If you have ever wondered about anti-cyberterrorism training, Anonymous released an ISO image of the Cyberterrorism Defense and Analysis Center training for the Sentinel program that seems to have been published by FEMA in 2009. FEMA is part of Homeland Security. In case you were off the grid, LulzSec called it quits on the 108th anniversary of author George Orwell's birthday which also marked 50 days of sailing the Lulz Boat on chaotic waters. Anonymous has taken LulzSec members back into the fold.
If you have never taken a hacking class, then you are missing out on great fun and a bit of mayhem. Of course, I suppose that depends just how geeky you are and how you define "fun." That is unless you take a class with some idiot who attempts hacking a government site and in less than 24 hours the FBI shuts down the class to be "theory only." You are supposed to have a site's permission before you ever attempt to test their security. There are all levels of hacking classes in which varying knowledge is required but about everything is canned, so you are more or less learning to run programs. If you've never played around with these tools in the name of security testing purposes, anti-virus will flag some of the programs just as it will find Trojans in cracked software.
There are ageless examples of security wisdom, just as there are some hacking programs that are not any less effective even if they are old-school and have been around a very long time. But in regards to Sentinel, the release was a bit deflating. The wayback machine shows the Cyberterrorism Defense Initiative (CDI) Sentinel program is used "to educate technical personnel in cyberterrorism response and prevention." Way back is a good way to sum up the training as well, being that it consists of documents, templates, and suggested best practices from 2002, 2004, and 2005. Most other elements included hacking and counter-hacking tools that could otherwise be found on the Internet, and a list of FBI agency addresses. There are also several fill-in-the-blank template letters to obtain warrants, pen register trap and trace (sample dated 2002), and ISP user preservation requests (letter and log preservation request samples dated 2006).
Sentinel also contains banner policy text examples of logo banners such as "WARNING! This computer system is the property of the United States Department of Justice," or "This is a Department of Defense (DOD) computer system....All data contained within DOD computer systems is owned by the Department of Defense, and may be monitored, intercepted, recorded, read, copied, or captured in any manner and disclosed in any manner, by authorized personnel. THERE IS NO RIGHT OF PRIVACY IN THIS SYSTEM. System personnel may disclose any potential evidence of crime found on DOD computer systems for any reason. USE OF THIS SYSTEM BY ANY USER, AUTHORIZED OR UNAUTHORIZED, CONSTTUTES CONSENT TO THIS MONITORNG, I INTERCEPTION, RECORDING, READING, COPYING, or CAPTURING and DISCLOSURE."
The rest will be a few screenshots, instead of describing programs that have been around before or at the start of millennium.
Sentinel Software Favorites:
Sentinel Incident Handling and Response:
Sentinel Prevention Deterrence and Recovery:
Sentinel Additional Resources:
You may or may not find this interesting, but if you didn't know that anonymous people also offers hacking classes, the Examiner reported it was told the new "school for advanced hacking" will supposedly go up at http://blackhatacade.my/. It is "said to be an upgrade" from the previous hacking School 4 Lulz. Yet there are questions about the curriculum as one anonymous source told the Examiner it would include: "Zeus botnet, XSS, CRSF, HTTP Injection, Backdoors, etc. The idea behind the site is to train people to fend for their own freedom." While another "informant related to the school's operation said that Zeus Botnet would definitely not be part of the curriculum. That informant provided a link to the course outlines, which he asked to not have published. The course outline topics included: Linux from the ground up, Programming, Intrusion, Offensive Programming, and Network Defense."
Meanwhile, the hacking frenzy is not anywhere close to done. Anonymous is about to dump more "#AntiSec" data soon. AnonymousIRC tweeted, "We found a huge chest of 40 Terabytes internal data from some $evilcompany."
Lastly, you might be interested in a Greasemonkey script which was listed on Full Disclosure.
LulzCheck is a Greasemonkey script for Firefox. Basically, whenever you log into a website, it checks the username that you supply against an updated list of accounts that have been "leaked" by LulzSec, and gives you a warning if it finds your login in that list.