Sunday, April 25, 2021
















A Cyber Workforce Research and Development Platform
CERT PCTC (Private Cyber Training Cloud) contains a library of instruction and reference information about cyber security, information assurance, incident response, computer forensics, and other vital information security topics.
https://pctc.cyberforce.site/lms


IETF officially deprecates TLS 1.0 and TLS 1.1
The driving force behind the deprecation process was the large number of attacks that were revealed in previous years and which impacted the cryptographic algorithms at the base of the two protocols.
This included attacks like BEAST, POODLE, ROBOT, SWEET 32, LUCKY 13, and others, all of which showed how attackers could take advantage of weaknesses in both SSL and TLS 1.0/1.1 to compromise encrypted communications and attack organizations.
IETF officially deprecates TLS 1.0 and TLS 1.1



Microsoft Package Manager
Microsoft has a Package Manager. It is like Linux Package Managers or Chocolaty in that it has a repository of current applications. It can also be set up to have your own repository of applications specific to your environment. So you can use Powershell to install a group of applications that you use for your own business use cases.
https://docs.microsoft.com/en-us/powershell/module/packagemanagement/?view=powershell-7.1

InfoSec Update

 INTRODUCTION TO ARM ASSEMBLY BASICS

The following topics will be covered step by step:

ARM Assembly Basics Tutorial Series:
Part 1: Introduction to ARM Assembly
Part 2: Data Types Registers
Part 3: ARM Instruction Set
Part 4: Memory Instructions: Loading and Storing Data
Part 5: Load and Store Multiple
Part 6: Conditional Execution and Branching
Part 7: Stack and Functions


MITRE Publications
We encourage our staff to share their knowledge with the public through a number of avenues, including publishing papers and speaking at conferences and symposia. You can find technical reports, white papers, and other related publications on a wide variety of topics on this site.


Database of Free / Open Access Online Computer Science Books, Textbooks, and Lecture Notes
(1243 books and growing)



Malware Unicors's reverse engineering workshops
Reverse Engineering 101
11 sections. This workshop provides the fundamentals of reversing 
engineering Windows malware using a hands-on experience with 
RE tools and techniques.

Reverse Engineering 102
18 sections. This workshop build on RE101 and focuses on identifying 
simple encryption routines, evasion techniques, and packing.

OffSec Tools I Like Tiny Core Tiny Core, a unique and minimalist distribution of the Linux operating system and tools. distro.ibiblio.org/tinycorelinux/…

htrace is a shell script for http/https troubleshooting and profiling. github.com/trimstray/htra… PCredz This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface. github.com/lgandx/PCredz Spiderfoot SpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of methods for data analysis, making that data easy to navigate. github.com/smicallef/spid… Pagodo a passive Google dork script to collect potentially vulnerable web pages and applications on the Internet. github.com/opsdisk/pagodo Amass github.com/OWASP/Amass The OWASP Amass Project performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques. TY @trimstray @PythonResponder @binarypool @jeff_foley

Friday, May 22, 2020

The Study of Tiny Motions being amplified, some to the point that you can hear it.




Video Magnification

Many seemingly static scenes contain subtle changes that are invisible to the naked human eye. However, it is possible to pull out these small changes from videos through the use of algorithms we have developed. We give a way to visualize these small changes by amplifying them and we present algorithms to pull out interesting signals from these videos, such as the human pulse, sound from vibrating objects and the motion of hot air.

http://people.csail.mit.edu/mrub/vidmag/



Eulerian Video Magnification for Revealing Subtle Changes in the World
Abstract

Our goal is to reveal temporal variations in videos that are difficult or impossible to see with the naked eye and display them in an indicative manner. Our method, which we call Eulerian Video Magnification, takes a standard video sequence as input, and applies spatial decomposition, followed by temporal filtering to the frames. The resulting signal is then amplified to reveal hidden information. Using our method, we are able to visualize the flow of blood as it fills the face and also to amplify and reveal small motions. Our technique can run in real time to show phenomena occurring at temporal frequencies selected by the user.



Eulerian Video Magnification code
Matlab code and executables implementing Eulerian video processing for amplifying color and motion changes.

Phase Based Video Motion Processing code
Matlab code implementing the new and improved phase-based motion magnification pipeline.

Learning-based Video Motion Magnification code
Tensorflow implementation of the learning-based motion magnification pipeline.

Videoscope
Web interface for motion and color magnification. Upload your videos and have them magnified!

Some Creative License with the Capability of Mixed Technologies for Malicious Intent





"Slaughterbot" Autonomous Killer Drones | Technology



Perhaps the most nightmarish, dystopian film of 2017 didn't come from Hollywood. Autonomous weapons critics, led by a college professor, put together a horror show.

It's a seven-minute video, a collaboration between University of California-Berkeley professor Stuart Russell and the Future of Life Institute that shows a future in which palm-sized, autonomous drones use facial recognition technology and on-board explosives to commit untraceable massacres.

The film is the researchers' latest attempt to build support for a global ban on autonomous weapon systems, which kill without meaningful human control.

They released the video to coincide with meetings the United Nations' Convention on Conventional Weapons is holding this week in Geneva, Switzerland, to discuss autonomous weapons.

"We have an opportunity to prevent the future you just saw, but the window to act is closing fast," said Russell, an artificial intelligence professor, at the film's conclusion. "Allowing machines to choose to kill humans will be devastating to our security and freedom."

In the film, thousands of college students are killed in attacks at a dozen universities after drones swarm campuses. Some of the drones first attach to buildings, blowing holes in walls so other drones can enter and hunt down specific students. A similar scene is shown at the U.S. Capitol, where a select group of Senators were killed.

Such atrocities aren't possible today, but given the trajectory of tech's development, that will change in the future. The researchers warn that several powerful nations are moving toward autonomous weapons, and if one nation deploys such weapons, it may trigger a global arms race to keep up.




https://www.youtube.com/watch?v=ecClODh4zYk

When you need to Boot from a USB Device, Rufus is your Tool




Rufus
Create bootable USB drives the easy way
Rufus is the lightest fastest USB creating tool I have had the pleasure of working with.