Articles in Security
Killing Process Network Access
Imagine this scenario: a particular process on your server is connecting to a host outside your internal network and you don’t like that. On the other hand, you can’t just kill that process because you need it.
The Facebook Fracas
The Facebook privacy saga is getting ridiculous. You’re using a free service that you signed up for – nobody was holding a gun to your giant head. And it’s not Gulag either: just delete your profile, uninstall the damned app, and forget Facebook ever existed.
Obfuscating Shell Scripts
Unix shell scripting language is run by the command-line interpreter and, as such, can be read and understood by anyone with sufficient access and experience. Sometimes this is not a good thing. Sometimes you want …
Encrypted Volumes and Portable Apps
This is a description of an uncomplicated setup for an encrypted volume and portable applications for a Windows laptop consisting of a USB3 storage device, VeraCrypt OSS OTFE, a hardware password wallet, and portableapps.com software.
Detect SSL Certificate Injection
When the SSL Digital Certificate is intercepted and replaced by a device between your browser and the Web site, we call it certificate injection. This method is more commonly used not by hackers, but by …
SSL For Self-Hosted WordPress
Just some notes for setting up SSL with your self-hosted WordPress hosting installation. Just got around to doing this the other day. Yeah, I know, about time…
Show Logged In Users During a Time Window
Let’s say you want to see who was logged in on the server during last weekend. This includes users who, say, logged in on Thursday and haven’t logged out until Saturday afternoon.
Increasing Entropy Pool in Linux
The pool of random numbers in Linux is derived primarily from user interaction (keystrokes and mouse movement). A server does not have such a source and the random pool may start running low, especially during …
Using JTR to Crack Office Documents
John the Ripper is a free multi-platform password-cracking software. This article is not intended to be a comprehensive guide to jtr, rather a quick how-to. Starting with version 1.7.9, jumbo patch 6, jtr supports password …
Securing VSFTP with TCP Wrappers and IPTables
I’ve been drinking beer and perhaps had one too many. Regardless of the reason, I felt the urge to further secure my favorite server. The target of my paranoia is once again the VSFTPd. I …
Removing Metadata from Images
Phones and cameras record a surprising amount of personally-sensitive information with the photos they create. This data includes timestamps, GPS coordinates, software used to process the images and lots of other details you may not …
Login Monitor
Sometimes after a couple of beers I start feeling paranoid. I make sure the door is locked and check my firewall logs. Here’s a very basic script to monitor your server’s login record and notify you about …
Ad-Hoc Analysis of /var/log/secure
The /var/log/secure contains a record of authentication and authorization activity on the system. It can be an invaluable resource for the purposes of intrusion detection and prevention. Below are a few simple examples that show how …
Late Night Rant #24: North Korean Internet
Today was the day the North Koreans would have learned they had the Internet and the Americans DDOSed it. Unfortunately, they had no Internet, poor bastards. But, as long as this keeps us entertained… Hey, …
Late Night Rant #23: Kim The Sony-Slayer
Sony execs are shedding crocodile tears over the latest IT security breach that brought substantial financial losses to the company. Let’s not dwell on the trivial: who did it and why are irrelevant technicalities. How …
VSFTPd, SSL, and Firewalls
If you ever wanted to configure SSL/TLS encryption for an FTP server behind a firewall, the “Google wisdom” ranges from “a major pain” to “can’t be done”. Fortunately, things are not all that bad. In …
Remove Duplicate IPTables Rules
Duplicate entries may appear in your iptables configuration due to parallel efforts of various network security-related applications that may be running on your server. In most cases, having duplicate iptables rules is no big deal, …
Secure Data Destruction for Unix
What is secure computer data destruction? Simply put, securely-deleted data cannot be recovered by any known technique. But when it comes to data security, things are rarely simple. New data recovery methods are developed every …
Facebook Security for the Lazy
Every time you use Facebook, you probably have a nagging feeling in the back of your head that someone other than your friends is reading your posts. You should trust that feeling. At the same time, keep in mind that Facebook is a tool designed primarily for sharing personal information with large groups of people you barely know. Facebook is not your personal diary or a substitute for SMS. You just need to assume that everything you post on Facebook inevitably will end up in the hands of someone you don’t like very much. And then you proceed based on that assumption.
Linksys WAP54G Secure Configuration
Below are some basic steps to secure a wireless access point (WAP). The screenshots are for Linksys WAP54G v. 3.04, however, the same steps will apply to wireless access points from other manufacturers. Understand this: …
Distributed password cracking with Medussa
Medussa is a password cracking application that supports distributed processing. One node acts as the Medussa server and the rest of the nodes are running the client application. The server node, in addition to running …
Latest Comments