rgnet-wiki/pages/LotsOfLinks.md
2020-07-04 15:54:36 -07:00

36 KiB
Raw Blame History

Apple

c

iFoo

Securing your iPhone for Travel to a Hostile Environment Hwang & Snowden Protecting a Phone

Applications

MacOS

How to make the Touch Bar slightly more tolerable

Hacks & Tricks MacOS

diskutil coreStorage unlockVolume E35BB45E-585C-4CF7-8A1B-329A45F03ED6 to mount an encrypted volume Add Dashboard Widgets to the Desktop Apple Security Guides Creating your own Homebrew Tap and Formula Disable iPhoto Auto_launch in Yosemite El Capitan Hardening Guide macOS Mojave Hardening Guide *Encrypting Your Laptop Like You Mean It Fast User Switching on Yosemite Fix DNS Resolver Search List (obsolete) /Applications/VMware\ Fusion.app/Contents/Library/vmrun VMware Fusion Tool How to restore privacy How to Update OpenSSH on Mac OS X How to stop Firefox from making automatic connections HyperDrive USB Type-C 5-in-1 Hub with Pass Through Charging Internal Files about User (maybe Mountain Lion) Mac Config Hacks from Command Line OS X Yosemite Security and Privacy Guide OSX Auditor Safety hacks for Yosemite Screen Sharing over SSH Setting up a Macintosh as a Development Environment Time Machine and Other Info XServe from Ebay running VMware Yosemite WiFi hacks Cmd-Ctrl-Shift-4, then space (cursor turns from cross hairs to a camera), click once on what I want, and paste wherever I want it is the way to go. Remote Mac Access: Screen Sharing via SSH and VNC without iClouds Back to my Mac feature What Makes a Mac Volume Bootable sudo scutil --set HostName <new host name> to change Mac hostname Allow MacOS FileVault Recovery Key Tools to set up a quick macOS VM in QEMU, accelerated by KVM *

Applications

Bonjour Browser Emacs for MacOS guide Free OS X Security Tools Karabiner - A powerful and stable keyboard customizer for OS X OSXFUSE is a successor to MacFUSE Snail Mail - envelope printer

Conferences

CoNEXT 2014 IMC 2013 Dagstuhl Critical Infrastructure CHES 2014 Dagstuhl 2104 Secure Routing BGNOG2 Security Sep 2015 OARC Oct 2015 NANOG Oct 2015 IMC October 2015 IRTF & ISOC Workshop on Research and Applications of Internet Measurements (RAIM) October 2015 CAIDA BGP Hackathon Jan 2016

Food

Kossar's Bialys Zabar's Smoked Fish Russ and Daughters Smoked Fish (needs more lead time) Nabe Mono Basics Artisan Dutch Cheese shop in Amsterdam Swiss Chocolate Shop

Hardware

FPGA Tools

YoSys Open Synthesis Suite - Verilogish MiGen - Python Toolbox for Building Hardware (produces VHDL) MyHDL - a python syntax for Verilog - Design Hardware with Python, good docs Chisel - Hardware Development Embedded in Scala

General Hardware

Four hot-pluggable systems (nodes) in a 2U form factor SAMSUNG 850 Pro Series MZ-7KE1T0BW 2.5" 1TB SATA III 3-D Vertical SSD SuperServer 2027TR-HTRF+ - Four servers and lotso 2.5" drives in a box Seagate 8TB drives Open source USB stick computer for security applications Dirty PCBs Cheat Sheed for MegaRaid Controllers megacli CWDM Mux/DeMux Solid Optics CWDM-MUX-8CH+UPG+MON Multiplexer Logs and accounts machine checks (in particular memory, IO, and CPU hardware errors) on modern x86 Linux systems KVM to USB dongle Bunnie Huang on Good Documntation for Manufacturing Bunnie Huang on Design for Manufacturing

Novena

Novena Mail Page Setting up an ARM virtual machine so you can build an SD image

Raspberry PI

NTP on a Raspberry Pi

Toys

Attiny85-based device to enable and disable write-protection on any SD card Build the SD Locker and Make Your SD Cards More Secure

Linux / Unix

Wiki of non-systemd Unix/Linux systems reptyr: Attach a running process to a new terminal Using Containers in Production: Best Practices VXLAN with plain Linux bridges Linux Kernel Hacking Linux Ate My RAM

Basics

Basics of the Unix Philosophy ntpstick - NTP on a Stick SSH Hardening OSCP Stapling in Apache ejabberd TLS Security Understanding and Using Systemd

Emacs

Magit, A Git Porcelain inside Emacs

Tools

Linux dhcpd Options git move subdirectory of a repo

FreeBSD

FreeBSD install with gmirror portmaster to pkg Don't Panic! Upgrading FreeBSD to 11.2 on Ganeti

Applications / Linux / Unix

WordPress Tutorials Choosing an HTTP Status Code Scan, index, and archive all of your paper paf's Export photos from Apple Photo.App iPhoto Library Manager BlockBlock continually monitors common persistence locations and displays an alert whenever a persistent component is added to the OS Command-line based presentation tool Magic Wormhole - get things from one computer to another, safely Upspin: A framework for naming everyone's everything. https://upspin.io

Hacks / Linux

Upgrading grub from 0.97 to grub2 iptables -F sshguard Get sshguard to stop blocking me after I have screwed up. Mounting a qcow image as a file system Debian Releases Debian Archives Explained Upgrade Debian wheezy to jessie Firewall IPTables for IPv6 A Quick Introduction to Linux Policy Routing Reset WordPress Password from My SQL Change default network name (ens33) to old “eth0” on Ubuntu 16.04 Great dump/restore recipies Python library to ease the development of encoders and decoders for various protocols and file formats; contains ASN.1 and CSN.1 compilers How AppArmor works

Tools

BitTorrentsync security & privacy analysis - Hackito Session results Windows - Five portable antivirus and antimalware tools to carry with you at all times SSH Based Chat How To Create an SSH CA to Validate Hosts and Clients VANE - A Free Fork of WPScan curated list of awesome malware analysis tools and resources R Cheat Sheets Regenerable ed25519 keys for OpenSSH GUYMAGER a Free Forensic Imager DropKick Detect and disconnect WiFi cameras Adding a Signing GPG Key and Hiding the Master How to Tell if an Image, YouTube, etc. are faked new openssh key format and bcrypt pbkdf TLS SNI Test Site: alice.sni.velox.ch Top 125 Security Tools ssh keylength cat .ssh/id_rsa.pub | cut -c 9-60 | openssl base64 -d | hd LetsEncrypt client which drops privs Penetration Testing Cheat Sheet GOGS - git server in go Unified Logging Layer Use Wireshark to inspect SSL A terminal user-interface for tshark, inspired by Wireshark. LaTeX, Wrapping text around figures Advice for writing LaTeX documents SED Debugger Unix History Repository How To Create a Git Pull Request on GitHub JHead - Exif Jpeg header manipulation tool NetData, the Linux internal measurement graphing tool from hell A git Tutorial GUI and CLI packet generator tool for ethernet Sysdig is a universal system visibility tool with native support for containers

Certificate Authority Tools

XCA, a Small CA for Macintosh XCA Tutorial EJBCA, a Large Enterprise Scale CA Toolset - LGPL but in java TinyCA, debian package, may not be maintained Regenerate Puppet Certificates Safety Tips for iPhone iOS 10 Certificate Transparency Collector

VPNs

ssh randy@xmpp.rg.net -R 4430:127.0.0.1:443 from pfSense terminal console shell to backdoor when firewall locks you out. SoftEther VPN Project WireGuard VPN

Languages

SNOBOL4 Awesome Python frameworks, libraries, software and resources

Networking

DNS

DNS Tools

ZoneMaster DNS Zone Checker NIST DANE Tester YanDex DNS Servers 77.88.8.1 and 77.88.8.8 AfNIC ZoneMaster Zone checker DANE SMTP Validatoe Phil Pennock's SMTP DANE TLS Checker Flushing Chrome's DNS Cache

RIRs

RIR Stats Files Catenated & Decode for the above NRO Stats Internet Timeline from JPNIC IPv4 Address Space Transfer Report

Routing

Linux iproute2 Cheat Sheet BIRD Cheat Sheet IPv6 route lookup on Linux Linux VRF

Routers

Juniper Routing Engines Cisco IOS ssh key regeneration

Routing Security / RPKI

Tomo's Cache Server and Router Configuration Instructions. Certificates per RIR RIR Statistics from SurfNet NIST Global Prefix/Origin Validation using RPKI Securing BGP Routing with RPKI and ROAs Daniele's ROA quality Page Daniele's Page of Root Nameserver ROA State RPKI Repository Browser Internet Protocol Journal on Securing BGP, Huston and Bush Renew Child Certs Google RPKI Puppet Deployment Effects of RPKI Deployment on BGP Security

Routing Tools

IRR Toolset bgpq3 - bgp filtering automation for Cisco and Juniper routers IPv4 and IPv6 prefix aggregation tool BGP Visualize with Python

Tools

OpenWRT Replacement Lede Guest LAN Set-up Encapsulation overhead calculator Protocol Header Diagram Generator

Outreach

Thailand

BKNIX 2014.11.06

Workshops

AIT Bangkok 2012.11.19-22 SANOG/Thimphu 2014.01.13-21 APRICOT 2015 BTNOG2 Thimphu 2015.09.14-17 APRICOT 2016 Security Workshop APRICOT 2017 Security Workshop 2017.02.20-24 Bhutan NOG 2017 Security Workshop

Research / Computer Science

Measurement

Graphite - Scalable Realtime Graphing Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization Traffic Analysis - Anonymization IPv4 Address Transfer Report BETA Emile Country Jedi The Python Graph Gallery

Miscellaneous Research

CAIDA BGP Hackathon List Archive CAIDA BGP Hackathon BLOG CAIDA BGP Hackathon wiki A full-scale simulation of the Internet based on the Border Gateway Protocol (BGP), built on SpatialOS Semantic Scholar Paper Cites and Refs Graph Traversal Algorith Visualizations Guide for students working with JP Aumasson How to Write a Great Research Paper

Security

Cryptography

Crypto Coding Rules CryptLib Toolkit Free, Open Source, Crypto Libraries/Toolkits NaCl Crypto Primitives Hard Truths about the Hard Business of finding Hard Random Numbers Matthew Green on December 2014 Snowden Dump Blog for the cryptography group of the University of Bristol Performance analysis of different cryptographic algorithms implemented in an FPGA How Code Breakers Work Jacobian coordinates for short Weierstrass curves (algs to use) Apple Crypto Libraries Awesome Cryptogtaphy An introductory course on cryptography A Stick Figure Guide to the Advanced Encryption Standard (AES)

General Security

Capirca, utilizes common definitions of networks and services and high-level policy files to facilitate the development and manipulation of network access control filters (ACLs) for various platforms. Use with ldpush Real HSM Breaches OpenTechFund/secure-chat roadmap. More like a planet survey. Security Applications of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina Hardening Your Web Server Secret Cells, Threats and Assumptions Mozilla Recommendations for Security/Server Side TLS SSL Cipher Suite Details of Your Browser Check out Your Browser's SSL Support Stop Firefox leaking data about you Mobile Carrier Super-Cookie Use Linux workstation security checklist Efficient Group Key Signing Method caff, proof of posession of the passphrase of a key sent by the email address associated with that key OnionShare Journal of Cybersecurity We Should All Have Something To Hide, Moxie A Gentle Introduction to Secure Computation FTC - Time to rethink mandatory password changes Camouflage from face detection FreeBSD - a lesson in poor defaults FireFox about:config set dom.webnotifications.enabled and dom.push.enabled to false to prevent push notifications] Cyber Security Reading List Tech Solidarity Personal Security CheckList Review Shared thoughts after 6+ years in Pentesting A Catalog of Exploits Blockchain Graveyard, Crypto-Currency Disasters ipcrypt: IP-format-preserving encryption F-Secures Guide to Evil Maid Attacks Fuzzing JSON Web Services PEN Tester's Tool List Awesome Web Security [Gamified lessons in using encryption in everyday life. Good for you and good for friends and family.](https://www.hrw.org/everyday-encryption)

Privacy Projects

Privacy Software Workshop Series Peer 2 Peer BGP Security Setting Up I2P and Tor Darknets

Securing Open Source

Secure Messaging roadmap from the LEAP project

Tools

ROTTEN, small self-hosting Lisp, designed as a vehicle for exploring Ken Thompson's Reflections on Trusting Trust Canary Token Generator YubiKey Configuration for GPG, SSH, and U2F collection of awesome lists, manuals, blogs, hacks, one-liners and tools for Awesome Ninja Admins List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc. Free Security Tools an End User Should Start Using NOW Securing how folk use ssh

System Administration

Automation

Ansible

http://www.ansibleworks.com/docs/ http://www.ansibleworks.com/docs/faq.html http://jinja.pocoo.org/docs/templates/ NSRC Intro (pdf) append an existing list using set_fact Module Provided Facts for JunOS for NX-OS for IOSxr Bronwyn Tutorial Finding the size of various object in your postgres database Quadrupling Ansible performance with Mitogen

Configuration Tools

LDPush, A cross-vendor network configuration distribution tool CLI tool to push junoscript configs to Juniper network devices Python tool to configure networking interfaces on a Linux machine

Miscellaneous SysAdmin?

Check if Upgrade has Dynmic Lib Dependencies which Need Restart

Telcos & Lesser Forms of Humor

Prepaid SIMs Global Wiki

Virtualization

Ganeti

Experimental Ganeti extstorage provider for ZFS volumes Ganeti using LVM over ZFS (zfsonlinux) Installing pfSense as VirtIO on Ganeti Make a Node Multi-Homed Also how to Make a Node Multi-Homed Upgrading to 2.12 and Onward Ganeti Web Manager NSRC Instructions for Ganeti Web Manager Installation snf-image - allows Ganeti to launch instances from predefined or untrusted custom Images Editing Cluster Configuration (/var/lib/ganeti/config.data) Cluster Key Replacement Generate/Replace SSL Certificates lvextend -L+50G -r /dev/mapper/ganeti-var Ganeti Performance Tuning Using Open vSwitch to allow VMs on two different hosts to communicate over port-based GRE tunnels

Misc Cloudware

OwnCloud

Windows

Ops Tools

Win10 is Horrible SpyWare

Security

Detekt, a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS

Misc Windows Stuff

Split PowerPoint Animations into PDFs

Misceleanous

Framadate, an open doodle replacement Snowden at IETF, plugs CrypTech at 0:38:00 How to construct a Nature summary paragrah (aka abstract) Web Design: The First 100 Years White Rabbit Express - Buy anything from Japan NetFlix Secret Category Codes Supranational European Bodies Free Open WebRTC Site The Small of the Soup O RLY Cover Generator IIJ Lab Conference Calendar LaTeX hints Big Font Generator Levels of Techie Enlightenment Freelance Achievement Stickers Fast-Track Arrival Options Around the World Teen Vogue on Know Your Rights If You Get Arrested Data, Past, Present, and Future Create a Knitting Pattern Tips for Writing Technical Papers by Jennifer Widom Hong Kong Walled City The Importance of Deep Work Cheap Internet Fax Service ASCIIdoc Cheat Sheet Sockets in bash ITU World Fiber Map Using Apple Pay for Suica More using Apple Pay for Suica Remove Background from an Image How Corning Makes Super-Pure Glass for Fiber-Optic Cable Stephenson on Undersea Cables Regular Expression Visualizer Donald Knuth Lectures Online TCPtrace and xplot Cheat Sheet Candidate First Hiring Differential Privacy Made Simpler Containers from Scratch Let Me Google This For You Custom Knives Jonas Vonada's Engineering Maxms Animated Knots