I finally got off my ass and created a blog for myself. Check it out! http://www.skullsecurity.org (and don't forget to subscribe to the rss (http://www.skullsecurity.org/blog/?feed=rss2)!).
It's going to be based on security stuff, and I'll basically be posting what I'm working on. So, if you're interested in what I'm doing, check it out!
I started with a pretty extensive piece on NetBIOS.
"Archives" on the right overlaps some category....I can't read what....but it's really annoying.
Yeah, the template is kind of broken, I'm going to fix that.
Just use the RSS. :)
Fixed up the theme a bit:
http://www.skullsecurity.org
So, for anybody who hasn't been subscribing, I'm up to three posts now (all about my work with NetBIOS and SMB)
nbtool 0.02 released! (also, a primer on NetBIOS) (http://www.skullsecurity.org/blog/?p=6) -- How NetBIOS works, and also a tool I'm working on.
ANDX... and what? (http://www.skullsecurity.org/blog/?p=25) -- About weird design decisions in NetBIOS/SMB
LANMAN and NTLM: Not as complex as you think! (http://www.skullsecurity.org/blog/?p=34) -- How Windows passwords are hashed
Who named it LANMAN? :P
It's short for "LAN Manager", which was an old network operating system (http://en.wikipedia.org/wiki/LAN_Manager).
Interesting tidbit, if the GUEST account is enabled, and you mistype your username, Windows automatically logs you in as guest. :)
Quote$ ./smbclient -u blahblah -p 'fakepassword' 192.168.1.41
Sending protocol negotiation to 192.168.1.41:445
Attempting to establish SMB session with WORKGROUP/TEST1...
Account not found, automatically logged in as GUEST!
Cool stuff! :)
New blog posts!
I think I've posted a couple times since I've mentioned it here, so check the index (http://www.skullsecurity.org) to see what you haven't read, and, while you're at it, subscribe to the rss (http://www.skullsecurity.org/blog/?feed=rss2)!
(incidentally, this isn't an especially exciting blog post, it's very technical, but eh? you could learn something)
edit: fixed iago's horrible bbcode failure