Tor aka “The Onion Router” is a well known network running on top of the regular Internet. It protects the confidentiality of communications between users and regular online services. As the multiple layers of an onion, Tor is a worldwide decentralized network based on layers. When you need to connect
Category: Net
Tomahawk, your IDS/Firewall Best Friend
“Tomahawk” is the name of a popular cruise missile developed by General Dynamics in the seventies. But it is also the name of a free tool which helps to stress test security devices like firewalls or IDS. It has been written by Brian Smith from TippingPoint. This is well-known manufacturer
No, the Internet will not Colapse…
In May 2008, I wrote a blog post about IPv6 (Will Finally IPv6 Arise?) with a date: 2011. We reached the deadline foreseen and it’s now official: IANA is running out of IP addresses. IANA (“Internet Assigned Numbers Authority“) is the organization responsible of the assignments of IP addresses to
URL Filtering with Squid
Next to my digital life, I’m also the happy father of two young girls. The first one is already ten years old and smoothly discovers the “Wonderful Internet“. Being an Infosec guy, it sounds logical for me to implement some safeguards. First, let the technical stuff aside and talk! Some
Tunisia Tracks Users with JavaScript Injection?
Disclaimer: The information reported below has been translated from French to English with the approval of a friend who also released the information on his blog. His server was hit by a DoS attack. Feel free to relay the information! When you try to access big websites like Facebook, Google
Abuse Info Gathering Made Easy
If there is a boring task when you are investigating a security incident, it’s the process of gathering all information related to the involved IP addresses: What are the IP addresses used, routing information (AS), geo-localisation and abuse information gathering. Alexandre Dulaunoy wrote a cool piece of Perl code to
Is BGP the Next Threat on Internet?
When Internet ARPAnet was invented in the seventies, its goal was to interconnect military resources using packets based networks and to be strong enough to resist to “attacks”. Loosing some devices in the network could not affect the communications. Later, the same technology was re-used to build the public network
facebook.com Emails are Coming…
It has been announced by Facebook! E-mail addresses “@facebook.com” are coming! Scoop, I got some information leaked from a Facebook server: $ cd Ëœfacebookuser $ cat .procmailrc # All your emails are belong to us # — Mark Z. :0 * ^From.* { :0c ⎢/usr/local/bin/index.pl :0c ⎢/usr/local/bin/send_ads.pl :0c ^X-Privacy: yes
Searching for Sensitive Data Using URL Shorteners
URL Shorteners are online services which reduce the length of URL’s. Web applications are more and more complex and their URL’s can have multiple parameters like pages, sessionsID’s and much more. At the same time, we use services which limit the messages size (like Twitter) or devices (like SmartPhones) which
Smile, You Just Have Been Indexed!
I’m certainly not addicted to web stats. This blog has a Google Analytics marker but I don’t follow the statistics on a regular base. After all, I’m blogging for fun and I don’t need to keep my audience at a certain amount or don’t need to attract more visitors –