Malware Analysis With Several Free NirSoft Tools

Nice blog post about the NirSoft tools:

http://blog.zeltser.com/post/9610150595/processactivitymonitor-and-regfromapp

 

[...]

Http Parameter Contamination

Nice read:

http://ptresearch.blogspot.com/2011/08/http-parameter-contamination-more.html

[...]

John The Ripper Hash Formats

Nice cheat sheet:

John The Ripper Hash Formats

http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats

 

[...]

Ultimate Windows Timelining

Nice post about timelining for Windows images:

http://computer-forensics.sans.org/blog/2011/08/01/ultimate-windows-timelining

[...]

Infosec Talks

Here’s a Google spreadsheet (by Javier Bassi) with a list of Infosec talks on the web:

https://spreadsheets.google.com/spreadsheet/ccc?key=0At1wE3TY3jzTdHpNZHg4T2p4elY3RHpTT25aSDlTT0E&hl=en_US

 

[...]

Hacking IPv6 Networks

Great presentation (PDF) about IPv6 and IPv6 security implications:

http://www.hackingipv6networks.com/past-trainings/hip2011-hacking-ipv6-networks.pdf?attredirects=0&d=1

 

[...]

Responding to Zero Day Threats

Nice PDF provided by SANS (including links to further information and tools for incident response):

http://www.sans.org/reading_room/whitepapers/incident/responding-zero-day-threats_33709

[...]