Updating the ole Wifi Pineapple today. Heading out to a wireless pentest next week. Haven’t done one in a while hopefully i can remember how it works 😉
Lately I’ve been spending most of my time at working doing various sorts of documentation like policies and procedures. Lots of policies and procedures. Today I decided to take a break from that and catchup on a few other things.
I discovered that there is a Visio 2007 Connector for the Microsoft Baseline Security Analyzer. Since we already keep things documented with Visio this caught my attention. It is really nice, I had to make a couple of adjustments to the maps and boom it was working. I don’t say it much but thanks Microsoft. Now I can quickly check any windows based machine from the map with a click. And it already helped me solve one issue.
Since I’ve joined the secret life of IT in banking, I don’t write much about specifics and tech as much as I once did. Believe me I do keep up with things and get to work on lots of very interesting projects.
I’m currently looking at the TriGeo SIM it’s one great logging device from what I’ve read. I’m wondering if anyone has any experience in setting up this device with FDIC / FFIEC / GLBA / insert bank acronym here log monitoring in mind. If you do leave I message I would love to contact you about this and how it’s working for you. I’m also going to post this over at Banktastic.
Sysinternals – RootkitRevealer “RootkitRevealer is an advanced root kit detection utility. It runs on Windows NT
4 and higher and its output lists Registry and file system API discrepancies that
may indicate the presence of a user-mode or kernel-mode rootkit.”
This is the first time I’ve seen this. I’ve know about simular things for linux, but now I have something to use on the few Windows Servers.
Phrack 60 is out, seems like just a year since 59 was out 🙂
“Bluetooth-enabled phones and PDAs with inadequate security could become the target of the next wave of security exploits, allowing phreakers to filch confidential information or even make calls using someone else’s identity. ” [more via The Register]
The first thing i did with my bluetooth devices was to lock them down. But i guess that not everyone knows about that.