«
Expand/Collapse
63 items tagged "field"
Related tags:
variable field [+],
protocol [+],
open source implementation [+],
netzob [+],
media [+],
cross site scripting [+],
communication protocols [+],
cck [+],
third party [+],
email [+],
chaos communication congress [+],
hacks [+],
field communication [+],
communication [+],
zero day [+],
social justice organizations [+],
service vulnerability [+],
security [+],
robert guerra [+],
request types [+],
request type [+],
remote shell [+],
privaterra [+],
power [+],
nfc [+],
length [+],
human rights organizations [+],
guatemala [+],
denial of service [+],
code execution [+],
cgit [+],
black hat [+],
author field [+],
author [+],
wireless power transmission [+],
validation logic [+],
username [+],
usa [+],
tesla magnifier [+],
solar [+],
security implications [+],
security advisory [+],
search field [+],
search [+],
sdp [+],
revolutionizing [+],
related security [+],
project security [+],
nikola tesla [+],
news [+],
jared demott [+],
faxmaxdatagram [+],
dns response [+],
dns query [+],
dns [+],
core [+],
asterisk [+],
antenna [+],
yoono [+],
wireless outpost [+],
while [+],
web script [+],
wave shield [+],
voltage detector [+],
voltage [+],
username field [+],
ubb threads [+],
ubb [+],
topic [+],
tool [+],
subject field [+],
subject [+],
spectator sport [+],
sockso [+],
slides [+],
security authors [+],
sealed lead acid battery [+],
sealed lead acid [+],
revou [+],
retrieving data [+],
radio [+],
quantum dots [+],
quantum [+],
programming microcontrollers [+],
programmable [+],
prestashop [+],
phphotogallery [+],
password [+],
paper [+],
pack [+],
outpost [+],
otrs [+],
nickname field [+],
nickname [+],
mobile phones [+],
microcontrollers [+],
microcontroller [+],
message field [+],
message [+],
mdvsa [+],
max sobeil [+],
login field [+],
login [+],
list [+],
lead acid battery [+],
ken [+],
justin [+],
johns hopkins institute [+],
jim harrison tags [+],
jim harrison [+],
jim edwards [+],
jfet [+],
isa server [+],
isa [+],
intro [+],
inquisitive mind [+],
high voltage [+],
high energy physics [+],
hastymail [+],
ham [+],
grey box [+],
gnu mailman [+],
field structures [+],
field programmable gate arrays [+],
festival [+],
extension [+],
empathy [+],
emf [+],
electromagnetic field [+],
electromagnetic [+],
digilent [+],
detector [+],
day [+],
cryptanalysis [+],
coreftp [+],
community outreach [+],
collin mulliner [+],
cellular connection [+],
canadian readers [+],
camp [+],
cadmium selenide [+],
c bit [+],
brewing [+],
body field [+],
body [+],
bit [+],
benninger [+],
battery [+],
authors [+],
audio sync [+],
arduino [+],
arcade [+],
arbitrary web [+],
amateur radio field [+],
alessandro [+],
vulnerability [+],
drupal [+]
-
-
9:22
»
Packet Storm Security Recent Files
Netzob supports the expert in reverse engineering, evaluation, and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocol implementations, simulate realistic communications to test third-party products (IDS, firewalls, etc.), and create an Open Source implementation of a proprietary or unknown protocol. Netzob provides a semi-automatic inferring process, and includes everything necessary to passively learn the vocabulary of a protocol and actively infer its grammar. The learnt protocol can afterward be simulated. Netzob handles text protocols (like HTTP and IRC), fixed field protocols (like IP and TCP), and variable field protocols (like ASN.1-based formats).
-
9:22
»
Packet Storm Security Tools
Netzob supports the expert in reverse engineering, evaluation, and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocol implementations, simulate realistic communications to test third-party products (IDS, firewalls, etc.), and create an Open Source implementation of a proprietary or unknown protocol. Netzob provides a semi-automatic inferring process, and includes everything necessary to passively learn the vocabulary of a protocol and actively infer its grammar. The learnt protocol can afterward be simulated. Netzob handles text protocols (like HTTP and IRC), fixed field protocols (like IP and TCP), and variable field protocols (like ASN.1-based formats).
-
9:22
»
Packet Storm Security Misc. Files
Netzob supports the expert in reverse engineering, evaluation, and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocol implementations, simulate realistic communications to test third-party products (IDS, firewalls, etc.), and create an Open Source implementation of a proprietary or unknown protocol. Netzob provides a semi-automatic inferring process, and includes everything necessary to passively learn the vocabulary of a protocol and actively infer its grammar. The learnt protocol can afterward be simulated. Netzob handles text protocols (like HTTP and IRC), fixed field protocols (like IP and TCP), and variable field protocols (like ASN.1-based formats).
-
-
12:50
»
SecDocs
Authors:
Robert Guerra Tags:
security social Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: An overview of the work being done by Privaterra and other organizations to help identify and mitigate security vulnerabilities faced by Human Rights Organizations. The presentation will present the work currently being done in the area of security training for human organizations by Privaterra and other organizations. A brief history of the field will be presented. This will be followed by the specific challenges and needs being faced by organizations "at risk", such as social justice NGOS, as well as Human Rights defenders. Lessons learned from several field projects from Central & South America, Asia & Africa will be presented. Specific emphasis will be given to the recently concluded field mission to Guatemala. Details on and about the recently discovered secret police archive will be presented. In summary, the presentation will focus on the needs and issues faced to bring security procedures and technologies to human rights defenders and other social justice organizations.
-
12:50
»
SecDocs
Authors:
Robert Guerra Tags:
security social Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: An overview of the work being done by Privaterra and other organizations to help identify and mitigate security vulnerabilities faced by Human Rights Organizations. The presentation will present the work currently being done in the area of security training for human organizations by Privaterra and other organizations. A brief history of the field will be presented. This will be followed by the specific challenges and needs being faced by organizations "at risk", such as social justice NGOS, as well as Human Rights defenders. Lessons learned from several field projects from Central & South America, Asia & Africa will be presented. Specific emphasis will be given to the recently concluded field mission to Guatemala. Details on and about the recently discovered secret police archive will be presented. In summary, the presentation will focus on the needs and issues faced to bring security procedures and technologies to human rights defenders and other social justice organizations.
-
5:40
»
SecDocs
Authors:
Robert Guerra Tags:
security social Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: An overview of the work being done by Privaterra and other organizations to help identify and mitigate security vulnerabilities faced by Human Rights Organizations. The presentation will present the work currently being done in the area of security training for human organizations by Privaterra and other organizations. A brief history of the field will be presented. This will be followed by the specific challenges and needs being faced by organizations "at risk", such as social justice NGOS, as well as Human Rights defenders. Lessons learned from several field projects from Central & South America, Asia & Africa will be presented. Specific emphasis will be given to the recently concluded field mission to Guatemala. Details on and about the recently discovered secret police archive will be presented. In summary, the presentation will focus on the needs and issues faced to bring security procedures and technologies to human rights defenders and other social justice organizations.
-
-
8:30
»
Hack a Day
For [Justin], the topic of remotely powering electronics in the field comes up often. So often in fact he decided to put up a tutorial for powering electronics from solar power and batteries, as well as sending and retrieving data with the help of a cellular connection. The electronics [Justin] chose for his remote wireless project include [...]
-
-
9:01
»
Hack a Day
Emf Electromagnetic Field Camp is a three-day camping festival for people with an inquisitive mind or an interest in making things: hackers, geeks, scientists, engineers, artists, and crafters. There will be people talking about everything from genetic modification to electronics, blacksmithing to high-energy physics, reverse engineering to lock picking, crocheting to carpentry, and quadcopters to beer brewing. If [...]
-
-
20:51
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 12-101 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Cognos. Authentication is not required to exploit this vulnerability. The flaw exists within the tm1admsd.exe component. This process listens on TCP port 5498 by default. Requests to the service include a request type field, a data length field, and a data field. Multiple request types (opcodes) fail to validate user supplied length and data fields before copying their contents to a fixed length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the system.
-
20:51
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 12-101 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Cognos. Authentication is not required to exploit this vulnerability. The flaw exists within the tm1admsd.exe component. This process listens on TCP port 5498 by default. Requests to the service include a request type field, a data length field, and a data field. Multiple request types (opcodes) fail to validate user supplied length and data fields before copying their contents to a fixed length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the system.
-
20:51
»
Packet Storm Security Misc. Files
Zero Day Initiative Advisory 12-101 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Cognos. Authentication is not required to exploit this vulnerability. The flaw exists within the tm1admsd.exe component. This process listens on TCP port 5498 by default. Requests to the service include a request type field, a data length field, and a data field. Multiple request types (opcodes) fail to validate user supplied length and data fields before copying their contents to a fixed length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the system.
-
-
5:00
»
Hack a Day
Looking for something to do this fine Saturday morning? For the US and Canadian readers out there, the fourth weekend in June is amateur radio field day, a day when all the amateur radio and ham geeks get together, string up a few antennas, and do their yearly community outreach/contact as many other radio heads [...]
-
-
18:55
»
Packet Storm Security Recent Files
Netzob supports the expert in reverse engineering, evaluation, and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocol implementations, simulate realistic communications to test third-party products (IDS, firewalls, etc.), and create an Open Source implementation of a proprietary or unknown protocol. Netzob provides a semi-automatic inferring process, and includes everything necessary to passively learn the vocabulary of a protocol and actively infer its grammar. The learnt protocol can afterward be simulated. Netzob handles text protocols (like HTTP and IRC), fixed field protocols (like IP and TCP), and variable field protocols (like ASN.1-based formats).
-
18:55
»
Packet Storm Security Tools
Netzob supports the expert in reverse engineering, evaluation, and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocol implementations, simulate realistic communications to test third-party products (IDS, firewalls, etc.), and create an Open Source implementation of a proprietary or unknown protocol. Netzob provides a semi-automatic inferring process, and includes everything necessary to passively learn the vocabulary of a protocol and actively infer its grammar. The learnt protocol can afterward be simulated. Netzob handles text protocols (like HTTP and IRC), fixed field protocols (like IP and TCP), and variable field protocols (like ASN.1-based formats).
-
18:55
»
Packet Storm Security Misc. Files
Netzob supports the expert in reverse engineering, evaluation, and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocol implementations, simulate realistic communications to test third-party products (IDS, firewalls, etc.), and create an Open Source implementation of a proprietary or unknown protocol. Netzob provides a semi-automatic inferring process, and includes everything necessary to passively learn the vocabulary of a protocol and actively infer its grammar. The learnt protocol can afterward be simulated. Netzob handles text protocols (like HTTP and IRC), fixed field protocols (like IP and TCP), and variable field protocols (like ASN.1-based formats).
-
-
19:04
»
Packet Storm Security Misc. Files
Netzob supports the expert in reverse engineering, evaluation, and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocol implementations, simulate realistic communications to test third-party products (IDS, firewalls, etc.), and create an Open Source implementation of a proprietary or unknown protocol. Netzob provides a semi-automatic inferring process, and includes everything necessary to passively learn the vocabulary of a protocol and actively infer its grammar. The learnt protocol can afterward be simulated. Netzob handles text protocols (like HTTP and IRC), fixed field protocols (like IP and TCP), and variable field protocols (like ASN.1-based formats).
-
-
8:01
»
Hack a Day
So you’re getting better at programming microcontrollers and now you want to do several things at once? You know better than that, microcontrollers are only capable of processing one thing at a time. But if you’re clever with your coding you can achieve something that behaves as if several things are going on at once. [...]
-
-
16:01
»
Hack a Day
We’re taking a field trip from the backyard, garage, and basement hacking in order to look in on what research scientists are up to these days. A group from the Johns Hopkins Institute for NanoBioTechnology has been manufacturing quantum dots for use in the medical field. Made up of Cadmium Selenide, this is a nanomaterial that [...]
-
-
14:08
»
Hack a Day
Who needs a Fluke high voltage detector when you’ve got one of these things? Actually, we still recommend a professional high voltage detector for serious work, but you’ve got to like this electric field detector that [Alessandro] recently put together. The detector works by using a JFET to detect the high impedance electric fields that [...]
-
-
10:50
»
Hack a Day
Ham operator [Ken - wa4mnt] wrote us to share a small project that he uses nearly every time he goes out in the field. His portable sealed lead acid battery pack (PDF) always ensures that he has a 12v power source at his fingertips, both for fun as well as in emergency situations. The battery [...]
-
-
8:00
»
Hack a Day
It’s been a while since there was any advances made in the field if celebratory high-five-ing. [Eli Skipp] just finished her contribution, moving the art forward by adding the sound of explosions to her high-fives. Ignore the audio sync problems in the video after the break to see her Arduino and Wave Shield based offering. [...]
-
-
0:20
»
SecDocs
Tags:
cryptography cracking FPGA Event:
PhreakNIC 11 Abstract: This talk is an attempt to build a community around doing distributed computing with Field Programmable Gate Arrays. The first target is Cryptanalysis of DES. Most of the alloted time will be spent actually working on this, so bring your computer, and if you are really interested in this, order a Digilent Spartan 3-1000 prototyping board and bring it to the con. They can be obtained for about $150. Hacking is not a spectator sport. This talk is for people who actually want to roll up their sleeves and work on a cool technical project. This project is starting from scratch at PhreakNIC.
-
-
16:03
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2010-191 - Multiple cross-site scripting vulnerabilities in GNU Mailman before 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving the list information field or the list description field.
-
-
18:28
»
Packet Storm Security Recent Files
Core Security Technologies Advisory - Prior to MS10-024 the Windows SMTP Service generated DNS queries with trivially guessable values in the transaction ID field. The issue was addressed in MS10-024 by adding a call to the 'CAsyncDns::GenerateRandWord' method when building the DNS query. Prior to MS10-024 the Windows SMTP Service did not check that the value of the ID field of a DNS response received from the network actually matched the value of the ID field of a corresponding DNS query packet previously sent. The issue was addressed in MS10-024 by adding validation logic to the 'CAsyncDns::ProcessReadIO' method.
-
18:28
»
Packet Storm Security Advisories
Core Security Technologies Advisory - Prior to MS10-024 the Windows SMTP Service generated DNS queries with trivially guessable values in the transaction ID field. The issue was addressed in MS10-024 by adding a call to the 'CAsyncDns::GenerateRandWord' method when building the DNS query. Prior to MS10-024 the Windows SMTP Service did not check that the value of the ID field of a DNS response received from the network actually matched the value of the ID field of a corresponding DNS query packet previously sent. The issue was addressed in MS10-024 by adding validation logic to the 'CAsyncDns::ProcessReadIO' method.
-
-
21:00
»
Packet Storm Security Recent Files
Asterisk Project Security Advisory - An attacker attempting to negotiate T.38 over SIP can remotely crash Asterisk by modifying the FaxMaxDatagram field of the SDP to contain either a negative or exceptionally large value. The same crash occurs when the FaxMaxDatagram field is omitted from the SDP as well.
-
21:00
»
Packet Storm Security Advisories
Asterisk Project Security Advisory - An attacker attempting to negotiate T.38 over SIP can remotely crash Asterisk by modifying the FaxMaxDatagram field of the SDP to contain either a negative or exceptionally large value. The same crash occurs when the FaxMaxDatagram field is omitted from the SDP as well.
-
-
21:02
»
SecDocs
Authors:
Davor Emard Tags:
wireless engineering Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: Wireless power is a most wanted technology. It has already been invented by Nikola Tesla in 1888. The speaker read the papers, reproduced the theoretical and practical results. The theoretical idea to get highly efficient wireless power transmission is to separate the electric from the magnetic field, because magnetic field lines are closed curves near the device, while the electric field lines reach to infinity and receiver only needs common ground (the earth). This is done by special requirements to the sender and receiver antennas (form of the coil). The antenna form has been modeled in the software nec2 (variant xnec2c on debian). A lowcost PET bottle serves as the hull of the coil. Around 200 windings of insulated copper wire are manually applied to the bottle. A transmission in the range of 10 meters was reached, the power used is 100mW, from signal generator amplitude 10V and 1 MHz frequency. This will be shown. Tesla Long Distance High-Power and High-Efficiency Wireless Energy Transmission is still a mystery to our technology. To better understand his claims that power can be transmitted to any distance on Earth with insignificant losses, and to see what challenges does this pose to the current technology, two simple prototypes of Tesla Magnifier have been built. Understanding of the working principle was needed to build the prototypes with modern materials. All data was readily available on Internet: original Tesla's patents and articles from 1891-1919 related to wireless energy tramission. Information have led to optimal calculation of geometry for a Tesla Magnifier, a kind of resonant antenna used to transmit and/or receiver power. In replicated prototype the oscillatory mode has been determined by measuring phase and magnitude of current and voltage at magnifier's feed line. Some unexpected electrical conditions have been observed which were accurately reproduced using computer models in SPICE (electronic circuit simulation) and NEC2 (antenna simulation and electomagnetic field visualization). Simulation has revealed geometry of the field around the Tesla Magnifier and it differs from the field around ordinary radio antenna (which radiates transversal electromagnetic wave) and could be a clue for faster-than-light energy transfer on planetary scale which Tesla claimed in his patents and articles.
-
21:02
»
SecDocs
Authors:
Davor Emard Tags:
wireless engineering Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: Wireless power is a most wanted technology. It has already been invented by Nikola Tesla in 1888. The speaker read the papers, reproduced the theoretical and practical results. The theoretical idea to get highly efficient wireless power transmission is to separate the electric from the magnetic field, because magnetic field lines are closed curves near the device, while the electric field lines reach to infinity and receiver only needs common ground (the earth). This is done by special requirements to the sender and receiver antennas (form of the coil). The antenna form has been modeled in the software nec2 (variant xnec2c on debian). A lowcost PET bottle serves as the hull of the coil. Around 200 windings of insulated copper wire are manually applied to the bottle. A transmission in the range of 10 meters was reached, the power used is 100mW, from signal generator amplitude 10V and 1 MHz frequency. This will be shown. Tesla Long Distance High-Power and High-Efficiency Wireless Energy Transmission is still a mystery to our technology. To better understand his claims that power can be transmitted to any distance on Earth with insignificant losses, and to see what challenges does this pose to the current technology, two simple prototypes of Tesla Magnifier have been built. Understanding of the working principle was needed to build the prototypes with modern materials. All data was readily available on Internet: original Tesla's patents and articles from 1891-1919 related to wireless energy tramission. Information have led to optimal calculation of geometry for a Tesla Magnifier, a kind of resonant antenna used to transmit and/or receiver power. In replicated prototype the oscillatory mode has been determined by measuring phase and magnitude of current and voltage at magnifier's feed line. Some unexpected electrical conditions have been observed which were accurately reproduced using computer models in SPICE (electronic circuit simulation) and NEC2 (antenna simulation and electomagnetic field visualization). Simulation has revealed geometry of the field around the Tesla Magnifier and it differs from the field around ordinary radio antenna (which radiates transversal electromagnetic wave) and could be a clue for faster-than-light energy transfer on planetary scale which Tesla claimed in his patents and articles.