Memory Forensics

Posted by & filed under Forensics, Security.

Dumping out a image of the current memory set for further analysis seems to be a much better approach to finding hidden processes, open ports, etc. is a good article on it. In a nutshell provides a suite of tools. Once he image gets dumped, you can analyze it with analyze.bat which will… Read more »

RedHat LVM Expansion Fiasco

Posted by & filed under Linux, Server Admin.

Finally I figured out a procedure for resizing the LVM partition. A server’s /usr partition has been dangerously full for some time now so this has become a priority. Procedure: Resize VHD with VhdResizer fdisk /dev/hda Add a new primary partition (hda4 for this list) Reboot Tell LVM about the new physical volume pvcreate /dev/hda4… Read more »


Posted by & filed under Projects, WiFi.

I got my powered USB hub in the mail today. Hopefully I can make it power the NSLU2.

Ultimate Wardriving Setup

Posted by & filed under Pen Testing, Projects, Security, WiFi.

After working pretty late last night I finally got all the pieces working for my wardriving setup. I posted about my original idea here, and this is the results of my labor. The premise of this is to avoid having to use a laptop to scan for AP’s. Now on to the hardware setup… Linksys… Read more »

Globalsat BU-353 GPS Reciever

Posted by & filed under Pen Testing, Projects, WiFi.

I just got a Globalsat BU-353 GPS Reciever in the mail. Pretty sweet so far, and the plan is to use kismet to create waypoints for gpsdrive to read in later to map out APs My brainstorm: WRT54GS Running OpenWRT This will handle the scanning, sending its results via ethernet Linksys USB NAS (has a… Read more »


Posted by & filed under Virtualization.

I’ve been playing with VirtualBox 2.06 on Ubuntu 8.05 for some sandbox testing. XP Installed in about is minutes on my 2.4ghz 1gb memory system. It runs pretty good even with a lot of other apps running in the background. I need to look into the CLI tools… I don’t think it can match anywhere… Read more »

Foundstone Security tools

Posted by & filed under Pen Testing, Security.

“Hackers and malicious insiders are an undeniable threat to your organization’s network. They have sophisticated tools and backdoor programs at their disposal with which to steal information, perform unlawful or unauthorized activities, and cover their tracks. Security professionals charged with protecting their organizations can become overwhelmed in developing specialty applications to combat these threats. To… Read more »