Sunday, 3 November 2013

Best of InfoSec Institute Resources – Compiled 2013

InfoSec Institute brings the heat five days a week with new free content on Security, Forensics, Networking, Project Management, Reverse Engineering, and many others.

With over 252 articles, interviews, and videos so far in 2013. It's hard to highlight all the free resources they’re making available for us each month. Many great additions don't even crack the top 10 they’ve listed below.

Top 10 Most Popular Articles for the month

Autumn 2013

This edition: Botnets & cybercrime, an anonymous submission, more mobile, and many other topics you or your peers have singled out!

1. Anti-Forensics - Learn the weaknesses at each phase of the forensics process.
2. Botnets & Cybercrime - Part 1 of a 3-part series that includes botnet hunting and case studies
3. pcAnywhere Leaked Source Code - An anonymous code review & analysis of the leak was emailed to us; we're sharing it with you.
4. Attacking the Phishers - An autopsy on compromised phishing websites
5. RootSmart: New Android Malware - Learn about new malware that is quickly gaining root access to your phone
6. Hacking VMware using VASTO - Virtualization security - this has been a hot topic for our readers.
7. Writing Self-Modifying Code - The 3-part series wraps up with an in-depth tutorial on antivirus evasion
8. De-anonymizing users through timing analysis attacks - You didn't really think you were anonymous, right?
9. How to Penetration Test iPhone Apps - We cover the entire application penetration testing methodology on a physical device
10. Which Certification should I get? and which translate to the highest pay premiums?

July 2013

This edition: How Edward Snowden Protected Information, 19 Extensions for turning Google Chrome into a Pentesting Tool, an IPV6 Overview, ZeroAccess Botnet and much more!

2.    IPv6 Overview

August 2013

This edition: The convenience of Google Chrome Extensions, Android Forensics, Handy Devices Revolution, Steganography and much more topics that will blow your mind!

1.    Android Forensics: Cracking the Pattern Lock Protection- Need to bypass the gatekeeper on a locked Android? We'll show you how.
2.    Cybercrime as a Service - In the digital age, this hacker's for hire.
3.    Steganography: What Your Eyes Don't See - Data hidden in plain site, explained.
4.    Hacker Proofing Apache & PHP Configuration- Do you use Apache? Here's how to stay secure.
5.    Dictionary Attack Using Burp Suite - By definition, a method of cracking password codes by the book.
6.    Keyloggers: How They Work and More - The what and why of a popular device for tracking a user's every move.
7.    Malicious Firefox Add-Ons: Keylogger - This tool of the cyber spy's trade, examined further.
8.    Geocoding Router Log Data - So where does all your secret information end up when malware arrives?
9.    Handy Devices Revolution: Another Set of Embedded Devices & Dev Boards - Some cool embedded gadgets that you can really use.
10.  Owned by Chrome Extensions - The convenience of Google Chrome Extensions; what could go wrong? Plenty!

September 2013

This edition: Hacking Satellites, PsyOps and Socialbots, NSA's Surveillance Program, Security and Hacking Apps for Android, and much more free training!

1. Security and Hacking Apps for Android Devices - With mobile gadgets fast overtaking desktop computers in popularity, how can a hacker launch an attack from their hand-held device?
2. Penetration Testing of an FTP Service - Testing and protecting your FTP service against vulnerabilities.
3. NSA Surveillance is Changing User's Internet Experience - Think you're safeguarded against undue government surveillance? Guess again!
4. OSINT (Open-Source Intelligence) - Interested in conducting some due diligence? Here are the free go-to resources.
5. Social Engineering: A Hacking Story - The best defence in a world where cyber-dangers lurk around every corner is vigilance. Here are some simple ways to minimize the dangers.
6. Hacking Satellites...Look Up to the Sky - Satellites perform an array of vital functions in our lives: how vulnerable are they?
7. XKeyscore: NSA's Surveillance Program - More on what the NSA is doing in the name of safeguarding against terrorists - and how.
8. The Hunt for Memory MalwareAnalyse your computer's memory to uncover the behaviours of hidden malware.
9. Phishing with Data URI - Online scamming takes a leap forward by drawing victims to unhosted sites.
10. PsyOps and Socialbots - How social media is manipulated for mind control - swell!

October 2013

This edition: Phishing Counter Measures, Port Scanning Using Scapy, Hardware Attacks & Backdoors, File Carving, more malware, and many other resources that will expand your knowledge!

1. Port Scanning Using Scapy - Instead of Nmap, try Scapy to simplify the job of port scanning.
2. Some Cool DIY Raspberry Pi Projects - Hardware hackers: for those of you with a DIY bent, here’s some fun stuff to play with on your $35 mini-computer.
3. Portable Malware Lab for Beginners - A follow-up to our popular article from May; this one shows how to more fully develop our own Malware Lab with reversing tools.
4. File Carving - Uncover data from corrupt or missing files with this great forensics process.
5. Hesperbot: An Atrocious Banking Trojan - As uncovered by the researchers at ESET, Hesperbot is a dangerous trojan used against banking customers.
6. Hardware Attacks & Backdoors - Common hardware contains backdoor vulnerabilities: presented here are strategies to safeguard yourself.
7. BEAST vs. CRIME Attack - Protect yourself against these two widely publicized SSL attacks.
8. Layer Seven DDoS Attacks - The bad news is that these are hard to prevent entirely. The good news: here are some measures you can take. 
9. Phishing Counter Measures Unleashed! - Forewarned is forearmed: stay a step ahead of the hackers with these easy-to-understand strategies.
10. How to Prevent Cross-Site ScriptingAttacks - Discover ways to protect your site from XSS attack and   keep your customer’s data safe; open source libraries provided, too.


These articles are just a few of their recently posted resources, but there are many more posted daily here.

0 comments: