While reading an interesting Blog I discovered a new treasure: TRESOR, in short TRESOR is a secure implementation of AES which is resistant against cold boot attacks and other attacks on main memory. If like me you wonder what a cold boot attack is, Princeton University can help us : Contrary to popular assumption, DRAMs […]
Article by Giuseppe Sanna One of the most important things for eveybody is undoubtedly the security ! Sure, the software can be reinstalled, the hardware can be bought back … But your information? Those can not be re-installed or repurchased. In the event of a crash … you could lost all forever! For this reason, […]
I’ve already talked about fail2ban and logcheck, 2 tools that can scan your logs and do actions, based on rules that you can give/modify, usually modify your iptables rules to stop active attacks against your server or simply send you a warning if some thing is found in the logs. Today we’ll see a similar […]
Article by James Hawkins This is the second part of our guide on Nmap, you can find the first part here, in this part of the tutorial we’ll see other configurations that you can use with Nmap to avoid firewalls or debug the information obtained.
Article by James Hawkins As we all know, Nmap (Network Mapper) is a stealth port scanner widely used by network security experts (including forensics & Pen-testing Experts). In this article we’ll see the different types of Nmap Scans, its techniques, understanding the purpose and goals of each scan , its advantages or disadvantages over other […]