The Forensic Toolkit, SysInternals and other popular forensic tools; application fuzzer and fuzzing techniques; and the art of binary reverse engineering using tools like Interactive Disassembler and Ollydbg
A practical and timely network security ethics chapter written by a Stanford University professor of law completes the suite of topics and makes this book a goldmine of security information. Save yourself a ton of headaches and be prepared for any network security dilemma with Security Power Tools.

Product Details
  • Paperback: 856 pages
  • Publisher: O'Reilly Media, Inc. (August 27, 2007)
  • Language: English
  • ISBN-10: 0596009631
  • ISBN-13: 978-0596009632
  • Product Dimensions: 9.2 x 7 x 2 inches


Link: Amazon

Fill your knowledge, read and learn. Peace.

11 December, 2007

Crestock Photography Contest 2007

My submitted photo for the 4th round of the contest:


Source: HERE and HERE

09 December, 2007

Camera Tripod 53-Inch with Bubble Level (Silver)

Finally, after years..preparing to buy some nice amateur tripod(stative) for my digital camera and digital camcorder...i recieve this:

Thanks to my lovely GF who i love very very much, she gave me this as a present and I was very positively surprised...Features:
  • Silver color with black accents
  • Aluminum frame
  • Quick-release platform
  • 3-way, 360-degree swivel panhead
  • Adjustable tilt controls
  • Adjustable pan controls
  • 90-degree vertical platform
  • Gear operated center column
  • 3-section aluminum legs with brace
  • Quick-release leg locks
  • Non-slip feet
  • Bubble level indicator
  • 3 mm standard tripod mount
  • 53-inch maximum height
  • Nylon Carry Case
  • requires Camera, digital camera, camcorder or digital camcorder with 3 mm standard tripod mount
On the box writes (feat/expl):

- Quick-Release Video/Photo Platform (Makes changing equipment easy)
- 3-Way, 360 Degree Swivel Panhead (For vertical format photography)
- 90 Degrees Vertical Platform (For more creative control)
- Gear Operated Center Column (For precise vertical positioning)
- Bubble Level Indicator (Helps you keep your tripod level)
- 3-Section Aluminium Legs With Brace (For maximum strength and stability)
- Quick-Release Leg Locks (For easy maneuverability)
- Non-Slip Feet (Keeps your tripod steady)

Made in China... \m/. Looks nice...haha, now I can make my "ghost" effects with ease :)))))

Peace.

Yo waddup

It's been awhile since I last posted on my blog, been finishing up a project that was expanded for 6 months and I had to react fast and there was simply no time for other activity, such as posting to blogs :P. In the past month, I transfered to another hosting regarding http://zeroscience.org (HostGator) and I have to finish this god damn site very soon...no time, you know how it is :)

Here's a short intro that was slightly changed on the premiere night from the project i worked on:



Short and simple... woot!

The Macedonian IT Forum (mk: Македонски ИТ форум) has surprised everyone of its growth and quality...go go http://www.it.com.mk...also, with the other admins and people that I work with, we're working hard on major projects regarding ICT infrastructure in Macedonia and beyond i hope :D

And here's some chill out atmo, playing with good old BBS system but this time in color, chatting with Aleks for fun ;)) It's has a nice interface, color terminal support (PuTTY) and cool soft: synchronet at http://www.synchro.net/



telnet 72.76.254.200 23 ;)

Cheers peeps.

09 October, 2007

Kaze To Desktop

"Kaze To Desktop" is a screensaver which moves according to the current wind (=Kaze) conditions of your city.




Source: http://scr.sc/products/kazetodesktop/

26 September, 2007

The Power Of Google's "Did you mean:"

All I wanted is to lookup something about Wachowsky bros. something about sex change bla bla who gives a shit...I'm showing here how Google Inc. is powerful with this feature. I typed intentionally something bizzare and look @ the results for yourselves.


coolio.

23 September, 2007

My Future Right Friend !!!

Love the design, love the colors, love the features = cool ! Ideazon™ presents me :P "Reaper Edge" Fall 2007 collection. Soon I'll have this baby...ain't sweet ?

* 3200 DPI maximum laser sensor
* Full Speed USB Interface: 1ms response time
* 20g Acceleration
* Max speed 45ips

* Sleek ergonomic design
* Upper and lower side thumb buttons
* Rubberized anti-slip grip
* Tire-traction rubber scroll wheel

* Illuminated, real time, on-the-fly DPI switching
* 5 distinct levels of DPI sensitivity (800, 1200, 1600, 2000, 3200)
* 5 fully programmable buttons
* Multi-profile management software
* Independant X- and Y- axis calibration

Official page: http://www.ideazon.com/us/products/reaperedge.asp

Thanks to PC Gamer (www.pcgamer.com) for the insight.

17 September, 2007

Zero Science Lab

I started to work on my homepage (zeroscience.org) and till the end of the month i hope i'll finish it... so back to work. cheers!

Link: http://www.zeroscience.org

26 July, 2007

CoolCon v0.01 Released



I just released my Cool Converter :P "CoolCon v0.01" written in C language, 837 lines of code with a nice interface and lots of features...

Conversion from Text to: Binary, Decimal, Octal, Hexadecimal, ASCII, ROT13(vice versa)
Conversion from Decimal to: Binary, Octal, Hexadecimal
Conversion from Binary to: Decimal, Octal, Hexadecimal

Included: ASCII table and Base64 table output

Working on CoolCon v0.02 with Base64 encode/decode, Vigenere encryption/decryption (used in cisco password encryption) and much more.

CoolCon v0.01 download link: http://packetstormsecurity.org/Win/CoolCon0.01.rar


Woot ! ;))

23 June, 2007

Still alive...

Just to say that I'm alive doing well...I'm caught up with C/C++ and ASM coding... No time what so ever for anything right now, so ;)) peace

02 May, 2007

Photoshop Session No.1

Dry jungle blood.

World of LiquidWorms.

26 April, 2007

HAKUNA MATATA


Hakuna Matata! What a wonderful phrase
Hakuna Matata! Ain't no passing craze

It means no worries for the rest of your days
It's our problem-free philosophy
Hakuna Matata!

Hakuna Matata?
Yeah. It's our motto!

What's a motto?
Nothing. What's a-motto with you?

Those two words will solve all your problems

That's right. Take Pumbaa here
Why, when he was a young warthog...

When I was a young wart hog

Very nice

Thanks

He found his aroma lacked a certain appeal
He could clear the savannah after every meal

I'm a sensitive soul though I seem thick-skinned
And it hurt that my friends never stood downwind
And oh, the shame He was ashamed
Thought of changin' my name What's in a name?
And I got downhearted How did ya feel?
Everytime that I...

Hey! Pumbaa! Not in front of the kids!
Oh. Sorry

Hakuna Matata! What a wonderful phrase
Hakuna Matata! Ain't no passing craze

It means no worries for the rest of your days

It's our problem-free philosophy
Hakuna Matata!
Hakuna Matata! Hakuna matata!
Hakuna Matata! Hakuna matata!
Hakuna Matata! Hakuna matata!
Hakuna Matata! Hakuna--

It means no worries for the rest of your days

It's our problem-free philosophy
Hakuna Matata!
(Repeats)

I say "Hakuna"

I say "Matata"

12 April, 2007

The First Information Technology Forum In Macedonia

Yep...The 1st forum in Macedonia dedicated to IT and everything about it..
I as an admin, am very thrilled that i can work with one of the best IT people on the forum. This is my first time to be an admin of a forum with such a large scale, but something tells me I'll be fine...
Going good so far, it started on 1st of April i think..and diden't have that so much time to blog about it, I was busy ;)
Step by step, uuuu baby :D

http://www.it.com.mk

19 March, 2007

Submiting to phenoelit.de

As I played with Nmap and SNMP the other day, I came across some EdgeLink 300 - Craft Shell router/device. I wanted to pen-test the device for weak user/passwords configurations so first i visited Phenoelit's default password list.
I searched for EdgeLink 300 and there was only EdgeLink 100 by the same vendor which is Telco Systems. So I decided to password guess the device and after 3.25 seconds :P I had a success. So I listed the commands and the network segments and all bunch of stuff and logout from the device. I wanted to submit this "break-through" to phenoelit.de and so I did, sent an e-mail to fx@phenoelit.de (Fixer) because the submit form wasn't nice to me (not working properly), with the info about the device and now I live in peace. Wheeew...
Thanks to Thricer for his big support, not letting me quit (zimi kur) and keep the good pen-testing work going.

14 March, 2007

Blog started...

I decided to start writing my blog as i surf through the net and watch that more and more people are into it so I'll give it a shot. I'm gonna write various things about my interests in IT world, experiences and half/full disclosures. So here goes...