KellyKeeton dot Com v3.0 reverse engineering life

31Aug/070

lock that shopping cart

a co-worker pointed out that shopping carts now have anti-theft. Further ideas about lockingthem

lockingthem
while people were shopping are too funny, but leaveit to the internet. Someone has allready done the shoppingcard lock
shoppingcard lock
. Great use of radio waves with the coil to pick up the data and replay it.

Filed under: Hack, Hardware No Comments
31Aug/070

multi boot laptop with encryption

Now that I have a multi boot with WindowsXP, Ubuntu, BackTrack2 security was an issue. First installed windows then used gaprtedboot disk

gaprtedboot disk
to separate 3 primary and 1 expanded.  I have PGP watching windowsby expanding the drive (in PGP desktop) and clicking on the C: partition and encryptingthat. Then installing ubuntu in partition 2. Then using this guideto encrypt redirected /home to partition 3. the expanded disk was then used fora bootof BackTrack2 with this tip sheet and swap. So in the end I have all three OS'srunning with PGP login at boot, then grub, then OS. here is my grub


title           Microsoft WindowsXP Professional
root            (hd0,0)
savedefault
makeactive
chainloader     +1

title           Ubuntu, kernel 2.6.20-16-generic
root            (hd0,1)
kernel          /boot/vmlinuz-2.6.20-16-genericroot=UUID=0dd29d80-088f-47c6-b8$
initrd          /boot/initrd.img-2.6.20-16-generic
quiet
savedefault

title           BackTrack2
rootnoverify    (hd0,6)
kernel          /boot/vmlinuz vga=791root=/dev/sda7


Filed under: HowTo, Software No Comments
31Aug/070

conference tools released

Theass-The-Hash tools from Defcon etc are being put out on the net. Specifically two tools that I have talked about (my posts about PassThe Hash and sidejacking

sidejacking
) but didnt have code to. Pass-The-Hash,for windows has a toolkit out. As well as the sidejacking trickis also released. have phun.

Filed under: Security, Software No Comments
31Aug/070

new blog post application

I just found an application called ScribeFire whichI configed as a MetaBlogAPI to the /blog/blogger.aspx in dasBlog and want to see howwell it works, This is to keep blogging from my laptop which I am using more and morethese days.

Powered by ScribeFire.

to get rid of that, you want to click the << on the left of the applicationnear the Bold button on the toolbar then uncheck it in the settings.

Filed under: Software No Comments
22Aug/070

lego hacking

a cool book that I need to buy about Lego’sand Hacked products you can make with them

16Aug/070

putting backtrack on a hard disk

BackTrack is very powerful you can find out about it and how to putit on a harddisk here

Filed under: Linux No Comments
16Aug/070

Blog clean up month

I have started a clean up project, you will now notice on the left (currently) thereis a larger list of filtering options for all the posts I have, this way you can lookat specific areas that I post about. More important the “nerd” sectionno longer has 400 posts causing my web server to choke on server side processing.

Filed under: Nerd No Comments
15Aug/070

MythTV Guide data

zap2itwill allow pay for continuation of guide data (yahoo) also check out the blogsite LinuxBrainDump.org it looks like a good start to tips and news.

Filed under: Linux No Comments
8Aug/070

vista and some domain policy

make sure when adding a vista machine to 2000 that the following GPO is set this way

Domain Member: Digitally Encrypt or sign secure channel data (always)- change to disabled  -this isnt in the default 2000 GPO

Network Security: LAN Manager authentication level - change to "SendLM and NTLM - use NTLMv2 session security if negotiated"

Filed under: Microsoft No Comments
8Aug/070

corporate cell security

I wanted to post a quick blurb about corporate cell phone’s and security. There area lot of choices out there today, iphone, blackjack, windowsPDA’s, trio, nokia andfinally blackberrys. in regards to all the cell phones except the blackberry the securitysucks. I do know that trios have some remote erase, but if your seriously consideringsetting your company up with anything for cell enterprise look no further then blackberry.the amount of security that you can implement from encryption to PGP to passwordsto bluetooth and camera and mass storage use is insane. yes this is a plug for Blackberryand no im not paid for it.

The hacks that people are not using today are cell hacks, hacks on iphone etc arejust too juicy to not take advantage of, be aware of the threats that your ceo’s andmanagement are purchasing on the company.

Best practice documents and full overview of IT policy is located at following blackberrykb site

Filed under: Security No Comments