Sunday, August 21, 2011
Reminiscing the Hacker’s Manifesto
Have you guys heard of the Hacker’s Manifesto?
The Hacker’s Manifesto
Shipcode is an InfoSec enthusiast from Cebu. During his high school days he was just an ordinary script kiddie. He loves to search for web exploits and other issues concerning network / wireless security.
ROOTCON is managed by like minded InfoSec professionals across the Philippines. All rights reserved. Designated trademarks, brands and articles are the property of their respective owners.
Friday, August 19, 2011
NodeZero supports ROOTCON 5
As a brief introduction, NodeZero is Ubuntu based linux designed as a complete system which can also be used for penetration testing. NodeZero uses Ubuntu repositories so your system will be always up to date.
NodeZero is packaged with around 300 tools for penetration testing and set of basic services which are needed in penetration testing.
This is a good tool you ought not to miss!
Proof of their support for ROOTCON 5:
Follow our friend at http://netinfinity.org/
Grab a copy on September 9 and 10, 2011 at Parklane International Hotel, Cebu City, Philippines.
About the Contributor:
A self-confessed blogger minus the coffee. He maximizes his skills in consultancy, project management, professional networking, social media campaigns and very active in conceptualizing things. To date he already conducted several IT / Information Security events as his passion since 2007. Currently he's working as a Technical Support Specialist in a local company.
ROOTCON is managed by like minded InfoSec professionals across the Philippines.
All rights reserved. Designated trademarks, brands and articles are the property of their respective owners.
Thursday, August 18, 2011
Cool Ubuntu Shell Account
But there are some flaws in their project because they allow too much background which could possibly be used for illegal activities. We could not deny the fact that some users may tend to abuse their privileges as a user like using it for udpflooding, tcpflooding, hosting botnets, scanning SSH, etc. because of allowing too much background processes. Maybe next time they should put some limit to prevent abuses in their server.
About the Contributor:
Shipcode is an InfoSec enthusiast from Cebu. During his high school days he was just an ordinary script kiddie. He loves to search for web exploits and other issues concerning network / wireless security.
ROOTCON is managed by like minded InfoSec professionals across the Philippines. All rights reserved.Designated trademarks, brands and articles are the property of their respective owners.
Tuesday, August 16, 2011
Thoughts on the Operation Shady Rat
Let it be known that the year 2011 is best described as the Year of the Hackers. And I know, one way or another you will agree or disagree with me. But hey! The media publicized these sophisticated security attacks targeting CIA, US Senate, Sony, PBS, Philippine Congress and the list continues. All of these attacks are attributed to hacker groups such as AntiSec, Anonymous and LulzSec.
I have been quiet for a couple of days because of constant research of this unprecedented cyber-espionage campaign which was discovered in the year 2006 because of the logs which was discovered by McAfee. In fact, some people blame China and Russia behind this espionage but it should be noted that McAfee disclaimed that China or Russia is responsible for this and that they also declined to reveal the source where the “Shady RAT” came from.
I’m not really sure who suggested that China should be blamed for this but I think they blamed some of the Chinese hackers because of the recent information gathering they made. It is said that in the past years, they have stolen highly confidential information that is kept secret in supercomputers in the US. But the Chinese government denied its involvement of the said campaign.
Some people may also say that it’s the Russian government because of the unforgotten Cold War between the US but then again it is really unfair to point our fingers to Russia and China because of insufficient evidence against them. All countries are innocent until proven guilty.
I guess McAfee has unleashed a new media storm because of their discovery since 2006. Their rival company, Symantec also posted its own analysis of the campaign and was skeptical of its impact. "Is the attack described in Operation Shady RAT a truly advanced persistent threat? I would contend that it isn’t, especially when you consider the errors made in configuring the servers and the relatively non-sophisticated malware and techniques used in this case," Symantec's Hon Lau wrote in a blog post.
"Sure the people behind it are persistent but no more than the myriad of other malware groups out there such as Zeus, Tidserv, and others like them," said Lau.
Although, it is highly controversial and questionable why McAfee discovered this campaign before any antivirus company or government agency; but could it be possibly an excuse to put blame on China? That I’m not sure of and I lay my hands off regarding this case.
To our valuable readers, I’ll give you a room for your opinions and views regarding this campaign. If you ask me, I have 60% trusts on this revelation. Whether this is true or not, there are questions that will cloud up our minds. So are we ready for this cyber espionage and cyber terrorism?
ROOTCON is managed by like minded InfoSec professionals across the Philippines. All rights reserved.Designated trademarks, brands and articles are the property of their respective owners.
Monday, August 15, 2011
Do You Need Snort for Intrusion Detection?
If you haven't heard of Snort, you may be surprised at how much this system has to offer for FREE!
Snort has a proven track record, excellent performance and accuracy that will surely be around for a long term.
There are many products out there and some of them are rather expensive. Snort is an open source IDS (intrusion detection system) which is just as powerful and popular as any commercial product.
However, the big down side is that you don't have a customer support to help you out and you have to teach yourself on how to install, configure and maintain your IDS.
I know a former colleague of mine who has a good experience in using Snort. I'm not sure if he's available for an invitation to give a talk.
Well, if you're one of the good guys out there who loves to share your knowledge, then by all means contact us at info[at]rootcon[dot]org. We can have an informal meet-ups. After all, we are here to share and be part of ROOTCON community.
Stay Safe!
About the Contributor:
A self-confessed blogger minus the coffee. He maximizes his skills in consultancy, project management, professional networking, social media campaigns and very active in conceptualizing things. To date he already conducted several IT / Information Security events as his passion since 2007. Currently he's working as a Technical Support Specialist in a local company.
All rights reserved. Designated trademarks, brands and articles are the property of their respective owners.
Real-time PC Security Protection
WinPatrol is a nice little program that will alert you when there is any change to your system without your permission, allowing you to detect many security related issues in real-time.
This program is created by a Studio founder and industry insider named Bill Pytlovany.
These days Bill is better known for his contribution in helping increase the performance and security of hundreds of thousand of computers.
If you don't know him that much, direct your mouse and click his website at www.winpatrol.com/download.html.
Do you want to be our Guest Blogger?
ROOTCON Blog section is open for anybody who wish to be our guest blogger. Feel free to contact us at info[at]rootcon[dot]org.
Stay safe!
About the Contributor:
A self-confessed blogger minus the coffee. He maximizes his skills in consultancy, project management, professional networking, social media campaigns and very active in conceptualizing things. To date he already conducted several IT / Information Security events as his passion since 2007. Currently he's working as a Technical Support Specialist in a local company.
All rights reserved. Designated trademarks, brands and articles are the property of their respective owners.
Saturday, August 13, 2011
Vatican Library Uses Linux and UNIX
The Vatican Library's Website revealed that The Information Technology Center (C.E.D.) of the Vatican Library uses Red Hat. C.E.D.’s networks “are protected internally by two first-level firewalls in a Linux Red Hat environment”. But that’s not all. It is also revealed that of the 27 servers the IT Center uses, 19 are in a SUSE and Red Hat environment. The rest are running in a UNIX AIX environment and in a Microsoft environment (virtualized on Linux systems with VMware).
It all began in 1985 wherein the system “uses a Geac 8000/F system with about ten terminals in serial connection at 9,600 bps. The birth of the URBS network, five years later, brought about a substantial upgrade of the system, and the number of terminals was increased to about fifty, of which fifteen have a baseband connection to the relevant remote access points at 9,600 bps.
As a Catholic Linux enthusiast and an ex-seminarian, it’s a good thing that the Vatican sees the Free and Open Source Movement as beneficial to the Catholic Church. Open source is better than a closed source which is costly. According to Fr. Stephen Cuyos, MSC (A Filipino Priest who blogs about Linux and Free/Open Source Software), “The philosophy of Free and Open Source Software (FOSS) is based on cooperation, common good and mutual benefit, and is in many ways consistent with the Catholic Church’s preferential option for the poor.”
It should also be noted that Richard Stallman and Linus Torvalds totally rock!
About the Contributor:
Shipcode is an InfoSec enthusiast from Cebu. During his high school days he was just an ordinary script kiddie. He loves to search for web exploits and other issues concerning network / wireless security.
ROOTCON is managed by like minded InfoSec professionals across the Philippines. All rights reserved.Designated trademarks, brands and articles are the property of their respective owners.