Texas Tech Security Group
Friday, September 13, 2013
Mapping Tor Relays and Exit Nodes
Introduction The Tor network is used by anyone who wants to maintain their online anonymity. There has recently been quite a bit ...
Friday, July 5, 2013
Building an SSH Botnet C&C Using Python and Fabric
Introduction Disclaimer: I suppose it would be wise to put a disclaimer on this post. Compromising hosts to create a botnet without aut...
Thursday, June 20, 2013
How Browsers Store Your Passwords (and Why You Shouldn't Let Them)
Introduction In a previous post , I introduced a Twitter bot called dumpmon which monitors paste sites for account dumps, configuration fi...
Wednesday, June 5, 2013
Smash the Stack IO Level 4 Writeup
Introduction It's been a while. I suppose finals, projects, etc. will do that. Anyway, I figured it was time to get back to posting co...
Thursday, March 28, 2013
Introducing dumpmon: A Twitter-bot that Monitors Paste-Sites for Account/Database Dumps and Other Interesting Content
TL;DR I created a Twitter-bot which monitors multiple paste sites for different types of content (account/database dumps, network devic...
Thursday, March 14, 2013
Installing Kali Linux in a VirtualBox Virtual Machine
Introduction For years, Backtrack Linux , a penetration testing suite from Offensive Security has been the standard operating system for s...
Monday, March 4, 2013
Automatically Enumerating Google API Keys from Github Search
Introduction Github recently introduced its new and improved search feature . While the improvements make search for content much easie...
View web version