Technology Insights

Echo Cron To Syslog

When creating cron tasks on Linux many people do not realize that the output from the cron will logged and without redirection will sent to the user running the cron task’s email. In many cases this is the root user or if an alias has been set in /etc/aliases then the email will be sent…

Information Security

dictstat – Backtrack 5 – Privilege Escalation – Password Attacks – Offline Attacks – dictstat

The dictstat Python script is a great little tool for password cracking results analysis or for regular wordlist analysis. The dictstat application is located in the /pentest/passwords/pack directory on Backtrack 5 R3 and can be run using “python dictstat.py” from within that directory. Written by iphelix during the 2010 Crack Me If You Can password…

Information Security

spamhole – Backtrack 5 – Exploitation Tools – Social Engineering Tools – HoneyPots – spamhole

Unfortunately spamhole’s day is mostly behind us though I wish I would have been familiar with it earlier. The spamhole application developers took the approach of developing spamhole for other like minded individuals to assist in battling the SPAM issues on the Internet by creating fake open mail relays as possible and thus tricking spammers…