gofccyourself.com

FCC Docket 17-108

If you want to submit a comment to the FCC, click on http://gofccyourself.com. In the center of the page under the heading “Proceedings,” it says
17-108 Restoring Internet Freedom +New Filing/+Express

Click on the link labeled “+Express” and file your comment there.

In the top box type 17-108
The second box, your name.
Then fill in and comment to submit.

Please take this seriously folks!

Read More

Hacking wireless howto

Learn how to hack your wifi in this free pdf download.
Hacking wireless presentation (pdf)

Read More

Level up your programming skills

Exercism
Are you a code newbie?

The solutions you write provide reviewers with clues about what you haven’t grasped yet. The feedback you receive will guide you to relevant study topics and dramatically increase the ease with which you write code.

“Using Exercism requires three tools:

Your text editor: Write a solution to an exercise using your favorite text editor.
Your command line interface: Fetch problems and submit solutions via the command line (or terminal).
The exercism.io website: Review feedback on your solution and discuss it with other learners on the website.
For each exercise that you do, you’ll go through the same basic steps.

Fetch the exercise using the command line.
Write code to solve the exercise on your own computer, satisfying each of the tests.
Submit your solutio...

Read More

Graphical Network Simulator – GNS3

GNS3 – Graphical Network Simulator

“GNS3 is a graphical network simulator which provides you a real lab environment for learning and testing complex networks. With this tool you do not need to have dedicated network hardware devices. You can design and configure virtual networks on a traditional PC or a Raspberry Pi, and simulate in the closest possible way to how the real networks perform.

If you want to design and test your automation system network, GNS3 can just work fine for you. It allows you to run many virtual hosts with operating systems such as Linux, Windows, MacOS X or FreeBSD.”

GNS3 – Documentation and Download
Pankaj V.- Electronics For U – Full article

Read More

There’s now a tool to test for NSA spyware

A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant

“Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

Luke Jennings of security firm Countercept wrote a script in response to last week’s high-profile leak of cyberweapons that some researchers believe are from the U.S. National Security Agency. It’s designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.”

Full article

Read More

Do you have what it takes to ‘Hack the Air Force’?

Hack the Air Force!

“SAN FRANCISCO (AFNS) — The Air Force is inviting vetted computer security specialists from across the U.S. and select partner nations to do their best to hack some of its key public websites.

The initiative is part of the Cyber Secure campaign sponsored by the Air Force’s Chief Information Officer as a measure to further operationalize the domain and leverage talent from both within and outside the Defense Department.

The event expands on the DOD ‘Hack the Pentagon’ bug bounty program by broadening the participation pool from U.S. citizens to include “white hat” hackers from the United Kingdom, Canada, Australia and New Zealand.

“This outside approach–drawing on the talent and expertise of our citizens and partner-nation citizens–in identifying our security...

Read More

Got one of these 20+ models of Linksys Smart Wi-Fi routers? Bad news.

20 Linksys models affected with 10 security holes.

Linksys is working on a firmware update for 10 security vulnerabilities affecting its “Smart” Wi-Fi series of routers.

Here’s a list of the vulnerable models:

EA2700
EA2750
EA3500
EA4500v3
EA6100
EA6200
EA6300
EA6350v2
EA6350v3
EA6400
EA6500
EA6700
EA6900
EA7300
EA7400
EA7500
EA8300
EA8500
EA9200
EA9400
EA9500
WRT1200AC
WRT1900AC
WRT1900ACS
WRT3200ACM

Read More

Neofetch

“Neofetch is a CLI system information tool written in BASH. Neofetch displays information about your system next to an image, your OS logo, or any ASCII file of your choice. The main purpose of Neofetch is to be used in screenshots to show other users what OS/Distro you’re running, what Theme/Icons you’re using etc.

Neofetch is highly customizable through the use of command line flags or the user config file. There are over 50 config options to mess around with and there’s the print_info() function and friends which let you add your own custom info.

Neofetch can be used on any OS that has BASH 3.2+, it’s just a matter of adding support. If your OS/Distro isn’t in the list below, feel free to open an issue on the repo and I’ll gladly add support...

Read More

Cybrary Metasploit course

Cybrary Free Metasploit course
“The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.”

Metasploitable – Sourceforge – Attackable sandbox.
Metasploit web page

Read More

Kali Linux 2017.1 Release

“Finally, it’s here! We’re happy to announce the availability of the Kali Linux 2017.1 rolling release, which brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packages, an updated kernel that provides more and better hardware support, as well as a slew of updated tools – but this release has a few more surprises up its sleeve.”

Kali Linux 2017.1

Read More