In March 2012 the NATO Cooperative Cyber Defence Centre of Excellence, organised, in cooperation with its partners, a technical Blue-Red Team exercise called Locked Shields 2012. The After Action Report has been published
Download Report here
In computer terminology, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact. That is, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all. This technique is sometimes used by computer viruses, shellcodes and computer worms to hide their presence. Continue reading
Metamorphic code is code that when run outputs a logical equivalent version of its own code under some interpretation. This is similar to a quine, except that the quines source code are exactly equivalent to their own output. Metamorphic code also usually output machine code and not its own source code. Continue reading
A MAC address is a unique identifier assigned to your network card, and some networks implement MAC address filtering as a method of security. Spoofing a MAC address can be desired for multiple reasons, and it is very easy to spoof your MAC address in Mac OS X 10.4, 10.5, 10.6, and 10.7. For the purpose of this article, we are going to assume you want to spoof your Mac’s wireless MAC address. So without further ado, here’s a 3 step process on how to do it:
Look close they are running MS Windows in Cyberdefence lab .. Guess how much they really care of defence 🙂
A nice flash presentation.
Orion version 0.4 (Squirrel Edition) is officially released. Orion is a Live CD based on Ubuntu (currently 11.04) that provides acquisition, analysis, collaboration, tracking and reporting tools for professional intrusion response teams. http://sourceforge.net/projects/orionlivecd/