Saturday, 23rd November 2024.

Posted on Wednesday, 23rd September 2009 by Michael

For years now we have been using Joomla as our Content Management System but we have decided to stream line all our sites to use word press instead. Please bear with us as we update links and content to work with the new CMS. We are also working on a new logo and will hopefully […]

Posted in Blog | Comments (0)

Posted on Wednesday, 23rd September 2009 by Michael

BlackBerry Firewall guide A few months ago I wrote for Informit.com and had my buddy Seth Fogie publish my article that I wrote on the BlackBerry Firewall. You can find the article here: http://www.informit.com/guides/content.aspx?g=security&seqNum=348

Posted in Papers | Comments (0)

Posted on Wednesday, 23rd September 2009 by Michael

Authentication Proxies: Secure or Not? A while back I wrote on cached credentials and proxy authentication in regards to spyware. Well I rewrote the paper and cleaned it up a bit. I then had informit.com publish it for me. to see it check out the url below.  This one includes the .net code to make […]

Posted in Papers | Comments (0)

Posted on Wednesday, 23rd September 2009 by Michael

Fun with Poison Ivy Poison Ivy is a remote access Trojan (Tool) that can be found at the following URL: http://poisonivy-rat.com and a support forum can be found here http://ratforge.net/forums/ . Please note that these are Trojans and www.digitaloffensive.com nor any of its staff are responsible for any use or misuse that you do with […]

Posted in Papers | Comments (0)

Posted on Wednesday, 23rd September 2009 by Michael

CACHED CREDENTIALS, PROXY AUTHENTICATION and SPYWARE OH MY! Recently a client of mine and I had a long winded debate about the dangers of not protecting machines from spyware and other malware. The client swore up and down that since they had an authenticating proxy that required the windows cached credentials to access the internet […]

Posted in Papers | Comments (0)

Posted on Wednesday, 23rd September 2009 by Michael

The IRS has partnered up with China to help you get a tax bonus! As some of you know my day job has me providing security guidance to a large user base that vary in their technical skills. Every day we get several requests that come in asking us weather something is a scam or […]

Posted in Papers | Comments (0)

Posted on Wednesday, 23rd September 2009 by Michael

More IRS Shenanigans Today our director of Internal Audit dropped on my desk a printed email that looked exactly the same as the scam email I wrote about a few weeks ago in the post called “The IRS has partnered up with China to help you get a tax bonus!”. I figured since I had […]

Posted in Papers | Comments (0)

Posted on Wednesday, 23rd September 2009 by Michael

I am not your Pal. How to detect PayPal-based phishing scams. The term phishing originated by taking the term fishing, meaning to bait and catch, and using a language of the computer underground where they commonly replace the letter F with PH. Digital criminals use cunning techniques to trick their victims into taking the bait […]

Posted in Papers | Comments (0)

Posted on Wednesday, 23rd September 2009 by Michael

Instant IDS v1.0 Instant IDS v1.0 is a custom shell script that will automatically download, configure and run Snort IDS and BASE web gui. Though this script has been tested in-depth I the author do not guarantee it will work and or not harm your system. Since this is a shell script and can be […]

Posted in Code | Comments (2)

Posted on Wednesday, 23rd September 2009 by Michael

Null Session Scanning For a recent audit I was tasked with checking a class C network for null sessions. The task itself sounds simple doesn’t it? But I am not one to just run a quick scan without verifying my work. This caused a interesting discovery. My first run at the network I used NTscan […]

Posted in Code | Comments (0)

About Consulting Store