Browse Source

More stuff.

pull/4/head
Robert 7 years ago
parent
commit
a8d52158dc
128 changed files with 948 additions and 179 deletions
  1. +136
    -0
      Draft/Draft/Anonymity Opsec Privacy.md
  2. +0
    -108
      Draft/Draft/Anonymity Opsec stuff.md
  3. +6
    -0
      Draft/Draft/Anti-Forensics/Anti-Forensics & Anti-Anti-Forensics – Michael Notes.rtf
  4. +6
    -0
      Draft/Draft/Building A Pentest Lab/Lab Buffer Overflows Notes.rtf
  5. +1
    -0
      Draft/Draft/CTFs & Wargames.md
  6. +6
    -0
      Draft/Draft/Common CLI CMD Refs/Curl Notes.rtf
  7. +6
    -0
      Draft/Draft/Common CLI CMD Refs/Ncat Notes.rtf
  8. +6
    -0
      Draft/Draft/Common CLI CMD Refs/Nmap Notes.rtf
  9. +6
    -0
      Draft/Draft/Common CLI CMD Refs/TCPDump Notes.rtf
  10. +6
    -0
      Draft/Draft/Common CLI CMD Refs/ToDO Notes.rtf
  11. +6
    -0
      Draft/Draft/Cryptography & Encryption/Linux Systems Notes.rtf
  12. +6
    -0
      Draft/Draft/Cryptography & Encryption/Vids Papers Blogposts Notes.rtf
  13. +6
    -0
      Draft/Draft/Cryptography & Encryption/cull Notes.rtf
  14. +6
    -0
      Draft/Draft/Darknets.md
  15. +6
    -0
      Draft/Draft/Exploit Development/Lab for Practicing Exploit Writing Notes.rtf
  16. +2
    -1
      Draft/Draft/Forensics Incident Response.md
  17. +6
    -0
      Draft/Draft/Forensics Incident Response/add cull Notes.rtf
  18. +2
    -1
      Draft/Draft/Forensics Incident Response/add cull.txt
  19. +6
    -0
      Draft/Draft/Frameworks/Metasploit Reference Notes.rtf
  20. +6
    -0
      Draft/Draft/Frameworks/Meterpreter Scripts and Description Notes.rtf
  21. +6
    -0
      Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Discovery & Probing Notes.rtf
  22. +6
    -0
      Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Enumeration Notes.rtf
  23. +6
    -0
      Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Network Footprinting Notes.rtf
  24. +6
    -0
      Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/PTES - Penetration Testing Execution Standard Notes.rtf
  25. +6
    -0
      Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Password Cracking Notes.rtf
  26. +6
    -0
      Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Penetration Notes.rtf
  27. +6
    -0
      Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/VoIP Security Notes.rtf
  28. +6
    -0
      Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Vulnerability Assessment Notes.rtf
  29. +6
    -0
      Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Wireless Penetration Notes.rtf
  30. +6
    -0
      Draft/Draft/Frameworks/Post Exploitation with Metasploit Notes.rtf
  31. +2
    -1
      Draft/Draft/Interesting Things.md
  32. +6
    -0
      Draft/Draft/Interesting Things/Writeup of Gamma Group Hack Notes.rtf
  33. +22
    -1
      Draft/Draft/Lockpicking.md
  34. +12
    -0
      Draft/Draft/Logging.md
  35. +5
    -0
      Draft/Draft/Malware.md
  36. +6
    -0
      Draft/Draft/Network Reconnaissance&Enumeration/Getting Busy at the Command Line Notes.rtf
  37. +6
    -0
      Draft/Draft/Network Reconnaissance&Enumeration/Misc Links Notes.rtf
  38. +6
    -0
      Draft/Draft/Network Reconnaissance&Enumeration/Network Reconnaissance&Enumeration Notes.rtf
  39. +6
    -0
      Draft/Draft/Network Reconnaissance&Enumeration/Nmap Cheat Sheet Notes.rtf
  40. +6
    -0
      Draft/Draft/Network Reconnaissance&Enumeration/PTES Methodology Notes.rtf
  41. +6
    -0
      Draft/Draft/Network Reconnaissance&Enumeration/Passive Notes.rtf
  42. +6
    -0
      Draft/Draft/Network Reconnaissance&Enumeration/Scanning Notes.rtf
  43. +6
    -0
      Draft/Draft/Network Reconnaissance&Enumeration/Scanning/Cull Notes.rtf
  44. +6
    -0
      Draft/Draft/Network Reconnaissance&Enumeration/Tools Notes.rtf
  45. +3
    -0
      Draft/Draft/Open Source Intelligence.md
  46. +6
    -0
      Draft/Draft/Open Source Intelligence/Active cull Notes.rtf
  47. +0
    -0
      Draft/Draft/PrivEsc Post-Exploitation/CLI Tricks Spawn Shells.md
  48. +0
    -0
      Draft/Draft/PrivEsc Post-Exploitation/Exfiltration.md
  49. +0
    -0
      Draft/Draft/PrivEsc Post-Exploitation/Linux/Linux.rtf
  50. +0
    -0
      Draft/Draft/PrivEsc Post-Exploitation/Misc.md
  51. +0
    -0
      Draft/Draft/PrivEsc Post-Exploitation/OS X/OS X.rtf
  52. +0
    -0
      Draft/Draft/PrivEsc Post-Exploitation/Persistence Techniques.md
  53. +0
    -0
      Draft/Draft/PrivEsc Post-Exploitation/Pivoting.md
  54. +0
    -0
      Draft/Draft/PrivEsc Post-Exploitation/PrivEsc Post-Exploitation.rtf
  55. +1
    -0
      Draft/Draft/PrivEsc Post-Exploitation/To Do.md
  56. +0
    -0
      Draft/Draft/PrivEsc Post-Exploitation/Windows/Untitled.rtf
  57. +0
    -0
      Draft/Draft/PrivEsc Post-Exploitation/Windows/Windows.rtf
  58. +1
    -1
      Draft/Draft/Programming - Languages Courses References.md
  59. +127
    -0
      Draft/Draft/Reverse Engineering.md
  60. +0
    -0
      Draft/Draft/Reverse Engineering/Reverse Engineering.rtf
  61. +0
    -63
      Draft/Draft/Reverse Engineering/Reverse Engineering.txt
  62. +6
    -0
      Draft/Draft/Reverse Engineering_1/Android Notes.rtf
  63. +0
    -0
      Draft/Draft/Reverse Engineering_1/Android.md
  64. +6
    -0
      Draft/Draft/Reverse Engineering_1/Cull integrate Notes.rtf
  65. +0
    -0
      Draft/Draft/Reverse Engineering_1/Cull integrate.md
  66. +6
    -0
      Draft/Draft/Reverse Engineering_1/Da List of Info Notes.rtf
  67. +0
    -0
      Draft/Draft/Reverse Engineering_1/Da List of Info.md
  68. +6
    -0
      Draft/Draft/Reverse Engineering_1/Firmware Analysis Notes.rtf
  69. +0
    -0
      Draft/Draft/Reverse Engineering_1/Firmware Analysis.md
  70. +6
    -0
      Draft/Draft/Reverse Engineering_1/Hardware Focused Notes.rtf
  71. +0
    -0
      Draft/Draft/Reverse Engineering_1/Hardware Focused.md
  72. +6
    -0
      Draft/Draft/Reverse Engineering_1/Papers Notes.rtf
  73. +0
    -0
      Draft/Draft/Reverse Engineering_1/Papers.md
  74. +6
    -0
      Draft/Draft/Reverse Engineering_1/Reverse Engineering Notes.rtf
  75. +0
    -0
      Draft/Draft/Reverse Engineering_1/Reverse Engineering_1.rtf
  76. +6
    -0
      Draft/Draft/Reverse Engineering_1/Tools Notes.rtf
  77. +0
    -0
      Draft/Draft/Reverse Engineering_1/Tools.md
  78. +6
    -0
      Draft/Draft/Reverse Engineering_1/Writeups Notes.rtf
  79. +0
    -0
      Draft/Draft/Reverse Engineering_1/Writeups.md
  80. +6
    -0
      Draft/Draft/Reverse Engineering_1/iOS OS X Notes.rtf
  81. +0
    -0
      Draft/Draft/Reverse Engineering_1/iOS OS X.md
  82. +6
    -0
      Draft/Draft/Securing Hardening/Cull Notes.rtf
  83. +6
    -0
      Draft/Draft/Securing Hardening/Finding Rootkits Notes.rtf
  84. +6
    -0
      Draft/Draft/Securing Hardening/Reference List Notes.rtf
  85. +6
    -0
      Draft/Draft/Securing Hardening/Securing Android/Securing Android Notes.rtf
  86. +6
    -0
      Draft/Draft/Securing Hardening/Securing Hardening Notes.rtf
  87. +6
    -0
      Draft/Draft/Securing Hardening/Securing Linux/List of Guides Notes.rtf
  88. +6
    -0
      Draft/Draft/Securing Hardening/Securing Linux/Securing Linux Notes.rtf
  89. +6
    -0
      Draft/Draft/Securing Hardening/Securing OS X/Securing OS X Notes.rtf
  90. +6
    -0
      Draft/Draft/Securing Hardening/Securing Windows/Cull Notes.rtf
  91. +6
    -0
      Draft/Draft/Securing Hardening/Securing Windows/Securing Browsers Notes.rtf
  92. +6
    -0
      Draft/Draft/Securing Hardening/Securing Windows/Securing Windows Desktop Notes.rtf
  93. +6
    -0
      Draft/Draft/Securing Hardening/Securing Windows/Securing Windows Notes.rtf
  94. +6
    -0
      Draft/Draft/Securing Hardening/Securing Windows/Securing Windows Server Notes.rtf
  95. +6
    -0
      Draft/Draft/Securing Hardening/Securing iOS/List of Hardening Guides for iOS Notes.rtf
  96. +6
    -0
      Draft/Draft/Securing Hardening/Securing iOS/Securing iOS Notes.rtf
  97. +1
    -1
      Draft/Draft/Social Engineering.md
  98. +6
    -0
      Draft/Draft/Software Defined Radio/Dongles Notes.rtf
  99. +6
    -0
      Draft/Draft/Software Defined Radio/Software Defined Radio Notes.rtf
  100. +6
    -0
      Draft/Draft/Software Defined Radio/Software Defined Radio SDR Notes.rtf

+ 136
- 0
Draft/Draft/Anonymity Opsec Privacy.md View File

@ -0,0 +1,136 @@
##Anonymity & OpSec & Privacy
###Cull
[You're Leaking Trade Secrets - Defcon22 Michael Schrenk](https://www.youtube.com/watch?v=JTd5TL6_zgY)
* Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to keep trade secrets. While we hear a lot about personal privacy, little is said in regard to organizational privacy. Organizations, in fact, leak information at a much greater rate than individuals, and usually do so with little fanfare. There are greater consequences for organizations when information is leaked because the secrets often fall into the hands of competitors. This talk uses a variety of real world examples to show how trade secrets are leaked online, and how organizational privacy is compromised by seemingly innocent use of The Internet.
[]()
[]()
[]()
['I've Got Nothing to Hide' and Other Misunderstandings of Privacy](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565&)
###Talks
[Because Jail is for WUFTPD](https://www.youtube.com/watch?v=9XaYdCdwiWU)
* Legendary talk, a must watch.
* [His blog](http://grugq.tumblr.com/)
(COMSEC: Beyond encryption](https://grugq.github.io/presentations/COMSEC%20beyond%20encryption.pdf)
[DEFCON 20: Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data](https://www.youtube.com/watch?v=NjuhdKUH6U4)
[Detecting and Defending Against a Surveillance State - DEFCON 22 - Robert Rowley](https://www.youtube.com/watch?v=d5jqV06Yijw)
[Detecting and Defending Against a Surveillance State - Robert Rowley - DEF CON 22](https://www.youtube.com/watch?v=d5jqV06Yijw)
[The NSA: Capabilities and Countermeasures - ShmooCon 2014](https://www.youtube.com/watch?v=D5JA8Ytk9EI)
[Blinding The Surveillance State - Christopher Soghoian - DEF CON 22](https://www.youtube.com/watch?v=pM8e0Dbzopk)
###Tools
[MAT: Metadata Anonymisation Toolkit](https://mat.boum.org/)
* MAT is a toolbox composed of a GUI application, a CLI application and a library.
[Rdis](https://github.com/endeav0r/rdis)
* Rdis is a Binary Analysis Tool for Linux.
###Articles
#####[De-anonymizing facebook users through CSP](http://www.myseosolution.de/deanonymizing-facebook-users-by-csp-bruteforcing/#inhaltsverzeichnis)
#####[Anonymous’s Guide to OpSec](http://www.covert.io/research-papers/security/Anonymous%20Hacking%20Group%20--%20OpNewblood-Super-Secret-Security-Handbook.pdf)
#####[Cat Videos and the Death of Clear Text](https://citizenlab.org/2014/08/cat-video-and-the-death-of-clear-text/)
https://github.com/jlund/streisand
https://github.com/chris-barry/darkweb-everywhere/releases
http://norvig.com/mayzner.html
http://whoer.net/extended

+ 0
- 108
Draft/Draft/Anonymity Opsec stuff.md View File

@ -1,108 +0,0 @@
##Anonymity
This page is not high on my list of things to be done honestly.
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565&
###Talks
[Because Jail is for WUFTPD](https://www.youtube.com/watch?v=9XaYdCdwiWU)
* Legendary talk, a must watch.
* [His blog](http://grugq.tumblr.com/)
(COMSEC: Beyond encryption](https://grugq.github.io/presentations/COMSEC%20beyond%20encryption.pdf)
###Tools
[MAT: Metadata Anonymisation Toolkit](https://mat.boum.org/)
* MAT is a toolbox composed of a GUI application, a CLI application and a library.
[Rdis](https://github.com/endeav0r/rdis)
* Rdis is a Binary Analysis Tool for Linux.
###Articles
#####[De-anonymizing facebook users through CSP](http://www.myseosolution.de/deanonymizing-facebook-users-by-csp-bruteforcing/#inhaltsverzeichnis)
#####[Anonymous’s Guide to OpSec](http://www.covert.io/research-papers/security/Anonymous%20Hacking%20Group%20--%20OpNewblood-Super-Secret-Security-Handbook.pdf)
#####[Cat Videos and the Death of Clear Text](https://citizenlab.org/2014/08/cat-video-and-the-death-of-clear-text/)
https://github.com/jlund/streisand
https://github.com/chris-barry/darkweb-everywhere/releases
http://norvig.com/mayzner.html
http://whoer.net/extended

+ 6
- 0
Draft/Draft/Anti-Forensics/Anti-Forensics & Anti-Anti-Forensics – Michael Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Building A Pentest Lab/Lab Buffer Overflows Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 1
- 0
Draft/Draft/CTFs & Wargames.md View File

@ -15,6 +15,7 @@
[The Many Maxims of Maximally Effective CTFs](http://captf.com/maxims.html)
[CTF write-ups 2015](https://github.com/ctfs/write-ups-2015)
[Golden Flag CTF Awards](http://golden-flags.com/)


+ 6
- 0
Draft/Draft/Common CLI CMD Refs/Curl Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Common CLI CMD Refs/Ncat Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Common CLI CMD Refs/Nmap Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Common CLI CMD Refs/TCPDump Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Common CLI CMD Refs/ToDO Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Cryptography & Encryption/Linux Systems Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Cryptography & Encryption/Vids Papers Blogposts Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Cryptography & Encryption/cull Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Darknets.md View File

@ -6,6 +6,12 @@ Introduction to Darknets:
[Touring the Darkside of the Internet. An Introduction to Tor - Defcon22](https://www.youtube.com/watch?v=To5yarfAg_E)
[Key Impressioning by Jos Weyers - Defcon 19](https://www.youtube.com/watch?v=s8aQSxXoLFk)
[Attack the Key, Own the Lock - Defcon18](https://www.youtube.com/watch?v=_-PqzkoQQ7s)
[Darknets intro vid - educational](https://www.youtube.com/watch?v=tjJYC2LuJl0)


+ 6
- 0
Draft/Draft/Exploit Development/Lab for Practicing Exploit Writing Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 2
- 1
Draft/Draft/Forensics Incident Response.md View File

@ -1,4 +1,5 @@
##Forensics
##Forensics & Incident Response
applexaminer.com


+ 6
- 0
Draft/Draft/Forensics Incident Response/add cull Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 2
- 1
Draft/Draft/Forensics Incident Response/add cull.txt View File

@ -7,7 +7,8 @@
* NSA 70-page writeup on windows event log monitoring
[Forensics on Amazon’s EC2](https://sysforensics.org/2014/10/forensics-in-the-amazon-cloud-ec2.html)
[Investigating PowerShell Attacks - Ryan Kazanciyan and Matt Hastings - DEFCON22](https://www.youtube.com/watch?v=qF06PFcezLs)
* This presentation will focus on common attack patterns performed through PowerShell - such as lateral movement, remote command execution, reconnaissance, file transfer, etc. - and the sources of evidence they leave behind. We'll demonstrate how to collect and interpret these forensic artifacts, both on individual hosts and at scale across the enterprise. Throughout the presentation, we'll include examples from real-world incidents and recommendations on how to limit exposure to these attacks.
[Did it Execute? - Mandiant](https://www.mandiant.com/blog/execute/)
* You found a malicious executable! Now you’ve got a crucial question to answer: did the file execute? We’ll discuss a few sources of evidence you can use to answer this question. In this post, we will focus on static or “dead drive” forensics on Windows systems. We will cover four main sources of evidence: Windows Prefetch, Registry, Log Files, and File Information.


+ 6
- 0
Draft/Draft/Frameworks/Metasploit Reference Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Frameworks/Meterpreter Scripts and Description Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Discovery & Probing Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Enumeration Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Network Footprinting Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/PTES - Penetration Testing Execution Standard Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Password Cracking Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Penetration Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/VoIP Security Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Vulnerability Assessment Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Frameworks/PTES - Penetration Testing Execution Standard/Wireless Penetration Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Frameworks/Post Exploitation with Metasploit Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 2
- 1
Draft/Draft/Interesting Things.md View File

@ -17,7 +17,8 @@ http://www.securitywizardry.com/radar.htm
[Postcards from a Post-XSS World - Michael Zalewski](http://lcamtuf.coredump.cx/postxss/#dangling-markup-injection)
* This page is a rough collection of notes on some of the fundamental alternatives to direct script injection that would be available to attackers following the universal deployment of CSP or other security mechanisms designed to prevent the execution of unauthorized scripts. I hope to demonstrate that in many cases, the capabilities offered by these alternative methods are highly compatible with the goals of contemporary XSS attacks.
[You're Leaking Trade Secrets - Defcon22 Michael Schrenk](https://www.youtube.com/watch?v=JTd5TL6_zgY)
* Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to keep trade secrets. While we hear a lot about personal privacy, little is said in regard to organizational privacy. Organizations, in fact, leak information at a much greater rate than individuals, and usually do so with little fanfare. There are greater consequences for organizations when information is leaked because the secrets often fall into the hands of competitors. This talk uses a variety of real world examples to show how trade secrets are leaked online, and how organizational privacy is compromised by seemingly innocent use of The Internet.
[ZeroMQ](http://zguide.zeromq.org/page:all)
[Underhanded C contest](http://underhanded-c.org/)


+ 6
- 0
Draft/Draft/Interesting Things/Writeup of Gamma Group Hack Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 22
- 1
Draft/Draft/Lockpicking.md View File

@ -1,18 +1,29 @@
##Lockpicking
http://www.keypicking.com/
https://www.reddit.com/r/lockpicking
[Safecracking for the computer scientist*](http://www.crypto.com/papers/safelocks.pdf)
###Introduction
[Wikipedia on Lockpicking](https://en.wikipedia.org/wiki/Lock_picking)
[Introduction to Lockpicking and Physical Security - DEFCON 13](https://www.youtube.com/watch?v=JupQ3BpKGYg)
[A newbies guide to safes, both opening and using](https://www.reddit.com/r/WhatsInThisThing/comments/1gm6uk/a_newbies_guide_to_safes_both_opening_and_using/)
###General Information
[Various types of locks](https://securitysnobs.com/Types-Of-Locks.html)
###Videos/Talks
[Lockpicking by Deviant Ollam](http://deviating.net/lockpicking/videos.html)
@ -44,3 +55,13 @@
[Newbies guide to picking safes](http://cybergibbons.com/lockpicking-2/a-newbies-guide-to-safes/)
[Distinguishing Lockpicks: Raking vs Lifting vs Jiggling and More - Deviant Ollam](https://www.youtube.com/watch?v=e07VRxJ01Fs)

+ 12
- 0
Draft/Draft/Logging.md View File

@ -1,5 +1,12 @@
##Logging
ELK Stack
Logstash/Kibana Elastic Search
[Spotting the Adversary with Windows Event Log Monitoring - NSA](https://www.nsa.gov/ia/_files/app/Spotting_the_Adversary_with_Windows_Event_Log_Monitoring.pdf)
@ -10,6 +17,8 @@
[Windows logging Cheat sheet - Sniper Forensics](https://sniperforensicstoolkit.squarespace.com/storage/logging/Windows%20Logging%20Cheat%20Sheet%20v1.1.pdf)
[Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools](https://www.youtube.com/watch?v=2AAnVeIwXBo)
[bmon](https://github.com/tgraf/bmon)
* bmon is a monitoring and debugging tool to capture networking related statistics and prepare them visually in a human friendly way. It features various output methods including an interactive curses user interface and a programmable text output for scripting.
@ -18,6 +27,9 @@
[Pip3line, the Swiss army knife of byte manipulation](https://nccgroup.github.io/pip3line/index.html)
* Pip3line is a raw bytes manipulation utility, able to apply well known and less well known transformations from anywhere to anywhere (almost).
[ Strange Attractors and TCP/IP Sequence Number Analysis - Michal Zalewski](http://lcamtuf.coredump.cx/oldtcp/tcpseq.html)


+ 5
- 0
Draft/Draft/Malware.md View File

@ -2,6 +2,11 @@
###Cull
[Ragpicker - Malware Crawler](https://code.google.com/p/malware-crawler/)
* Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus products, collecting malware for another analyzer/zoo.
[PowerLoader Injection - Something truly amazing](http://www.malwaretech.com/2013/08/powerloader-injection-something-truly.html)
[Win64/Vabushky - The Great Code Heist](http://www.malwaretech.com/2013/09/win64vabushky-great-code-heist.html)


+ 6
- 0
Draft/Draft/Network Reconnaissance&Enumeration/Getting Busy at the Command Line Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Network Reconnaissance&Enumeration/Misc Links Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Network Reconnaissance&Enumeration/Network Reconnaissance&Enumeration Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Network Reconnaissance&Enumeration/Nmap Cheat Sheet Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Network Reconnaissance&Enumeration/PTES Methodology Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Network Reconnaissance&Enumeration/Passive Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Network Reconnaissance&Enumeration/Scanning Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Network Reconnaissance&Enumeration/Scanning/Cull Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Network Reconnaissance&Enumeration/Tools Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 3
- 0
Draft/Draft/Open Source Intelligence.md View File

@ -7,6 +7,9 @@
###Cull
[You're Leaking Trade Secrets - Defcon22 Michael Schrenk](https://www.youtube.com/watch?v=JTd5TL6_zgY)
* Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to keep trade secrets. While we hear a lot about personal privacy, little is said in regard to organizational privacy. Organizations, in fact, leak information at a much greater rate than individuals, and usually do so with little fanfare. There are greater consequences for organizations when information is leaked because the secrets often fall into the hands of competitors. This talk uses a variety of real world examples to show how trade secrets are leaked online, and how organizational privacy is compromised by seemingly innocent use of The Internet.
[Exploring the Github Firehose](http://blog.scalyr.com/2013/10/exploring-the-github-firehose/)


+ 6
- 0
Draft/Draft/Open Source Intelligence/Active cull Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Draft/Draft/PrivEsc Post-Exploitation/CLI Tricks Spawn Shells.txt → Draft/Draft/PrivEsc Post-Exploitation/CLI Tricks Spawn Shells.md View File


Draft/Draft/PrivEsc Post-Exploitation/Exfiltration.txt → Draft/Draft/PrivEsc Post-Exploitation/Exfiltration.md View File


+ 0
- 0
Draft/Draft/PrivEsc Post-Exploitation/Linux/Linux.rtf View File


Draft/Draft/PrivEsc Post-Exploitation/Misc.txt → Draft/Draft/PrivEsc Post-Exploitation/Misc.md View File


+ 0
- 0
Draft/Draft/PrivEsc Post-Exploitation/OS X/OS X.rtf View File


Draft/Draft/PrivEsc Post-Exploitation/Persistence Techniques.txt → Draft/Draft/PrivEsc Post-Exploitation/Persistence Techniques.md View File


Draft/Draft/PrivEsc Post-Exploitation/Pivoting.txt → Draft/Draft/PrivEsc Post-Exploitation/Pivoting.md View File


+ 0
- 0
Draft/Draft/PrivEsc Post-Exploitation/PrivEsc Post-Exploitation.rtf View File


Draft/Draft/PrivEsc Post-Exploitation/To Do.txt → Draft/Draft/PrivEsc Post-Exploitation/To Do.md View File


+ 0
- 0
Draft/Draft/PrivEsc Post-Exploitation/Windows/Untitled.rtf View File


+ 0
- 0
Draft/Draft/PrivEsc Post-Exploitation/Windows/Windows.rtf View File


+ 1
- 1
Draft/Draft/Programming - Languages Courses References.md View File

@ -9,7 +9,7 @@
[Secure Coding Standards - Android](https://www.securecoding.cert.org/confluence/pages/viewpage.action?pageId=111509535)
[What a C programmer should know about memory](http://marek.vavrusa.com/c/memory/2015/02/20/memory/)
###Assembly x86/x64/ARM


+ 127
- 0
Draft/Draft/Reverse Engineering.md View File

@ -0,0 +1,127 @@
##Reverse Engineering
###Cull
[Introduction to Reverse Engineering Win32 Applications](http://uninformed.org/?v=all&a=7&t=sumry)
* During the course of this paper the reader will be (re)introduced to many concepts and tools essential to understanding and controlling native Win32 applications through the eyes of Windows Debugger (WinDBG). Throughout, WinMine will be utilized as a vehicle to deliver and demonstrate the functionality provided by WinDBG and how this functionality can be harnessed to aid the reader in reverse engineering native Win32 applications. Topics covered include an introductory look at IA-32 assembly, register significance, memory protection, stack usage, various WinDBG commands, call stacks, endianness, and portions of the Windows API. Knowledge gleaned will be used to develop an application designed to reveal and/or remove bombs from the WinMine playing grid.
[Inside Blizzard: Battle.net](http://uninformed.org/?v=all&a=8&t=sumry)
* This paper intends to describe a variety of the problems Blizzard Entertainment has encountered from a practical standpoint through their implementation of the large-scale online game matchmaking and chat service, Battle.net. The paper provides some background historical information into the design and purpose of Battle.net and continues on to discuss a variety of flaws that have been observed in the implementation of the system. Readers should come away with a better understanding of problems that can be easily introduced in designing a matchmaking/chat system to operate on such a large scale in addition to some of the serious security-related consequences of not performing proper parameter validation of untrusted clients.
[Bypassing PatchGuard on Windows x64](http://uninformed.org/?v=all&a=14&t=sumry)
* The version of the Windows kernel that runs on the x64 platform has introduced a new feature, nicknamed PatchGuard, that is intended to prevent both malicious software and third-party vendors from modifying certain critical operating system structures. These structures include things like specific system images, the SSDT, the IDT, the GDT, and certain critical processor MSRs. This feature is intended to ensure kernel stability by preventing uncondoned behavior, such as hooking. However, it also has the side effect of preventing legitimate products from working properly. For that reason, this paper will serve as an in-depth analysis of PatchGuard's inner workings with an eye toward techniques that can be used to bypass it. Possible solutions will also be proposed for the bypass techniques that are suggested.
[Subverting PatchGuard Version 2](http://uninformed.org/?v=all&a=28&t=sumry)
* Windows Vista x64 and recently hotfixed versions of the Windows Server 2003 x64 kernel contain an updated version of Microsoft's kernel-mode patch prevention technology known as PatchGuard. This new version of PatchGuard improves on the previous version in several ways, primarily dealing with attempts to increase the difficulty of bypassing PatchGuard from the perspective of an independent software vendor (ISV) deploying a driver that patches the kernel. The feature-set of PatchGuard version 2 is otherwise quite similar to PatchGuard version 1; the SSDT, IDT/GDT, various MSRs, and several kernel global function pointer variables (as well as kernel code) are guarded against unauthorized modification. This paper proposes several methods that can be used to bypass PatchGuard version 2 completely. Potential solutions to these bypass techniques are also suggested. Additionally, this paper describes a mechanism by which PatchGuard version 2 can be subverted to run custom code in place of PatchGuard's system integrity checking code, all while leaving no traces of any kernel patching or custom kernel drivers loaded in the system after PatchGuard has been subverted. This is particularly interesting from the perspective of using PatchGuard's defenses to hide kernel mode code, a goal that is (in many respects) completely contrary to what PatchGuard is designed to do.
[PatchGuard Reloaded: A Brief Analysis of PatchGuard Version 3](http://uninformed.org/?v=all&a=38&t=sumry)
* Since the publication of previous bypass or circumvention techniques for Kernel Patch Protection (otherwise known as "PatchGuard"), Microsoft has continued to refine their patch protection system in an attempt to foil known bypass mechanisms. With the release of Windows Server 2008 Beta 3, and later a full-blown distribution of PatchGuard to Windows Vista and Windows Server 2003 via Windows Update, Microsoft has introduced the next generation of PatchGuard to the general public ("PatchGuard 3"). As with previous updates to PatchGuard, version three represents a set of incremental changes that are designed to address perceived weaknesses and known bypass vectors in earlier versions. Additionally, PatchGuard 3 expands the set of kernel variables that are protected from unauthorized modification, eliminating several mechanisms that might be used to circumvent PatchGuard while co-existing (as opposed to disabling) it. This article describes some of the changes that have been made in PatchGuard 3. This article also proposes several new techniques that can be used to circumvent PatchGuard's defenses. Countermeasures for these techniques are also discussed.
[Improving Automated Analysis of Windows x64 Binaries](http://uninformed.org/?v=all&a=18&t=sumry)
* As Windows x64 becomes a more prominent platform, it will become necessary to develop techniques that improve the binary analysis process. In particular, automated techniques that can be performed prior to doing code or data flow analysis can be useful in getting a better understanding for how a binary operates. To that point, this paper gives a brief explanation of some of the changes that have been made to support Windows x64 binaries. From there, a few basic techniques are illustrated that can be used to improve the process of identifying functions, annotating their stack frames, and describing their exception handler relationships. Source code to an example IDA plugin is also included that shows how these techniques can be implemented.
[An Objective Analysis of the Lockdown Protection System for Battle.net ](http://uninformed.org/?v=all&a=40&t=sumry)
* Near the end of 2006, Blizzard deployed the first major update to the version check and client software authentication system used to verify the authenticity of clients connecting to Battle.net using the binary game client protocol. This system had been in use since just after the release of the original Diablo game and the public launch of Battle.net. The new authentication module (Lockdown) introduced a variety of mechanisms designed to raise the bar with respect to spoofing a game client when logging on to Battle.net. In addition, the new authentication module also introduced run-time integrity checks of client binaries in memory. This is meant to provide simple detection of many client modifications (often labeled "hacks") that patch game code in-memory in order to modify game behavior. The Lockdown authentication module also introduced some anti-debugging techniques that are designed to make it more difficult to reverse engineer the module. In addition, several checks that are designed to make it difficult to simply load and run the Blizzard Lockdown module from the context of an unauthorized, non-Blizzard-game process. After all, if an attacker can simply load and run the Lockdown module in his or her own process, it becomes trivially easy to spoof the game client logon process, or to allow a modified game client to log on to Battle.net successfully. However, like any protection mechanism, the new Lockdown module is not without its flaws, some of which are discussed in detail in this paper.
[Real-time Steganography with RTP](http://uninformed.org/?v=all&a=36&t=sumry)
* Real-time Transfer Protocol (RTP) is used by nearly all Voice-over-IP systems to provide the audio channel for calls. As such, it provides ample opportunity for the creation of a covert communication channel due to its very nature. While use of steganographic techniques with various audio cover-medium has been extensively researched, most applications of such have been limited to audio cover-medium of a static nature such as WAV or MP3 file audio data. This paper details a common technique for the use of steganography with audio data cover-medium, outlines the problem issues that arise when attempting to use such techniques to establish a full-duplex communications channel within audio data transmitted via an unreliable streaming protocol, and documents solutions to these problems. An implementation of the ideas discussed entitled SteganRTP is included in the reference materials.
[Locreate: An Anagram for Relocate ](http://uninformed.org/?v=all&a=30&t=sumry)
* This paper presents a proof of concept executable packer that does not use any custom code to unpack binaries at execution time. This is different from typical packers which generally rely on packed executables containing code that is used to perform the inverse of the packing operation at runtime. Instead of depending on custom code, the technique described in this paper uses documented behavior of the dynamic loader as a mechanism for performing the unpacking operation. This difference can make binaries packed using this technique more difficult to signature and analyze, but only when presented to an untrained eye. The description of this technique is meant to be an example of a fun thought exercise and not as some sort of revolutionary packer. In fact, it's been used in the virus world many years prior to this paper.
[Using dual-mappings to evade automated unpackers ](http://uninformed.org/?v=all&a=44&t=sumry)
* Automated unpackers such as Renovo, Saffron, and Pandora's Bochs attempt to dynamically unpack executables by detecting the execution of code from regions of virtual memory that have been written to. While this is an elegant method of detecting dynamic code execution, it is possible to evade these unpackers by dual-mapping physical pages to two distinct virtual address regions where one region is used as an editable mapping and the second region is used as an executable mapping. In this way, the editable mapping is written to during the unpacking process and the executable mapping is used to execute the unpacked code dynamically. This effectively evades automated unpackers which rely on detecting the execution of code from virtual addresses that have been written to.
Reverse Engineering - Wikipedia
https://en.wikipedia.org/wiki/Reverse_engineering
[Introduction to Reverse Engineering Software](http://althing.cs.dartmouth.edu/local/www.acm.uiuc.edu/sigmil/RevEng/)
* This book is an attempt to provide an introduction to reverse engineering software under both Linux and Microsoft Windows©. Since reverse engineering is under legal fire, the authors figure the best response is to make the knowledge widespread. The idea is that since discussing specific reverse engineering feats is now illegal in many cases, we should then discuss general approaches, so that it is within every motivated user's ability to obtain information locked inside the black box. Furthermore, interoperability issues with closed-source proprietary systems are just plain annoying, and something needs to be done to educate more open source developers as to how to implement this functionality in their software.
[OpenRCE Anti Reverse Engineering Techniques Database](http://www.openrce.org/reference_library/anti_reversing)
[Analyzing and Running binaries from Firmware Images - Part 1](http://w00tsec.blogspot.com.br/2013/09/analyzing-and-running-binaries-from.html
)
[SIMET Box Firmware Analysis: Embedded Device Hacking & Forensics](http://w00tsec.blogspot.com.br/2013/08/simet-box-firmware-analysis-embedded.html)
[APK Studio - Android Reverse Engineering](https://apkstudio.codeplex.com/)
* APK Studio is an IDE for decompiling/editing & then recompiling of android application binaries. Unlike initial release being Windows exclusive & also didn't support frameworks, this one is completely re-written using QT for cross-platform support. You can now have multiple frameworks installed & pick a particular one on a per project basis.
[Apple Lightning Reverse Engineered](http://ramtin-amin.fr/#tristar)
High Level view of what Reverse Engineering is
Link: http://www.program-transformation.org/Transform/DecompilationAndReverseEngineering
Anti Reverse Engineering:
http://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide
What is Reverse Engineering? See the following link:
http://www.program-transformation.org/Transform/DecompilationAndReverseEngineering
Guides & Tutorials
Wikis
Reference Guides
Starting from Scratch?
Check out: http://www.reddit.com/r/ReverseEngineering/comments/smf4u/reverser_wanting_to_develop_mathematically/
And :
Windows Anti-Debugging Reference
From: http://www.symantec.com/connect/articles/windows-anti-debug-reference
This paper classifies and presents several anti-debugging techniques used on Windows NT-based operating systems. Anti-debugging techniques are ways for a program to detect if it runs under control of a debugger. They are used by commercial executable protectors, packers and malicious software, to prevent or slow-down the process of reverse-engineering. We'll suppose the program is analyzed under a ring3 debugger, such as OllyDbg on Windows platforms. The paper is aimed towards reverse-engineers and malware analysts. Note that we will talk purely about generic anti-debugging and anti-tracing techniques. Specific debugger detection, such as window or processes enumeration, registry scanning, etc. will not be addressed here.
Cryptoshark
From: https://github.com/frida/cryptoshark
Interactive code tracer for reverse-engineering proprietary software

+ 0
- 0
Draft/Draft/Reverse Engineering/Reverse Engineering.rtf View File


+ 0
- 63
Draft/Draft/Reverse Engineering/Reverse Engineering.txt View File

@ -1,63 +0,0 @@
##Reverse Engineering
Reverse Engineering - Wikipedia
https://en.wikipedia.org/wiki/Reverse_engineering
[Introduction to Reverse Engineering Software](http://althing.cs.dartmouth.edu/local/www.acm.uiuc.edu/sigmil/RevEng/)
* This book is an attempt to provide an introduction to reverse engineering software under both Linux and Microsoft Windows©. Since reverse engineering is under legal fire, the authors figure the best response is to make the knowledge widespread. The idea is that since discussing specific reverse engineering feats is now illegal in many cases, we should then discuss general approaches, so that it is within every motivated user's ability to obtain information locked inside the black box. Furthermore, interoperability issues with closed-source proprietary systems are just plain annoying, and something needs to be done to educate more open source developers as to how to implement this functionality in their software.
[OpenRCE Anti Reverse Engineering Techniques Database](http://www.openrce.org/reference_library/anti_reversing)
[Analyzing and Running binaries from Firmware Images - Part 1](http://w00tsec.blogspot.com.br/2013/09/analyzing-and-running-binaries-from.html
)
[SIMET Box Firmware Analysis: Embedded Device Hacking & Forensics](http://w00tsec.blogspot.com.br/2013/08/simet-box-firmware-analysis-embedded.html)
[APK Studio - Android Reverse Engineering](https://apkstudio.codeplex.com/)
* APK Studio is an IDE for decompiling/editing & then recompiling of android application binaries. Unlike initial release being Windows exclusive & also didn't support frameworks, this one is completely re-written using QT for cross-platform support. You can now have multiple frameworks installed & pick a particular one on a per project basis.
[Apple Lightning Reverse Engineered](http://ramtin-amin.fr/#tristar)
High Level view of what Reverse Engineering is
Link: http://www.program-transformation.org/Transform/DecompilationAndReverseEngineering
Anti Reverse Engineering:
http://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide
What is Reverse Engineering? See the following link:
http://www.program-transformation.org/Transform/DecompilationAndReverseEngineering
Guides & Tutorials
Wikis
Reference Guides
Starting from Scratch?
Check out: http://www.reddit.com/r/ReverseEngineering/comments/smf4u/reverser_wanting_to_develop_mathematically/
And :
Windows Anti-Debugging Reference
From: http://www.symantec.com/connect/articles/windows-anti-debug-reference
This paper classifies and presents several anti-debugging techniques used on Windows NT-based operating systems. Anti-debugging techniques are ways for a program to detect if it runs under control of a debugger. They are used by commercial executable protectors, packers and malicious software, to prevent or slow-down the process of reverse-engineering. We'll suppose the program is analyzed under a ring3 debugger, such as OllyDbg on Windows platforms. The paper is aimed towards reverse-engineers and malware analysts. Note that we will talk purely about generic anti-debugging and anti-tracing techniques. Specific debugger detection, such as window or processes enumeration, registry scanning, etc. will not be addressed here.
Cryptoshark
From: https://github.com/frida/cryptoshark
Interactive code tracer for reverse-engineering proprietary software

+ 6
- 0
Draft/Draft/Reverse Engineering_1/Android Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Draft/Draft/Reverse Engineering/Android.txt → Draft/Draft/Reverse Engineering_1/Android.md View File


+ 6
- 0
Draft/Draft/Reverse Engineering_1/Cull integrate Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Draft/Draft/Reverse Engineering/Cull integrate.txt → Draft/Draft/Reverse Engineering_1/Cull integrate.md View File


+ 6
- 0
Draft/Draft/Reverse Engineering_1/Da List of Info Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Draft/Draft/Reverse Engineering/Da List of Info.txt → Draft/Draft/Reverse Engineering_1/Da List of Info.md View File


+ 6
- 0
Draft/Draft/Reverse Engineering_1/Firmware Analysis Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Draft/Draft/Reverse Engineering/Firmware Analysis.txt → Draft/Draft/Reverse Engineering_1/Firmware Analysis.md View File


+ 6
- 0
Draft/Draft/Reverse Engineering_1/Hardware Focused Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Draft/Draft/Reverse Engineering/Hardware Focused.txt → Draft/Draft/Reverse Engineering_1/Hardware Focused.md View File


+ 6
- 0
Draft/Draft/Reverse Engineering_1/Papers Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Draft/Draft/Reverse Engineering/Papers.txt → Draft/Draft/Reverse Engineering_1/Papers.md View File


+ 6
- 0
Draft/Draft/Reverse Engineering_1/Reverse Engineering Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Draft/Draft/Draft.rtf → Draft/Draft/Reverse Engineering_1/Reverse Engineering_1.rtf View File


+ 6
- 0
Draft/Draft/Reverse Engineering_1/Tools Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Draft/Draft/Reverse Engineering/Tools.txt → Draft/Draft/Reverse Engineering_1/Tools.md View File


+ 6
- 0
Draft/Draft/Reverse Engineering_1/Writeups Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Draft/Draft/Reverse Engineering/Writeups.txt → Draft/Draft/Reverse Engineering_1/Writeups.md View File


+ 6
- 0
Draft/Draft/Reverse Engineering_1/iOS OS X Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Draft/Draft/Reverse Engineering/iOS OS X.txt → Draft/Draft/Reverse Engineering_1/iOS OS X.md View File


+ 6
- 0
Draft/Draft/Securing Hardening/Cull Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Finding Rootkits Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Reference List Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing Android/Securing Android Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing Hardening Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing Linux/List of Guides Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing Linux/Securing Linux Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing OS X/Securing OS X Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing Windows/Cull Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing Windows/Securing Browsers Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing Windows/Securing Windows Desktop Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing Windows/Securing Windows Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing Windows/Securing Windows Server Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing iOS/List of Hardening Guides for iOS Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Securing Hardening/Securing iOS/Securing iOS Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 1
- 1
Draft/Draft/Social Engineering.md View File

@ -7,7 +7,7 @@
[How do you Feel about your Mother? Psych and The SE - Michele Fincher](https://www.youtube.com/watch?v=A0_NL1YBvK4)


+ 6
- 0
Draft/Draft/Software Defined Radio/Dongles Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Software Defined Radio/Software Defined Radio Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

+ 6
- 0
Draft/Draft/Software Defined Radio/Software Defined Radio SDR Notes.rtf View File

@ -0,0 +1,6 @@
{\rtf1\ansi\ansicpg1252\uc1\deff0
{\fonttbl{\f0\fnil\fcharset0\fprq2 Courier New;}}
{\colortbl;\red0\green0\blue0;\red255\green255\blue255;}
\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\fet2\ftnbj\aenddoc
\pgnrestart\pgnstarts0
\pard\plain \ltrch\loch \f0\fs24}

Some files were not shown because too many files changed in this diff

Loading…
Cancel
Save