Quantcast
Channel: All Posts - Malicious Link - Blog by mubix - Rob Fuller
Browsing all 1156 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Metasploit

Update to post: Metasploit Heart’s Microsoft Ok, so many people had issues with the Vimeo video, that I posted it to youtube in hopes that you’ll be able to play it all the way through. I still have no...

View Article


Image may be NSFW.
Clik here to view.

OzymanDNS - Tunneling SSH over DNS

Hak5 Episode 504 Shownotes (In the episode I say that it’s cross platform, use the release links for the Windows binaries to get it working on windows or use cygwin) DISCLAIMER - I IN NO WAY ENDORSE...

View Article


Image may be NSFW.
Clik here to view.

The Ethics of Teaching Hacking

My recent post “OzymanDNS - Tunneling SSH over DNS” caused a good friend, and someone I highly respect in the information security field, Dave Hull from Trusted Signal, to call me out on the ethics of...

View Article

Image may be NSFW.
Clik here to view.

AnonymASS - Hiding Behind The Tubes

First I wanted to say, sorry for this and the last installment of Room362 being non-technical. They are topics that I feel strongly about and so felt impelled to share.One of the biggest problems in...

View Article

Image may be NSFW.
Clik here to view.

Manager Training Camp - Bootcamp Style

Last Friday (March 6th, 2009) I posed the question above. What I got in return was nothing short of amazing, and to tell you the truth, it amazed me how the tally rounded out. I categorized the answers...

View Article


Image may be NSFW.
Clik here to view.

Kindle 2 Review: Putting The Fire Out

Now, before you get all huffy about the title, it’s not what you think. Keep reading: It’s been 20 days since I received my Kindle 2 (word of warning, NEVER use USPS. Spend the money; it’s not worth...

View Article

Image may be NSFW.
Clik here to view.

Couch to Career in 80 hours or less

DojoSec Monthly Briefings - April 2009 - Rob Fuller (mubix) from Marcus J. Carey on Vimeo.

View Article

Image may be NSFW.
Clik here to view.

RSA Photos

Stolen from: http://www.flickr.com/photos/31513605@N05/

View Article


Image may be NSFW.
Clik here to view.

Offensive Security Live Courses for 2009

I highly recommend both of these courses, and the chance to get in front of the instructors and ask questions live is worth it IMHO. So bang on those manager doors and work it out, because seats fill...

View Article


Image may be NSFW.
Clik here to view.

Workshop at ToorCamp with Dark0perator

Dark0perator and I will be giving a workshop at ToorCamp coming up July 2nd-5th: You can find us on the ToorCamp site: http://www.toorcamp.org/content/W13 Here is the description of our talk, save the...

View Article

Image may be NSFW.
Clik here to view.

Couch to Career - Follow up

First of all, here is my slide deck from DojoSec with a couple added slides, words, and slight modifications: From Couch To Career In 80 Hours from Rob Fuller I have put this article off quite a few...

View Article

Image may be NSFW.
Clik here to view.

Getting your fill of Security

I recently posted a blog post to Exotic Liability’s website with the same title, and I realized that it would make a great thing to post to here, and update regularly, or just put it on the wiki I keep...

View Article

Image may be NSFW.
Clik here to view.

PassiveX fun with Metasploit

I posted this walkthrough to the Metasploit mailing list, but thought that it would serve well here as well. Especially with the recent iPhone 3.0 “Special” download spam I recently received. The...

View Article


Image may be NSFW.
Clik here to view.

Rant Back – ValSmith

Val Smith recently wrote a post on the new Attack Research / carnal0wnage blog titled: ”Security Conferences, pen tests and incident response” Here are my thoughts on what he wrote: In paragraphs 2-6...

View Article

Image may be NSFW.
Clik here to view.

Getting your fill of Reverse Engineering and Malware Analysis

Matt, from the Exotic Liability forums, posed a suggestion for a episode: “Getting started [in] reverse engineering hardware drivers?”. I thought this was an interesting topic to attack so, I dug a bit...

View Article


Image may be NSFW.
Clik here to view.

Security Tools I'm Looking For Part I

There are a lot of tools that I find in my endeavors would be really helpful, but can’t find on the net for whatever reason. A portable version of of tshark that has ARP spoofing capabilities. I want...

View Article

Image may be NSFW.
Clik here to view.

Metasploit Framework as a Payload

Well, sorta… I created a meterpreter script that takes the cygwin bundled version of Metasploit inside of a NullSoft installer that HD Moore created and deploys it using meterpreter to the compromised...

View Article


Image may be NSFW.
Clik here to view.

Local Security - DC-NoVA-MD

Looking for local events? I’ve gotten a lot of people asking me recently where the local events are in DC, and I almost every time turn them to the awesome http://www.novainfosecportal.com/ which is...

View Article

Image may be NSFW.
Clik here to view.

Sexism and the religion of hackers

Let me preempt this post with the following facts: I am a white male veteran with amazing parents. I went to a good school, and was never under-valued by the people I cared about. I fit no minority...

View Article

Image may be NSFW.
Clik here to view.

Lies

When I was in middle school, I told a lie. I was so good at telling lies, and remembering even the infinite details of these lies that I could make them believable. Later in life, I learned that this...

View Article
Browsing all 1156 articles
Browse latest View live