¿De dónde viene el malware? (Infografía)

Aug 3, 2012
Infografíavirus

Pauldotcom Episodio 13

PaulDotComEspanol-logo.png

Otro nuevo podcast de Pauldotcom en español, donde Carlos Pérez entrevista a Jaime “DragonJar”.

Podéis acceder al podcast desde aquí

Aug 2, 2012
PodcastsHackingSeguridad

Un fichero capaz de simular varios formatos de ficheros válidos a la vez

Captura de pantalla 2012-08-02 a la(s) 10.05.36

Cabecera real del fichero CorkaMIX.exe

Este ejemplo creado íntegramente en asm, sólo sirve para probar que un fichero puede ser dado por válido por el sistema simulando ser varios tipos de ficheros distintos.

Este fichero CorkaMIX.zip puede ser a la vez:

  • Programa portable ejecutable (PE)
  • Documento PDF
  • Oracle Java JAR (o una clase dentro dentro de un ZIP) ó Script Python
  • Página HTML
Interesante para analizar y jugar un rato con los formatos de ficheros.
Puedes descargarlo desde aquí, CorkaMIX.zip
Para compilarlo:
[sourcecode language="bash"] yasm -o corkamix.exe corkamix.asm [/sourcecode]
Resumiendo, si la información del formato del fichero no empieza en el offset 0, puede llevar a confusión al sistema y a creer que el fichero es válido para varios formatos.
Más información en la web del autor aquí.
Visto en Reddit.
Información sobre cabeceras de ficheros: FileSignaturesFormat
Aug 2, 2012
HackingProgramaciónRecursos Informática

Presentaciones de la BlackHat USA 2012

event-logo.png

Ya están disponibles para descarga el material de las charlas que se dieron en la BlackHat USA 2012 pasado mes de julio en Las Vegas:

Fuente
Aug 2, 2012
SeguridadHacking

Curso de Python en CodeAcademy

Captura de pantalla 2012-07-31 a la(s) 13.45.11

En la genial e indispensable web de CodeAcademy, han empezado un curso de Python (basado en la versión 2.7) del que ya hay cuatro unidades.

En este enlace tienes la web principal del curso.

Ahora es un buen momento para aprender Python usando el genial método de enseñanza que nos ofrece CodeAcademy.

Jul 31, 2012
Recursos InformáticaProgramación

Algunas instrucciones útiles de la línea de comandos en Windows que no se suelen utilizar

10cmdtools4

Entre HowToGeek y algunos comandos de WatchingTheNet hemos recopilado estas instrucciones (y formas de utilizar) de la línea de comandos bastantes útiles (y que realmente no utilizamos frecuentemente):

Enviar la salida de un comando al portapapeles:

[sourcecode languaje=“bash”] ipconfig | clip [/sourcecode]

Abrir la línea de comandos desde una carpeta: Botón derecho sobre la carpeta y desde allí abrir línea de comandos: image243

Historial de comandos ejecutados:

Jul 31, 2012
Recursos InformáticaTrucosMicrosoft

Son de Mar Parte 5, Piano Magic, perfecta para un domingo por la mañana de playa

Hasta el minuto 3:22 no empieza realmente la canción, el resto va ambientando la situación.

Película Son de Mar, Bigas Luna

Piano Magic

Jul 29, 2012
videosocioMúsica

Vídeos de BSides Las Vegas 2012

profile.jpg

Ya tenemos disponibles las charlas que se grabaron de BSides Las Vegas 2012:

1.1.0 KEYNOTE, Jack Daniel The State of Security BSides 1.1.1 Matt Weeks Ambush - Catching Intruders At Any Point 1.1.2 Robert Rowley Max Level Web App Security 1.1.3 Davi Ottenheimer Big Data’s Fourth V Or Why We’ll Never Find the L… 1.1.4 HD Moore Empirical Exploitation 1.1.5 Christopher Lytle Puzzle Competitions and You 1.1.6 Parth Patel Introducing Android Security Evaluation Framework - ASEF 1.1.7 Terry Gold RFID LOL 2.1.0 Michael Fornal How I managed to break into the InfoSec World 2.1.1 David Keene Breaking Microsoft Dynamics Great Plains - an insiders… 2.1.2 William Ghote Lotus Notes Password Hash Redux 2.1.3 Spencer McIntyre How I Learned To Stop Worrying and Love the Smart… 2.1.4 Christopher Campbell Shot With Your Own Gun How Appliances are Use… 2.1.5 Shawn Asmus, Kristov Widak Mirror Mirror – Reflected PDF Attacks… 2.1.6 Georgia Weidman Introducing the Smartphone Penetration Testing Fra… 1.2.0 Raphael Mudge Force Multipliers for Red Team Operations 1.2.1 Andrew Hay & Matt Johansen Applications and Cloud and Hackers, Oh My! 1.2.2 Brendan O’Connor Reticle Dropping an Intelligent F-BOMB 1.2.3 Josh Sokol Dan Cornell The Magic of Symbiotic Security Creating an… 1.2.4 James Lester & Joseph Tartaro Burp Suite Informing the 99% of what… 1 2 5 dc949 Stiltwalker Round 2 1 2 5 dc949 Stiltwalker Round 2 1.2.6 Gillis Jones The Badmin project (Na-na- nanana Na-na-nanana BADMIN) 1.2.7 IPv6 Panel Drinking Game 2.2.0 Phil Young Mainframed - The Forgotten Fortress 2.2.1 Walt Williams Metrics that Suck Even Less 2.2.2 Conrad Constantine The Leverage of Language or How I Realized Info…

Jul 27, 2012
SeguridadHackingvideos

Audio de la HOPE Number 9

masthead.jpg

Como viene siendo habitual, cada dos años se celebra en la ciudad de Nueva York otra de las grandes conferencias sobre seguridad, Hacking On Planet Earth o HOPE. La edición de este año se denominó HOPE Number 9 y fue celebrada los pasados 13 - 15 de julio. Esta conferencia la organiza el grupo 2600. Estos han puesto a disposición del público al audio de todas las charlas:

  • 3D Printing: Making Friends in DC Before People Start Freaking Out 16kbps - 64kbps
  • Activist DDoS Attacks: When Analogies and Metaphors Fail 16kbps - 64kbps
  • Advanced Handcuff Hacking 16kbps - 64kbps
  • Advancements in Botnet Attacks and Malware Distribution 16kbps - 64kbps
  • An Aesthetic Critique of Fictional Media 16kbps - 64kbps
  • Anti-Censorship and Anti-Surveillance Tools - Improving the Landscape 16kbps - 64kbps
  • The ARRIStocrats: Cable Modem Lulz 16kbps - 64kbps
  • The Autism Spectrum and You 16kbps - 64kbps
  • Brain Chemistry: How Psychoactive Chemicals Hack the Central Nervous System 16kbps - 64kbps
  • Building Radios to Talk to the Dead 16kbps - 64kbps
  • Cell Site Location Data and Nontrespassory Surveillance after U.S. v. Jones 16kbps - 64kbps
  • Closing Ceremonies 16kbps - 64kbps
  • Combat Robots Then and Now 16kbps - 64kbps
  • Community Fabrication: Four Years Later 16kbps - 64kbps
  • Computer Forensics: Possibility, Probability, Opinion, and Fact 16kbps - 64kbps
  • Countermeasures: Proactive Self Defense Against Ubiquitous Surveillance 16kbps - 64kbps
  • Crimeware Tools and Techniques of 2012: Past, Present, and Future 16kbps - 64kbps
  • Cryptome Tracks the NYPD Ring of Steel 16kbps - 64kbps
  • DARPA Funding for Hackers, Hackerspaces, and Education: A Good Thing? 16kbps - 64kbps
  • Dead in a Pool of Blood and Millions of Dollars of Net Art 16kbps - 64kbps
  • Declassifying Government and Undermining a Culture of Insecurity 16kbps - 64kbps
  • Designing Free Hardware: Scratching Your Own Itch with a Soldering Iron 16kbps - 64kbps
  • Destroying Evidence Before It’s Evidence 16kbps - 64kbps
  • Digital Security in Health Care Institutions 16kbps - 64kbps
  • DKIM: You’re Doing It Wrong 16kbps - 64kbps
  • DUI/DWI Testing - A Hacker’s View of the Technology and Process Behind the BAC and Standard Field Sobriety Test 16kbps - 64kbps
  • Electric Bodies and Possible Worlds 16kbps - 64kbps
  • The Emergence of Hacker as Artist and Artist as Hacker 16kbps - 64kbps
  • Exploiting ZigBee and the Internet of Things 16kbps - 64kbps
  • Explosive Steganography 16kbps - 64kbps
  • Film Screening: Monochrom’s Kiki and Bubu: Rated R Us -
  • Geeks and Depression 16kbps - 64kbps
  • Hackers and Media Hype or Big Hacks That Never Really Happened 16kbps - 64kbps
  • Hacking Mindsets: Conceptual Approaches to Transmission Art, Improvisation, Circuitbending, and Gaming Technology 16kbps - 64kbps
  • Hacking the Cosmos via Crowdsourced Particle Astronomy 16kbps - 64kbps
  • Hacking the Spaces 16kbps - 64kbps
  • Hack the Law 16kbps - 64kbps
  • Hacktivism, Tools, and the Arab Spring 16kbps - 64kbps
  • HIDIOUS Methods of Keystroke Injection 16kbps - 64kbps
  • Historic Hacks in Portable Computing 16kbps - 64kbps
  • Hosting irc.2600.net - My Life with the Thrill Kill Cult 16kbps - 64kbps
  • How to Communicate with Your Car’s Network 16kbps - 64kbps
  • How to Retrofit the First Law of Robotics 16kbps - 64kbps
  • ICANN’s New gTLD Program: Implications on Security, Stability, and Governance 16kbps - 64kbps
  • I’m Not a Real Friend, But I Play One on the Internet 16kbps - 64kbps
  • Information Distribution in the Arab Spring - No Hacks Required 16kbps - 64kbps
  • Infrastructure Mediated Sensing of Whole-Home Human Activity 16kbps - 64kbps
  • The Internet is for Porn! How High Heels and Fishnet Have Driven Internet Innovation and Information Security 16kbps - 64kbps
  • IPv6 Now! What Does This Mean? 16kbps - 64kbps
  • Jason Scott’s Strange and Wonderful Digital History Argosy 16kbps - 64kbps
  • Keynote Address - William Binney 16kbps - 64kbps
  • Keynote Address - The Yes Men 16kbps - 64kbps
  • “Kill The Internet” 16kbps - 64kbps
  • Legal Processes As Infrastructure Attacks 16kbps - 64kbps
  • Lightning Talks 16kbps - 64kbps
  • Make Your Laws: Practical Liquid Democracy 16kbps - 64kbps
  • Manufacturing Modern Computer Chips 16kbps - 64kbps
  • Mastering Master-Keyed Systems 16kbps - 64kbps
  • Messing with Nmap Through Smoke and Mirrors 16kbps - 64kbps
  • “No Natural Resources Were Hurt Assembling This Sofa” 16kbps - 64kbps
  • Nymwars: Fighting for Anonymity and Pseudonymity on the Internet 16kbps - 64kbps
  • Occupy the Airwaves: Tools to Empower Community Radio Stations 16kbps - 64kbps
  • Old School Phreaking 16kbps - 64kbps
  • The Open Secure Telephony Network 16kbps - 64kbps
  • The Original WWII Hackers 16kbps - 64kbps
  • Patents: How to Get Them and How to Beat Them 16kbps - 64kbps
  • Phone Phreak Confidential: The Backstory of the History of Phone Phreaking 16kbps - 64kbps
  • Practical Insecurity in Encrypted Radio 16kbps - 64kbps
  • Printable Electronics and the Future of Open Hardware 16kbps - 64kbps
  • Privacy - A Postmortem
  • (or Cell Phones, GPS, Drones, Persistent Dataveillance, Big Data, Smart Cameras and Facial Recognition, The Internet of Things, and Government Data Centers Vacuuming Google and Facebook, Oh My!) 16kbps - 64kbps
  • Privacy by Design - a Dream for a Telecommunications Provider That Uses Strong Cryptography to Ensure Your Privacy 16kbps - 64kbps
  • Privacy Tricks for Activist Web Developers 16kbps - 64kbps
  • Project Byzantium: An Ad-Hoc Wireless Mesh Network for the Zombie Apocalypse 16kbps - 64kbps
  • Protecting Your Data from the Cops 16kbps - 64kbps
  • Pwn the Drones: A Survey of UAV Hacks and Exploits 16kbps - 64kbps
  • Real Advances in Android Malware 16kbps - 64kbps
  • Recent Advances in Single Packet Authorization 16kbps - 64kbps
  • Re-wired: Hacking the Auditory Experience 16kbps - 64kbps
  • SCADA/PLC Exploitation and Disclosure 16kbps - 64kbps
  • Sierra Zulu. Or How to Create a Feature Film About the Digital Age - and Why That’s Pretty Hard 16kbps - 64kbps
  • The Smartphone Penetration Testing Framework 16kbps - 64kbps
  • Social Engineering 16kbps - 64kbps
  • Solving More Than #firstworldproblems 16kbps - 64kbps
  • Spy Improv: Reality Unfiltered 16kbps - 64kbps
  • The State of HTTPS 16kbps - 64kbps
  • The State of Open Source Hardware 16kbps - 64kbps
  • Taking a Bite Out of Logs with Sagan 16kbps - 64kbps
  • Technology to Change Society: What Not to Do 16kbps - 64kbps
  • Testing the Two Party Tyranny and Open Source Everything: The Battle for the Soul of the Republic 16kbps - 64kbps
  • Twitter Revolution Meets Surveillance State: Now What? 16kbps - 64kbps
  • Using a Space Camp Model for Next Generation Security Training 16kbps - 64kbps
  • Using Browser-based Tools to Open Up the Web 16kbps - 64kbps
  • The Weather is Not Boring! Forecasting, Following, and Photographing Storms 16kbps - 64kbps
  • We Will Be Legion: Decentralizing the Web 16kbps - 64kbps
  • When the Founder is Gone: Longevity for Open Projects 16kbps - 64kbps
  • Why Browser Cryptography is Bad and How We Can Make It Great 16kbps - 64kbps
  • Why Names Matter: How Online Identity is Defining the Future of the Internet 16kbps - 64kbps
  • Why You Shouldn’t Write Off Higher Education, Young Grasshopper 16kbps - 64kbps
  • WikiLeaks, Whistleblowers, and the War on the First Amendment 16kbps - 64kbps
  • Your Cell Phone is Covered in Spiders! (An Overview of Mobile Device Security) 16kbps - 64kbps
Si quieres los vídeos, los puedes comprar aquí.

Fuente

Jul 27, 2012
HackingPodcastsSeguridad