Abstract:

“Many organizations are faced with the challenge of providing a “guest” wireless network. This network is intended to provide your guests, such as contractors, visiting faculty, patients, or training rooms, consultants, with wireless access to the network.”

Abstract:

“Security incidents come in many forms, from attackers breaking into computers, unauthorized attempts to sniff wireless networks and collect information, and stolen laptops or phones. This example is the latter, a stolen smartphone.”

Abstract:

“Embedded devices can often perform the same tasks as workstations and servers while consuming less space and power, generating less heat, and being more cost-effective. Paul Asadoorian describes why you’d want to “hack” (install new firmware on) embedded devices, and which hardware and firmware choices are the best, so you can make your $40 router do things typically found in a $600 device!”

Abstract:

“…this article will focus on ex-ploring vulnerabilities, and associated risk, with wireless access points, routers, printers, and some other common devices on the network. The methods of vulnerability discovery and defense against attacks can be applied to many different types of embedded devices in different environments.

Abstract:

“This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.”

Abstract:

“Mac OS X has one of the more secure default installations. However, as OS X gains popularity, attackers tend to take notice. We see more hacking tools, articles, and security incidents related to OS X as time goes on. Thankfully OS X’s BSD-based subsystems make it very configurable, especially when it comes to security settings, which helps to set it apart from the rest. Below are some tips to get you started securing OS X.”

Abstract:

“There has been much debate lately between two different browsers, namely Microsoft¿s Internet Explorer and the Mozilla Project¿s Firefox web browser. Security is in the center of this debate, accompanied by features and usability. This article will focus on the security aspects, particularly the risks involved with running any web browser and how to overcome some of these security shortcomings.”

Abstract:

“IPAudit is a handy tool that will allow you to analyze all packets entering and leaving your network. It listens to a network device in promiscuous mode, just as an IDS sensor would, and provides details on hosts, ports, and protocols. It can be used to monitor bandwidth, connection pairs, detect compromises, discover botnets, and see whos scanning your network.”

Abstract:

“I am often asked what it is the average user can do on their home networks to secure their own wireless implementation. Quite frankly, I never have any really good answers, at least ones I am truly comfortable with. I tell them to use encryption (WEP, or Wireless Equivalent Privacy), MAC address filtering, and don¿t broadcast the SSID.”

Abstract:

“Many environments that I encounter are using a Defense-In-Depth network security strategy. They have implemented firewalls, Intrusion Detection, VPN, and have a good security policy. When asked, however, how they manage their large installation of Cisco network devices, the reply many times is clear-text telnet, no username/password authentication combination, and very little in the way of auditing logs. The goal of this paper is to provide an easy guide for network administrators to implement secure remote access for all Cisco networking equipment.”

Abstract:

“NULL sessions take advantage of ¿features¿ in the SMB (Server Message Block) protocol that exist primarily for trust relationships. You can establish a NULL session with a Windows host by logging on with a NULL user name and password. Using these NULL connections allows you to gather the following information from the host…”

  • Network Intrusion Detection, Third Edition. Nothcutt, Novak. pg. 267-268.

Abstract:

“This paper looks at tools and methods for auditing metadata available via the internet in common file types. It includes examples of the tools, how to acquire the electronic documents (and the associated risks), and how to analyze the data. We’ll employ real world scenarios highlighting some of the tools to conduct reconnaissance, and show how we can utilize the information we’ve gathered to deliver a specific, targeted client side attack with high confidence that it will be successful. This paper will show how often forgotten document metadata can lead to getting you owned.”

Abstract:

“This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.”

Abstract:

“This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.”

Abstract:

“Many smaller organizations can benefit from rogue wireless access point detection while utilizing a very limited budget. This GIAC Honors paper illustrates how to build such a system with inexpensive hardware, and covers design considerations and issues related to the system.”

Abstract:

“How I made Karma work for me after trials and tribulations under Ubuntu 6.06 LTS with Madwifi-old. “

Abstract:

“Ethereal Network Protocol Analyzer Toolkit provides the reader with a completely integrated book and companion Web site to analyze network traffic using Ethereal, the world’s most popular network protocol analyzer on Windows, Unix, and Apple OS X. This book covers everything from the fundamentals of protocol analysis, to analyzing real world malicious code to programming advanced protocol dissectors.”

  • Best Of Network Penetration Testing Tools – January 2009 pdf - January 2009, Whitehatworld Monthly Webcast with Paul Asadoorian, Larry Pesce, & John Strand. Topics: Nmap, Nessus,Metasploit, Pass-the-Hash, Hydra, Cain & Able, Core Impact
  • Best Of Web Application Penetration Testing Tools – April 2009 pdf - April 2009, Whitehatworld Monthly Webcast with Paul Asadoorian, Mick Douglas, & John Strand. Topics: Nikto, Webscarab, w3af, Firefox (Firebug, YSlow, TestGen4Web), Cenzic Hailstorm, Core IMPACT, Inguardians’ Samurai

  • Getting Started In Information Securitypdf - How to get started in Information Security
  • Getting A Better Pen Testpdf - How to get a better Pen Test / How to become a better Pen Tester
  • Attacking Embedded Systems: No Axe Required – 2013 pdf - Embedded device vulnerabilities, detection, enumeration, and light reverse engineering
  • Finding All The Ninjas in the Forestpdf - Web Application Testing

    Strategies

  • Random Shit That Paul Is Going To Talk About – September 2012 pdf - Random shit, DerbyCon 2012
  • Zen & The Art Of An Internal Penetration Testing Program – June 2009 pdf -June 2009, Penetration Testing & Web Application Attacks Summit, Vegas
  • Zen & The Art Of An Internal Penetration Testing Program – Part II – April 2009 pdf - April 2009, Core Security Technologies Webcast. Topics: Tips and tools for Exploitation, Post-Exploitation, Reporting phases
  • Late Breaking Computer Attack Vectors – December 2008 pdf - December 2008, Whitehatworld Monthly Webcast. Topics: BotNet defense[Snort, ShadowServer.net], Top 5 Defensive Recommendations
  • Zen & The Art Of An Internal Penetration Testing Program – Part I – November 2008 pdf - November 2008, Core Security Technologies Webcast. Topics: Target Identification tools, Detecting hosts/services, Identifying Vulnerabilities
  • Late Breaking Computer Attack Vectors – October 2008 pdf - October 2008, Whitehatworld Monthly Webcast. Topics: MS08-067, autopwning, Keystroke recording research, By-passing AV
  • Late Breaking Computer Attack Vectors – September 2008 pdf - September 2008, Whitehatworld Monthly Webcast Topics: Nmap parsing, Botnet/SQL injection defense, Anti-theft tips
  • Late Breaking Computer Attack Vectors – August 2008 pdf - August 2008, Whitehatworld Monthly Webcast Topics: Post-exploit defense, Nmap research results, Social Network Defense
  • Late Breaking Computer Attack Vectors – July 2008 pdf - July 2008, Whitehatworld Monthly Webcast Topics: Securing OS X, Karma, Terry Childs case
  • Late Breaking Computer Attack Vectors – June 2008 pdf - June 2008, Whitehatworld Monthly Webcast Topics: IDS/IPS, Cisco Rootkits, VZN Business Data Report
  • Late Breaking Computer Attack Vectors – April 2008 pdf - April 2008, Whitehatworld Monthly Webcast Topics: Kiosk insecurity, Inside != Secure, Hacking desks, Auth Bypass, Daknets
  • Late Breaking Computer Attack Vectors – March 2008 pdf - March 2008, Whitehatworld Monthly Webcast Topics: Social Network Defense, Sneakernet Defense
  • Late Breaking Computer Attack Vectors – February 2008 pdf - February 2008, Whitehatworld Monthly Webcast Topics:Vendor shipped vulnerabilities, Security process management
  • Things That Go Bump In The Network – Embedded Device (In)Security pdf - January 2008 SANS New Orleans/SANS Webcast/REN-ISAC Webcast
  • Wireless Network Security – March 2006 pdf - March 2006, , Providence, RI
  • Vulnerability Summary – October 2005 pdf - October 2005, OSHEAN Shore Patrol Meeting
  • Paul’s Top Ten Security Tips Courseware, Version 3.3 (Updated 07/2005) pdf - July 2005 – Brown University
  • Paul’s Top Ten Security Tips Handout, Version 3.3 (Updated 07/2005) pdf - July 2005 – Brown University
  • Buying and Securing Your Computer – June 2005 pdf - June 2005, Brown University Staff Development Day
  • Buying and Securing Your Computer Handout – June 2005 pdf - June 2005, Brown University Staff Development Day
  • Vulnerability Summary – March 2005 pdf - March 2005, Brown University SysAdmin Group
  • Vulnerability Summary – January 2005 pdf - January 2005, Brown University SysAdmin Group
  • Vulnerability Summary – November/December 2004 pdf - December 2004, Brown University SysAdmin Group
  • Vulnerability Summary – October 2004 pdf - October 2004, Brown University SysAdmin Group
  • Paul’s Top Ten Security Tips Courseware, Version 2.0 pdf - September 2004 – Brown University, February 2005 – ISACA New England Chapter
  • Vulnerability Summary – September 2004 pdf - September 2004, Brown University SysAdmin Group
  • 3 Easy Steps To A Spyware-Free Computer pdf - September 2004, Brown University
  • Vulnerability Summary – August 2004 pdf - August 2004, Brown University SysAdmin Group
  • IE: Internet Exposure – Internet Explorer Vulnerabilities and What You Can do About Them pdf - OSHEAN Shore Patrol Meeting, July 8, 2004
  •  Vulnerability Summary – June 2004 pdf - June 2004, Distributed Electronically to Brown Sysadmin Group presented at OSHEAN Shore Patrol Meeting, July 8, 2004
  • Buying and Securing Your Home Computer – June 2004 pdf - June 2004, Brown University Staff Development Day
  • Vulnerability Summary – May 2004 pdf - May 2004, Brown University SysAdmin Group
  • Vulnerability Summary – March 2004 pdf - March 2004, Brown University SysAdmin Group
  • Vulnerability Summary – February 2004 pdf - February 2004, Brown University SysAdmin Group
  • Vulnerability Summary – January 2004 pdf - January 2004, Brown University SysAdmin Group
  • Vulnerability Summary – October 2003 pdf - October 2003, Brown University SysAdmin Group
  • Automated Patching pdf - September 2003, Brown University SysAdmin Group
  • Vulnerability Summary – September 2003 pdf - September 2003, Brown University SysAdmin Group
  • #Owning Academia – Attacking and Exploiting University Networks pdf - September 22 2003, IVY+ Security Group Meeting, Brown University
  • Fun With Wireless and Firewalls pdf - August 19 2003, MIT Security Camp
  • Vulnerability Summary – June 2003 MISSING! Sorry… – June 2003, Brown University SysAdmin Group
  • Vulnerability Analysis Using Nessus pdf |html - May 2003, ISACA New England Chapter
  • Vulnerability Summary – April 2003 pdf |html - April 2003, Brown University SysAdmin Group
  • Firewall Tips & Tricks pdf | html- November 2002, Brown University SysAdmin Group
  • Adventures In Incident Handling pdf |html - August 2002, MIT Security Camp
  • Securing Microsoft IIS pdf |html - February 2002, Brown University SysAdmin Group
  • Introduction to IPsec pdf |html - July 2001, Brown University SysAdmin Group
  • Buffer Overflows – The TSIG Example pdf| html - May 2001, Follow-up presentation to the TSIG paper

  • P2P Information Disclosure pdf -June 2009, PenTest Summit ’09, Vegas
  • Where to now? An adventure in GPS tracking pdf -March 2009, SANS NS2009 Orlando
  • Document Metadata, the Silent Killer pdf -SANS NS2009 Orlando, Updated with even more content
  • Late Breaking Computer Attack Vectors – January 2009 pdf -January 2009, Whitehatworld Monthly Webcast Topics: Cisco IOS Attacks, THC-Hydra, Twitter Password fail
  • Late Breaking Computer Attack Vectors – November 2008 pdf - November 2008, Whitehatworld Monthly Webcast Topics: PDF & Javascript, Metasploit 3.2 updates, EXIFtool, WPA/TKIP cracking
  • Late Breaking Computer Attack Vectors – May 2008 pdf - May 2008, Whitehatworld Monthly Webcast Topics: iPhone wipes, Trenchcoat Phlasher
  • Document Metadata, the Silent Killer pdf - April 2008, OSHEAN Shore Patrol, DEFCON 16
  • Hiding Rogue APs for “Penetration Testers” – a tongue in cheek, soldering iron in hand look at hiding rogues pdf - June 2008, SANS Pen-test Summit, Shmoocon 4, DEFCON 15 Wireless Village, DEFCON 16

  • Late Breaking Computer Attack Vectors – February 2009 pdf - February 2009, Whitehatworld Monthly Webcast

  • Late Breaking Computer Attack Vectors – March 2009 pdf - March 2009, Whitehatworld Monthly Webcast Topics: Rogue DHCP server malware, DLP 101, L0phtcrack 6