Monthly Archives: February 2012

Windows Desktops (Think Linux Workspaces)

One thing I quickly learned to love in Linux is Workspaces, being a dual monitor guy I thought it was a neat feature for those who don’t have a secondary monitor, or when you’re on the go and without a second for your mobile workstation. Being the tech I am, I took to Google and found a free Windows version of Workspaces, Desktops. Develeoped by Sysinternals, Desktops allows the use of 4 virtual desktops. Continue reading

ipv6ddos

Windows Denial of Service by IPv6 RA Packets

Any version of Windows with IPv6 installed and running is vulnerable to a DoS attack by sending thousands of Router Assignment (RA) packets. This vulnerability has been known since mid 2010, and you’re not the only one wondering why this hasn’t been patched yet. Here is a video demonstrating the attack on a LAN with 7, XP and virtual machines.

So as you can imagine, I wanted to give this a shot. I setup my VLAN and was astonished by the simplicity of the attack. Continue reading

Backtrack_5_Black

WEP Penetration with BackTrack

Previously, I gave you a quick run-down on cracking a WPA secured network, today I will be showing you how easy it is to crack a WEP secured network. Today’s lab is a Cisco E2100L, 64bit Open, and running dd-wrt. There are no clients on the network, but if there were clients on the network, I would still opt for the active attack.

Your card must support monitor mode and packet injection! If your laptop is relatively new, don’t expect BackTrack to work out of the box. Consult Aircrack-ng’s wiki for details regarding compatibility. The command parameters in this guide should be self explanatory (with the aid of screenshots), but that information can also be found in the wiki. Continue reading

malwarebytes

Malwarebytes Anti-Malware PRO Review

Malwarebytes Corporation is widely known for its (free) standalone anti-virus scanner,  Malwarebytes Anti-Malware (MBAM); having used it for nearly every virus removal, I have found it to be light-weight, easy-to-use, and it removes the bad guys 99% of the time. I run MBAM PRO on some of my personal machines and my family’s machines. My personal laptop sees various anti-malware applications on a regular basis. MBAM is just one of the few anti-malware scanners I recommend.

The free version is an on-demand scanner, so you will not see scheduled tasks, real-time protection, or their new feature, a flash memory scanner… Alright, enough inadvertent advertising, let’s talk about MBAM.

Continue reading

macchanger

Change Your MAC Address in Backtrack

In some scenarios, you may want to change/spoof (or clone) your MAC address; this task is easily accomplished within Backtrack: Open Terminal and run the following commands. Replace wlan0 with your specific interface (run ifconfig).

ifconfig wlan0 down
macchanger --mac 00:11:22:33:44:55 wlan0

Reboot the computer to restore your MAC address. Note you will not be able to use reserved addresses, broadcast, etcetera.