Kismet Drone Building Guide

2011-04-08T13:15:44+00:00 July 13,2010|Hackers For Charity, Informer Blog, Long Journey To Africa|

The Kismet Drone is a very useful device for anyone responsible for monitoring a wireless network. They allow you a remote presence to sniff the air from anywhere on your LAN or over the internet using cheap and easily available embedded routers. The RenderLab has updated and rewritten the previous Kismet Drone guide for modern builds of OpenWRT and Kismet Newcore and decided to release it ahead of HOPE and Defcon for 30 days to the Informer.

Katana Security Distro v1.0

2011-04-08T13:29:04+00:00 October 26,2009|Hackers For Charity, Informer Blog, Long Journey To Africa|

Thanks to Ronin over at http://www.hackfromacave.com for this addition! Katana v1.0 (Kyuzo) is now available for all Informer subscribers. Click here: https://www.ihackedyour.org/?pagename=SumaSubscribe if you'd like to subscribe!

Katana v1.0 (Kyuzo) is a portable multi-boot security suite designed for all your computer security needs. The idea behind this tool is to bring together all of the best security distributions to run from one USB drive. Katana includes distributions which focus on Penetration Testing, Auditing, Password Cracking, Forensics and Honey Pots. Katana comes with over 100 portable Windows applications such as Wireshark, HiJackThis, Unstoppable Copier, and OllyDBG. Also included in this distribution are:

* - Backtrack 4 pre
* - the Ultimate Boot CD
* - Organizational Systems Wireless Auditor (OSWA) Assistiant
* - the Ultimate Boot CD for Windows
* - Got Root? Slax
* - Ophcrack Live
* - Damn Small Linux
* - Damn Vulnerable Linux


Here are the mirrors:

WeakNet Linux Assistant 3 Lite

2011-04-08T13:29:04+00:00 October 23,2009|Hackers For Charity, Informer Blog, Long Journey To Africa|

WeakNet Linux Assistant 3 Lite (WNLA) is ready! Thanks to Douglas at WeakNet Labs (http://weaknetlabs.com), it’s available exclusively to Informer subscribers this week. A must-have for anyone interested in Security or Forensics, this CD-sized distro contains all the tools you need to test your skills and excel in the field of INFOSEC. Some of the highlights:

* WNLA 3 is ~600MB (last releases were roughly 1~1.5GB)
* WNLA has many new GUI interfaces for things (helps people make the transition from Win32/64 to Linux)
* WNLA has instant servers including (MySQL, FTP, SSHd, FastTrack-GUI, Metasploit-Web Brick, and more)
* WNLA has it’s own PHP/MySQL Social Networking server that i coded (resembles Facebook) to use in the lab to teach people about web hacking PHP/MySQL and SQL injection.
* WNLA has new looks including Grub splash, Usplash, GDm and more.
* WNLA includes WardriveSQL GUI and Webserver that i coded (http://wardriveSQL.info).
* WNLA includes GUI interface to WiFiZoo that i coded (which is to be added into the next build/website, under 3rd party additions)
* WNLA uses fully customized/customizable FluxBox instead of bloated Gnome and less-bloated (but amazing) Enlightenment.
Links available to paid subscribers of Informer only. Click here to subscribe. It’s only $54 a year, and the proceeds go directly to HFC projects such as our food program in Kenya (http://hackersforcharity.org/food-program) and our Classroom project in East Africa (http://hackersforcharity.org/classrooms).

Here’s the links….

Prison Break (Breaking, Entering & Decoding) Challenge Answers

2011-04-08T13:29:05+00:00 September 30,2009|Hackers For Charity, Informer Blog, Long Journey To Africa|

The Ethical Hacker Network (EH-Net) teams with The Informer. The EH-Net contribution will be the answers to the Skillz H@ck1ng Challenges a few days before they are revealed on EH-Net. We start this moth with the answers for the last hacking challenge published on August 2009, "Prison Break – Breaking, Entering & Decoding" (Subscribers Only).

Raw Patch Management Survey Data (Project Quant)

2011-04-08T13:34:27+00:00 August 7,2009|Hackers For Charity, Informer Blog, Long Journey To Africa|

Over at Securosis we've been working on a big project (called Project Quant) with Microsoft to develop a rigorous patch management metrics model. We ended up with a 40+ page report including over a hundred metrics in a 10 phase, 40 step patch management process framework. You can read about it here. This was a community project, with participation from a bunch of different people and groups. But, for this community, the more interesting part was the survey we conducted. We performed an open survey on patch management processes that included some of the biggest, and smallest, organizations around (and are keeping the survey open). While we released a summary analysis with the initial project report, we are now releasing the raw survey data. This data has been anonymized, but otherwise unaltered. We had about 116 responses when I did this data dump, and keep in mind the results likely skewed towards more mature organizations (since they'd be more incented to participate). This data will be exclusive here at the Informer for one week before we release it to the broader community.