Monthly Archives April 2017

Graphical Network Simulator – GNS3

GNS3 – Graphical Network Simulator

“GNS3 is a graphical network simulator which provides you a real lab environment for learning and testing complex networks. With this tool you do not need to have dedicated network hardware devices. You can design and configure virtual networks on a traditional PC or a Raspberry Pi, and simulate in the closest possible way to how the real networks perform.

If you want to design and test your automation system network, GNS3 can just work fine for you. It allows you to run many virtual hosts with operating systems such as Linux, Windows, MacOS X or FreeBSD.”

GNS3 – Documentation and Download
Pankaj V.- Electronics For U – Full article

Read More

There’s now a tool to test for NSA spyware

A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant

“Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

Luke Jennings of security firm Countercept wrote a script in response to last week’s high-profile leak of cyberweapons that some researchers believe are from the U.S. National Security Agency. It’s designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.”

Full article

Read More

Do you have what it takes to ‘Hack the Air Force’?

Hack the Air Force!

“SAN FRANCISCO (AFNS) — The Air Force is inviting vetted computer security specialists from across the U.S. and select partner nations to do their best to hack some of its key public websites.

The initiative is part of the Cyber Secure campaign sponsored by the Air Force’s Chief Information Officer as a measure to further operationalize the domain and leverage talent from both within and outside the Defense Department.

The event expands on the DOD ‘Hack the Pentagon’ bug bounty program by broadening the participation pool from U.S. citizens to include “white hat” hackers from the United Kingdom, Canada, Australia and New Zealand.

“This outside approach–drawing on the talent and expertise of our citizens and partner-nation citizens–in identifying our security...

Read More

Got one of these 20+ models of Linksys Smart Wi-Fi routers? Bad news.

20 Linksys models affected with 10 security holes.

Linksys is working on a firmware update for 10 security vulnerabilities affecting its “Smart” Wi-Fi series of routers.

Here’s a list of the vulnerable models:

EA2700
EA2750
EA3500
EA4500v3
EA6100
EA6200
EA6300
EA6350v2
EA6350v3
EA6400
EA6500
EA6700
EA6900
EA7300
EA7400
EA7500
EA8300
EA8500
EA9200
EA9400
EA9500
WRT1200AC
WRT1900AC
WRT1900ACS
WRT3200ACM

Read More

Neofetch

“Neofetch is a CLI system information tool written in BASH. Neofetch displays information about your system next to an image, your OS logo, or any ASCII file of your choice. The main purpose of Neofetch is to be used in screenshots to show other users what OS/Distro you’re running, what Theme/Icons you’re using etc.

Neofetch is highly customizable through the use of command line flags or the user config file. There are over 50 config options to mess around with and there’s the print_info() function and friends which let you add your own custom info.

Neofetch can be used on any OS that has BASH 3.2+, it’s just a matter of adding support. If your OS/Distro isn’t in the list below, feel free to open an issue on the repo and I’ll gladly add support...

Read More

Cybrary Metasploit course

Cybrary Free Metasploit course
“The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.”

Metasploitable – Sourceforge – Attackable sandbox.
Metasploit web page

Read More

Kali Linux 2017.1 Release

“Finally, it’s here! We’re happy to announce the availability of the Kali Linux 2017.1 rolling release, which brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packages, an updated kernel that provides more and better hardware support, as well as a slew of updated tools – but this release has a few more surprises up its sleeve.”

Kali Linux 2017.1

Read More

Forums are open!

Register now on the Linux Militia Forums
Come chat, share ideas and get help! Build a community of friends and associates!

We are building a community and can’t do it without you guys! Join our CTF team and discord! Message or comment for details. Or hit up Linux Militia on Facebook and drop us a line!

Read More

CTF Challenge and team

Linux Militia has a CTF team forming
CTF Time – Competitive CTF (Team) (message for invite)
CTF Linux Militia team
CTF Learn – Individual challenges and learning portal
Join our team and join our Discord server! (Send message for login approval).

Join our team and join our Discord server! (Sent message for login approval).

In computer security, Capture the Flag (CTF) is a computer security competition. CTF contests are usually designed to serve as an educational exercise to give participants experience in securing a machine, as well as conducting and reacting to the sort of attacks found in the real world...

Read More

CyberTalkRadio

Weekly discussion on internet and computer security with Bret Piatt. Find it here – CyberTalkRadio and don’t forget to hit the Archives as well. They are on iHeart radio, News Radio WOAI 1200 (San Antonio, Texas) (@Saturdays from 11:00 P.M. to Midnight on 1200 WOAI), Twitter @cybertalkradio, and Youtube!

Read More