unwanted remote control sites and apps

It really sucks when users think they’re being cute by utilizing remote control services to connect from home to work or work to home PCs. These just are not cool, especially when used without permission. I always forget the sites, though, so this will start my list of sites to blacklist on firewalls/web filters whenever I set any up. These are not wanted in the corporate sphere.

GoToMyPC
LogMeIn (and secure.logmein.com)
Hamachi – p2p?

Hamachi is a particularly scary thing, but like Skype, it should require a common mediation server to get the two endpoints together, and therein lies a single point of denial on firewalls. Either way, novel idea, and something I’d like to check out on my own. If even the mediation is peer-to-peer, we should be marking the app as a highly bad app, kinda like an irc client…

Foxy Proxy has some excellent tutorials as well as the proxy stuff.

breaking wep

This paper purports not only to help cracking wep, but to be the final nail in actually outright breaking wep. I’ve not read this yet, but plan to as this sounds like a very swift, albeit technical, way to break wep.

mocbot analysis

This is an analysis of Mocbot from LURHQ. Especially interesting is the follow-up on the Spammer that this new variant downloads, as well as the graphic showing which antivirus companies properly detected the malware. I wonder if the only ones detecting are the heuristic scanners and not the signature-based scanners…?

secure usb drives

Just a quick listing of some secure USB drives that use hardware encryption and are recommended:

mtrust mdrive 500
kingston data traveler elite – privacy ediction
verbatim store’n go corporate – secure

ntfs alternate data streams

Quite an ingenious simple little method to hide files on an ntfs disk: alternate data streams. This article on Security Focus makes it look a little more difficult than it is, due to the author going through the effort of describing breaking into a machine to set an ADS on a few hidden files. LNS and LADS are two tools to scan a disk for ADS…although they are certainly not swift in their scans.

Update: An ADS tutorial from STC

reverse engineering windows malware

Snagged a bunch of tools and links dealing with reverse engineering malware, particularly Windows, but also other stuff. This is an area I’d love to get into some day, perhaps when I get more into coding as well. Either way, it is always useful to exercise ones ability to figure out what malware is doing, whether you use a live box and lab network or examine the code straight-up.

IDA Pro – the universal first choice in malware analysis
Ollydbg
WinDbg
Import Rec
Ollydump
PaiMai and PyDbg
Pydasm and Pydot
ISA sync