«
Expand/Collapse
69 items tagged "encryption"
Related tags:
network [+],
chaos communication congress [+],
source code release [+],
sensitive applications [+],
layer [+],
i2p [+],
encryption algorithm [+],
cryptography [+],
vulnerability [+],
multiobfuscator [+],
disk encryption [+],
cryptography tool [+],
usa [+],
germany [+],
disk [+],
utility [+],
unix crypt [+],
u.s. [+],
trusteer [+],
tracker [+],
switches [+],
read [+],
rapport [+],
os x [+],
nnt [+],
legacy unix [+],
jacob appelbaum [+],
implementation [+],
enterprise version [+],
data [+],
csprng [+],
change [+],
ccrypt [+],
Wireless [+],
Countermeasures [+],
BackTrack [+],
xss [+],
wpa [+],
wep [+],
type [+],
txt [+],
tool 1 [+],
tool [+],
tinycrypt [+],
simple encryption [+],
runtime [+],
random key [+],
radio spectrum [+],
quot [+],
proof of concept [+],
processing [+],
net [+],
microsoft [+],
krakow [+],
ipswitch [+],
imail [+],
high security [+],
high bandwidth [+],
gsm [+],
encryption keys [+],
encryption decryption [+],
decryption [+],
david hulton [+],
data encryption standard [+],
darknet [+],
concept implementation [+],
audio [+],
algorithm [+],
acl [+],
Support [+],
Newbie [+],
General [+],
Area [+],
yang tags [+],
x recovery [+],
wpa key [+],
wireless networks [+],
wikileaks [+],
wep wpa [+],
weak [+],
warns [+],
video [+],
use [+],
usb [+],
unix platform [+],
unix knowledge [+],
unix [+],
twitter [+],
track [+],
tor e. bjrstad [+],
thumb drive [+],
stream ciphers [+],
stream [+],
storage [+],
ssid [+],
sophos [+],
slides [+],
shiva [+],
sha [+],
security experts [+],
security analysis [+],
security [+],
safeguard [+],
recovery partition [+],
pushdo [+],
protocol mechanism [+],
protocol [+],
project [+],
playstation 3 [+],
playstation [+],
platform [+],
phone [+],
patch release [+],
pasword [+],
password encryption [+],
password [+],
opn [+],
openpgp [+],
nischal [+],
new way [+],
neel mehta [+],
microcontrollers [+],
message encryption [+],
mehta [+],
mainstream media coverage [+],
mail encryption [+],
mac os x [+],
mac os [+],
mac adresses [+],
mac [+],
logic chips [+],
logic [+],
length [+],
legal challenge [+],
keys [+],
key [+],
kernel drivers [+],
kernel code [+],
javascript implementation [+],
javascript [+],
ios [+],
hotmail [+],
hash [+],
hardware encryption [+],
hacks [+],
hack [+],
gmail [+],
full disk encryption [+],
firmware [+],
finalists [+],
feds [+],
fbi [+],
facebook [+],
experimental phase [+],
encryption systems [+],
encrypted file system [+],
elf [+],
egnyte [+],
e commerce [+],
drive [+],
downgrade [+],
deslock [+],
decrypter [+],
cyber crime [+],
crack [+],
connectivity [+],
connection [+],
computer science [+],
computer boots [+],
commodity hardware [+],
chiba [+],
cat and mouse game [+],
cat and mouse [+],
bypass [+],
busting [+],
bugtraq [+],
boot record [+],
boffins [+],
black hat [+],
backdoors [+],
auth [+],
apps [+],
application vendors [+],
android [+],
analysis [+],
alex [+],
advanced [+],
Public [+],
Hardware [+],
5 months [+]
-
-
18:39
»
Packet Storm Security Recent Files
This paper reveals the aspects of .NET runtime encryption and presents a proof of concept implementation for Hyperion, the implementation that generates a random key and uses it to encrypt the input file with AES-128.
-
18:39
»
Packet Storm Security Misc. Files
This paper reveals the aspects of .NET runtime encryption and presents a proof of concept implementation for Hyperion, the implementation that generates a random key and uses it to encrypt the input file with AES-128.
-
-
16:33
»
Packet Storm Security Recent Files
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
-
16:33
»
Packet Storm Security Tools
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
-
16:33
»
Packet Storm Security Misc. Files
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
-
-
21:26
»
SecDocs
Tags:
UNIX Event:
Chaos Communication Congress 18th (18C3) 2001 Abstract: Binary encryption is the process of obfuscating and protecting a binary executeable, while still allowing the operating system to execute the binary. We will explain the current situation and problems when analyzing hostile binaries on the UNIX platform. Then we will demonstrate and explain some techniques to protect your UNIX ELF binary against reverse engineering, unauthorized use and analysis. The speech covers the basic details of the ELF executeable format, only basic UNIX knowledge is required. While th e speech itself is more practically orientied, it will be accompanied by a detailed paper for the interested readers.
-
-
12:01
»
Hack a Day
It looks like the security of the PlayStation 3 has been cracked wide open. But then again we’ve thought the same thing in the past and Sony managed to patch those exploits. The latest in the cat and mouse game is the release of the LV0 encryption codes for the PS3 console. The guys who [...]
-
-
15:22
»
Packet Storm Security Recent Files
ccrypt is a command line utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. A compatibility mode is included for decrypting legacy "unix crypt" files.
-
15:22
»
Packet Storm Security Tools
ccrypt is a command line utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. A compatibility mode is included for decrypting legacy "unix crypt" files.
-
15:22
»
Packet Storm Security Misc. Files
ccrypt is a command line utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. A compatibility mode is included for decrypting legacy "unix crypt" files.
-
-
10:19
»
Hack a Day
[Nakul], [Nikilesh], and [Nischal] just finished posting about their entry in the 2012 Open 7400 Logic competition. It’s an encryption system based entirely on 7400 logic chips. The device operates on 8-bit binary numbers, which limits its real-world applications. But we bet they learned a lot during the development process. The encryption algorithm is based on a [...]
-
-
8:21
»
Packet Storm Security Recent Files
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
-
8:21
»
Packet Storm Security Tools
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
-
8:21
»
Packet Storm Security Misc. Files
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
-
-
21:43
»
SecDocs
Authors:
Jacob Appelbaum Tags:
cryptography Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Jacob Appelbaum will discuss different disk encryption systems in their current implementation. This will include technical as well as legal issues. Jacob Appelbaum will discuss different disk encryption systems in their current implementation, the users rights in their given country (ie: the USA, Germany and the UK), issues with the implementations, commentary on the community surrounding each featured implementation, threats posed by legal systems, requirements for users, as well as ideas for working around the letter of the law.
-
21:43
»
SecDocs
Authors:
Jacob Appelbaum Tags:
cryptography Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Jacob Appelbaum will discuss different disk encryption systems in their current implementation. This will include technical as well as legal issues. Jacob Appelbaum will discuss different disk encryption systems in their current implementation, the users rights in their given country (ie: the USA, Germany and the UK), issues with the implementations, commentary on the community surrounding each featured implementation, threats posed by legal systems, requirements for users, as well as ideas for working around the letter of the law.
-
21:43
»
SecDocs
Authors:
Jacob Appelbaum Tags:
cryptography Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Jacob Appelbaum will discuss different disk encryption systems in their current implementation. This will include technical as well as legal issues. Jacob Appelbaum will discuss different disk encryption systems in their current implementation, the users rights in their given country (ie: the USA, Germany and the UK), issues with the implementations, commentary on the community surrounding each featured implementation, threats posed by legal systems, requirements for users, as well as ideas for working around the letter of the law.
-
-
21:16
»
Packet Storm Security Recent Files
MultiObfuscator is a professional cryptography tool that offers double encryption, csprng based scrambling, csprng based whitening, and more. Documentation provided.
-
21:16
»
Packet Storm Security Tools
MultiObfuscator is a professional cryptography tool that offers double encryption, csprng based scrambling, csprng based whitening, and more. Documentation provided.
-
21:16
»
Packet Storm Security Misc. Files
MultiObfuscator is a professional cryptography tool that offers double encryption, csprng based scrambling, csprng based whitening, and more. Documentation provided.
-
-
21:29
»
SecDocs
Authors:
Tor E. Bjørstad Tags:
cryptography Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: Even with "nothing to hide", we want to protect the privacy of our bits and bytes. Encryption is an important tool for this, and stream ciphers are a major class of symmetric-key encryption schemes. Algorithms such as RC4 (used in WEP/WPA, bittorrent, SSL), A5/1 (GSM telephony), E0 (bluetooth), as well as AES in counter (CTR) mode, are important examples of stream ciphers used in everyday applications.
-
-
21:50
»
SecDocs
Authors:
Karsten Nohl Sylvain Munaut Tags:
GSM sniffer Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should be considered unprotected. The network operators, however, have not woken up to the threat yet. Perhaps the new capabilities to be unleashed this year – like wide-band sniffing and real-time signal processing – will wake them up. Now that GSM A5/1 encryption can be cracked in seconds, the complexity of wireless phone snooping moved to signal processing. Since GSM hops over a multitude of channels, a large chunk of radio spectrum needs to be analyzed, for example with USRPs, and decoded before storage or decoding. We demonstrate how this high bandwidth task can be achieved with cheap programmable phones.
-
-
21:29
»
SecDocs
Authors:
Karsten Nohl Sylvain Munaut Tags:
GSM sniffer Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should be considered unprotected. The network operators, however, have not woken up to the threat yet. Perhaps the new capabilities to be unleashed this year – like wide-band sniffing and real-time signal processing – will wake them up. Now that GSM A5/1 encryption can be cracked in seconds, the complexity of wireless phone snooping moved to signal processing. Since GSM hops over a multitude of channels, a large chunk of radio spectrum needs to be analyzed, for example with USRPs, and decoded before storage or decoding. We demonstrate how this high bandwidth task can be achieved with cheap programmable phones.
-
-
15:00
»
Sophos security news
Direct management of encryption keys provides customers control of files from local storage through transmission to cloud provider and endpoint access
-
-
7:25
»
Packet Storm Security Exploits
Trusteer Rapport key encryption switch off exploit that switches off anti-keylogger protections on OS X allowing your already existing keylogger to function correctly once again.
-
7:25
»
Packet Storm Security Recent Files
Trusteer Rapport key encryption switch off exploit that switches off anti-keylogger protections on OS X allowing your already existing keylogger to function correctly once again.
-
7:25
»
Packet Storm Security Misc. Files
Trusteer Rapport key encryption switch off exploit that switches off anti-keylogger protections on OS X allowing your already existing keylogger to function correctly once again.
-
-
14:20
»
SecDocs
Authors:
Karsten Nohl Tags:
GSM phone Event:
Hashdays 2010 Abstract: The most popular phone technologies use decade-old proprietary cryptography. We show how to break these weak and outdated functions using commodity hardware.
-
-
7:34
»
Packet Storm Security Recent Files
TinyCrypt is a fast, simple encryption algorithm that delivers high security for encryption at the file level. Files are compressed using fast LZO compression.
-
7:34
»
Packet Storm Security Misc. Files
TinyCrypt is a fast, simple encryption algorithm that delivers high security for encryption at the file level. Files are compressed using fast LZO compression.
-
-
6:55
»
Packet Storm Security Recent Files
MultiObfuscator is a professional cryptography tool that offers double encryption, csprng based scrambling, csprng based whitening, and more. Documentation provided.
-
6:55
»
Packet Storm Security Misc. Files
MultiObfuscator is a professional cryptography tool that offers double encryption, csprng based scrambling, csprng based whitening, and more. Documentation provided.
-
-
23:28
»
Sophos product advisories
If you install SafeGuard Disk Encryption for Mac 5.50.1 on Mac OS X 10.7 (Lion), Mac OS X 10.7 will no longer start. Instead the computer boots up into the Mac OS X Recovery partition.
-
-
12:44
»
SecuriTeam
A vulnerability has been discovered in one of Data Encryption Systems DESLock+ kernel drivers.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
5:09
»
SecDocs
Authors:
Kyle Yang Tags:
malware malware analysis Event:
Black Hat EU 2010 Abstract: After several months efforts, the pushdo/cutwail botnet author(s) finally released a new pushdo advanced installer(codename "revolution") which not only changed the protocol and encryption totally but also implemented "Services" mechanism. Moreover, a new spam engine was in the experimental phase. In this presentation, I will examine pushdo's brand new protocol and encryption, reveal their "Cyber Crime Services" vendors mapping and disclose the debug version of the new spam engine's protocol and encryption.
-
-
15:00
»
remote-exploit & backtrack
Having installed BackTrack 4 Final to HD, when attempting to connect to a detected network, i receive a message "encryption has to be enabled before connecting to this network"? Can anyone please help? Thanks.
-
-
15:05
»
remote-exploit & backtrack
Hi,
I have a general question about making a Soft AP/Fake AP. If a client A is connected with an AP B, and the connection between them is using WPA2 (preshared key). Is it possible for me to act as AP B (with the mac and SSID belonging to AP B) and downgrade the connection in somehow?
With downgrade I mean making the connection use no encryption at all or using a weaker form of encryption.
Let's assume that I can use airdrop-ng to eliminate AP B.
?
/ Alex
-
-
22:19
»
remote-exploit & backtrack
My buddy is a computer science major and he set up 2 Wireless Networks Chiba1 and Chiba2, they have atleast 35% connectivity within a 10mile radius, when I airodump it shows him and his other comp using ALOT of bandwidth, but when you try to connect it always says limited connectivity!
Anyone else come across something like this before, got any suggestions, Its encryption is set to OPN, he said I wouldnt be able to figure out how he did it?
-
6:17
»
remote-exploit & backtrack
Hi,
I've installed Backtrack4 on my USB Drive after the tutorial "Backtrack 4 Bootable USB Thumb Drive with Full Disk Encryption"
I've installed all but when I try to boot is just says
"
Searching for Boot Record from USB RMD-FDD...OK
GRUB
"
And at this point nothing happens...
Can anybody help my?
Bober
-
-
11:59
»
remote-exploit & backtrack
Hi,
I installed BT4 on my laptop. When i run wicd, all the networks which are visible are encrypted. To connect to them i get a message 'encryption should be enabled before connecting to the network'
Ok so I go in the advanced settings and there I am asked to enter the WPA key.
Now my question is this.
The network is public. Secured but public and I can connect to it using windows without any password or WPA key authentication. Windows connects to this network using TKIP encryption.
How do I go about this? I am not asking how to hack WPA but how do I connect to the network since I do not know the WPA and it is not requested while running windows.
Is there any other way to connect without entering the WPA ? If so how ?
Thank you for the time and help!
-p4
-
-
20:03
»
remote-exploit & backtrack
i have cracked wep key and i have the key. i was connected in this for 5 months but now i can't connect to router. when i try to connect it doesn't ask me for key is wep. i see other users connect from mac adresses. i try to connect from a laptop one friends but the same thing. the mobile too. what i can do.? the encryption is wep and the auth it was open but from the day i can't connect auth is empty as i see from linux. i'm taking datas and i cracked again and i found the key it's the same.tell me some ways to connect i have and the routers username and password. there is another way to connect? windows or linux??