trying to find more dangerious toys for pentesting.

trying to find more dangerious toys for pentesting.

Been trying to fodder up a good repo of scripts.


Announcing The Dark Mail Alliance – Founded by Silent Circle & Lavabit

Silent Circle Blog


Today at the Inbox Love conference in Mountain View, CA, Silent Circle along with Ladar Levision, Founder of Lavabit officially announced the creation of the Dark Mail Alliance.

Silent Circle and Lavabit, as privacy innovators have partnered to lead the charge to replace email as we know it today – fundamentally broken from a privacy perspective – we have collaborated in developing a private, next-generation, end-to-end encrypted alternative.

Together our mission is simple:

To bring the world a unique end-to-end encrypted protocol and architecture that is the ‘next-generation’ of private and secure email. What we call ‘Email 3.0.’ is an urgent replacement for today’s decades old email protocols (‘1.0’) and mail that is encrypted but still relies on vulnerable protocols leaking metadata (‘2.0’).

As founding partners of the Dark Mail Alliance, both Silent Circle and Lavabit will work to bring other members into the alliance, assist them in implementing…

View original post 85 more words

Chuchhill Honeypot Dameon Concept

“A lie gets halfway around the world before the truth has a chance to get its pants on.”
Winston Churchill

“The truth is incontrovertible. Malice may attack it, ignorance may deride it, but in the end, there it is.”
Winston Churchill

In wartime, truth is so precious that she should always be attended by a bodyguard of lies.

Winston Churchill

(Concept is a Work in progress)

anyhow from that above quote …. comes the Cyberwarfare concept….

you networks are under AssaultLie.. stall buy time. and yes for the attacker make them think They or your PC are Toking /smoking something on one bad Trip of LSD.

Psychological Warfare & Lies & Dis-information : if the Honeypot trap triggers…

attackers on port # (start Filibustering lies , pile on the Bull-shit)

lie about the connection times….

Lie about the host-name welcome to : and they though they had… (their head must be swimming spinning doing double takes and picking their jaw off the floor or mildly amused…. next few tries will start to make them irritated…)

or use historical pc o/s from the bygones. and fake the o/s signatures. or futuristic sounding o/s  Linux kernel 25.0.99 on AMD -193 Trit– Quantum 50 core Trinary CPU

Windows 25 , and “time travel them”  today is Dec 25 2525 (todays gift for you Mr C’hacker is you guess it more lies to sift through….)

uses Sci-FI pc concepts historical. its a Linux box lie to em say its windows nt 3.51 one minute then say they got Babylon 5 mainframe the next.

hell use some ascii art and put friggen Klingon out who cares..any of the fortune cookies that provide dis-information ….. to keep them guessing what your doing or confused enough…

spin the fortune cookies fake the o/s packets…

Bamboozle them, fake them , utterly befuddle them , make them so utterly confused

they will move on or slow their attacks to the point you have time to respond and block them ..

by confusing them after a thresh-hold trigger has been reached , this wont deter professionals or the most determined crackers…. mal-hackers….

but it will get rid of the script-kiddies , as if the more automated means , the outputs will for a time garble up their NMAP scans etc. with useless data….

make them have a physiological meltdown , at least they wont be attacking your pc’s or networks anytime soon again, they will move on to other weaker less defended constructs.

WWII , lights magic , not many defended some targets , by outright out-witting the Axis forces…. with far-less inflatable tanks… amusing yet simple tricks.  however the enimies were less than amused …. but from a historical perspective how the chickens outwitted the foxes is a useful tidbit…

your network has EGGS of information the foxes want , they will “eat you alive too”…. if they can “Catch you” would be a good analogies…

I figured putting a few magic tricks will at first amuse an attacker then slowly simmer their anger and will to the point of “self-cremation ”  for most a few hours of Psi-warfare

data directed back at them , they will explode in anger to were they are just burring mad.  (and they asked for it , they tried to hack you , so they brought it on themselves…)

Thus if your target system is attended by a bodyguard of lies., and confuses attackers ,  it is simple and inexpensive concept. and modular in ideas.

if they get past the 10,000 Cisco firewall , a more expensive system will not do, so the  bodyguard of lies will buy you time to get at them and or kick them…

it should give you more time
of which: you can program your IDS to respond to them by drooping their connections. trace thier ip .

analyze them in kind. etc.

Developers Wanted : (unfortunately I lack the skills I thought this to be an interesting concept. )

© Michael R. Lawrence , 2013

And the Sabayon Linux Foundation (of which I chose to help out when I can)

Creative Commons License
Chuchhill Honeypot Dameon Concept by Michael R. Lawrence is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
Based on a work at


Sabayon Linux Is one of the best and versatile blends of Linux , Made with Gentoo Linux , And Polished Like a shinny 120 Carrot Diamond , leading and bleeding edge

What could be better you ask , not having to juggle Distro’s Like a mad Hatter.

There are Linux Security Distro’s of Late out the Wazoo

My Linux Distro Collection is starting to become a Museum , That Can’t be good…..

So I figured Why not Take what I love about Sabayon/Gentoo , Pentoo (a Gentoo variant) and Sabayon is so EZ to Install , Backtack

(the Ubuntu  Fecal Brown & Orange scheme  is nauseating to the eyes after awhile )  Katana Linux.


My aim is more a blend of two prepackaged  special    Blends of Sabayon to help others With IT Security by taking and making a few ISO’s Blended from Sabayon Linux,

With more Added Packages. I Love Wolfden’s Sabayon Forensic’s however I figgured on the live DVD thier could be just a touch more….

In time I may add a Few Custom Menus to the X-Windows UI and set them as a Virtual Package making all the tools is to find , similar in the way Pentoo has the Pentoo Menu.

Why not have a Stating Linux Disk that Can Recover Windows / Linux as a system Rescue — While they make those Linux rescue Distro’s … Again trying to stop Juggling ISO’s

I figured an ALL-IN-ONE  , I can Install SABAYON LINUX  /WITH FORENSIC tools /WITH IT Security TOOLS , RESCUE and Back up a system both regularly  and Forensicly

would be far more useful and usable for most than having 5 or 6 or 8 Linux Disto’s in a bag, and in one shot , one could have a decent Security testing Disto in a DVD or ready to go after installing it.

Sabayon Linux Excells at having up to date Packages , and as well Has Gentoo portage under the hood , so thus a WIN-WIN   So thus as a Security Admin that is one aspect that puts my mind at ease, as well If I need to re-make packages I sure can.  So If I have to do penetration testing , I have tools that are in the here and now , and not so 3 years ago like some disto’s… Being rather dated.

Templar Server Discussion

So If you were making A custom Sabayon Linux Security Server , What packages would you want to have.


Goals , Simple IDS , and a few honeypot programs , IE SSHD type , etc., and other programs showing where hackers are trying to break into your network.

And other hardening tools ? As well as tools to aid during a network Attack Crisis IE Incident response.

Zoro project is for doing Pentesting and security audits , but as well  a Linux build to help Admins keep out threats . IE “Templar”   (A Network “Meatsheild”) Tux-Knight  At the End of the day small Biz owners like me have to juggle allot of hats Security Admin Network Admin , Owner , Graduate IT Enterprise Security Student.

Whether it is an Enterprise , or a small business owner Managing IT Network Security can be a large scale challenge , however it is necessary, however with larger firms IDS products out of reach for most home users or even small startup IT firms , a Secure server that aids in the management of security , and helps detect gaps in the firewall, and other issues , and are Sabayon Linux based , which is a Gentoo Linux Varrent ,  thus Portage is included also helps.

As the packages are Fresh and new rather soon before they get too dated to be useful.

Having most of the tools or all the tools as a direct Install or an LXC Server Container-let of Sabayon Templar Server to run a top of a Linux Appliance server should be rather possible, as well , it can run and keep watch for unusual activities or act as being easily configured as an Internal or External and IDS Appliance , and a firewall for isolating Internal Users from DB servers or sensitive Data. ,


In Time a Firewall APP , may be spun from Redwall/Sabayon , or ETC.