«
Expand/Collapse
45 items tagged "generation"
Related tags:
hacks [+],
whatweb [+],
web scanner [+],
tar gz [+],
tar [+],
plugin architecture [+],
usa [+],
slides [+],
vidas [+],
tim vidas [+],
ida pro [+],
collaborative [+],
chris eagle [+],
audio [+],
vulnerability [+],
video [+],
reverse engineering [+],
engineering [+],
david hulton [+],
windows security [+],
whitepaper [+],
voip [+],
third [+],
security 2002 [+],
script [+],
random number generation [+],
permutations [+],
perl script [+],
passwords [+],
password [+],
paper [+],
number [+],
hat europe [+],
guruplug [+],
exploits [+],
europe [+],
digital [+],
book [+],
backdoor [+],
arkin tags [+],
arduino [+],
active directory [+],
wireless electricity [+],
web application [+],
vulnerability assessment [+],
visual feedback [+],
video screen [+],
video block [+],
username [+],
unboxing [+],
traditional midi [+],
third generation [+],
sql query [+],
sql [+],
snapshot [+],
single board [+],
sheevaplug [+],
shah tags [+],
sequencer [+],
seeks [+],
seed [+],
security specialists [+],
security [+],
scanning [+],
ruby on rails [+],
ruby [+],
reviews [+],
realistic scenarios [+],
read [+],
random number seed [+],
random number generator [+],
query generation [+],
query [+],
pseudo random number [+],
pickaxe [+],
phreaking [+],
philippe biondi [+],
phase ii [+],
phase [+],
peach [+],
packet [+],
nightmare [+],
nicolas fischbach [+],
ngn [+],
network [+],
mutation [+],
music [+],
moogle [+],
midibox [+],
midi connection [+],
microcontroller [+],
max msp [+],
max [+],
mahara [+],
left image [+],
led [+],
intel [+],
honeynet [+],
home [+],
heat sink [+],
guillaume [+],
greg hoglund [+],
git [+],
gigabit [+],
gardner [+],
fuzz [+],
frequent topic [+],
flake [+],
fixing [+],
fischbach [+],
exploit [+],
ethernet features [+],
email spoofing [+],
electricity [+],
e.t. can [+],
debuggers [+],
data model [+],
darknet [+],
cyber security [+],
cryptanalytic [+],
cpu load [+],
controller [+],
collabreate [+],
chapter [+],
cereal boxes [+],
bull mountain [+],
board [+],
block puzzles [+],
biondi [+],
billy rios [+],
based computers [+],
base model [+],
arp spoofing [+],
arbitrary command [+],
Wireless [+],
Hardware [+],
ExploitsVulnerabilities [+],
next [+],
black hat [+],
next generation [+]
-
-
11:01
»
Hack a Day
[Doragasu] had been using a hacked Xbox as his file server but upgraded to a single board Linux device when the GuruPlug was released. Unfortunately the first run of these devices had an overheating issue, which resulted in reboots even at moderate CPU load. The design was changed from a passively cooled heat sink to [...]
-
-
14:01
»
Hack a Day
Most toolchains for embedded system include support for random number generation. But if you’ve read the manual you’ll know that this is really just pseudo random number generation (PRNG). When calling this function the same numbers will always return in the same order unless a different random number seed is supplied in advance. [Gardner] put together [...]
-
-
17:00
»
SecuriTeam
Ruby on Rails is prone to an unsafe SQL query generation vulnerability
-
-
8:15
»
Packet Storm Security Recent Files
This is a perl script that generates a list of passwords from user-supplied input on the command line. It enables a tester the ability to create various permutations of a given password for testing.
-
8:15
»
Packet Storm Security Misc. Files
This is a perl script that generates a list of passwords from user-supplied input on the command line. It enables a tester the ability to create various permutations of a given password for testing.
-
-
9:01
»
Hack a Day
Random number generation is a frequent topic of discussion in projects that involve encryption and security. Intel has just announced a new feature coming to many of their processors that affect random number generation. The random number generator, which they call Bull Mountain, marks a departure from Intel’s traditional method of generating random number seeds [...]
-
-
10:01
»
Hack a Day
Meet MBLed, a set of interactive 8×8 LED tiles. Put them next to each other and they will orient themselves into a video screen which is the sum of the parts. If this sounds familiar it’s because we’ve seen the concept before in the GLiP project. [Guillaume] tells us that MB Led is the new [...]
-
-
14:00
»
Hack a Day
Yep, these cereal boxes light up. They’re using a new branded-technology called eCoupling that provides electricity via induction, which means the shelves have a coil with AC power running through it. The “printed coils” on the boxes allow inventory control and data exchange presumably thanks to a low-power microcontroller. But in the video after the [...]
-
-
9:00
»
Hack a Day
This is a second generation Manta, a touch-based controller with visual feedback made to use with Max/MSP. The hexagonal size and the patterns seen in the video after the break remind us of the arm-based computers the Predators sport in the movies. Like the previous generation, this controller can tell not only which of the [...]
-
-
8:30
»
Hack a Day
[The Moogle] just got his new Arduino Uno; wow, that was fast. What should have been a happy unboxing turned sour when he took a close look at the board. It seems that it exhibits several examples of sloppy fabrication. The the lower-left image shows unclean board routing, a discolored edge, and a sharp tooth [...]
-
7:37
»
Carnal0wnage
Hacking: The Next Generation Book Review
Nitesh Dhanjani, Billy Rios, & Brett Hardin
5 stars
Good Intro to Next Gen Attacks
First Impressions...skinny book. Strike One. Chapter 1 -- "Intelligence Gathering: Peering Through the Windows to Your Organization" spends a lot of time on physical security and social engineering and no mention of Maltego. I'm not sure how anyone can write a book on Intelligence Gathering and NOT include Maltego. Strike Two.
At this point i was thinking I had a dud on my hands BUT Chapter 2 --- "Inside-Out Attacks: The Attacker Is the Insider" redeems. Tons of code and examples to make XSS work in "realistic" scenarios mix the right amount of tech and narrative. My only gripe was that they talked about using XSS shell for XSS exploitation instead of using BEeF which is actively maintained and developed.
All the other chapters (except for Chapter 3) were very good, none of the others are as technical as chapter 2 but I believe they cover the current trends in a entertaining and readable way. Like one reviewer mentioned the information covered in Chapter 5 -- "Cloud Insecurity: Sharing the Cloud with Your Enemy" was not what I expected. It covered high level "possible" attacks versus any "probable" attacks. With the exception of possibly making insecure VM's and getting people to run it. Chapter 7 -- "Infiltrating the Phishing Underground: Learning from Online Criminals?" was a "chapterfied" version of the authors talk on the subject. Chapter 4 -- "Blended Threats: When Applications Exploit Each Other" was a good overview of stringing vulnerabilities that would be/were not considered high risk into high risk issues by combining one or more together which actually is "next generation".
Chapter 3, IMO didnt cover anything new. Mostly a discussion of insecure protocols, arp spoofing, email spoofing. While still a relevant issue in security not "next generation".
-
-
16:01
»
Packet Storm Security Tools
WhatWeb is a next generation web scanner that identifies what websites are running. Flexible plugin architecture with over 300 plugins so far. Passive plugins use information in the headers, cookies, HTML body and URL. Aggressive plugins can identify versions of Joomla, phpBB, etc by making extra requests to the webserver. Screenshots on the homepage.
-
16:00
»
Packet Storm Security Recent Files
WhatWeb is a next generation web scanner that identifies what websites are running. Flexible plugin architecture with over 300 plugins so far. Passive plugins use information in the headers, cookies, HTML body and URL. Aggressive plugins can identify versions of Joomla, phpBB, etc by making extra requests to the webserver. Screenshots on the homepage.
-
-
13:02
»
Packet Storm Security Tools
WhatWeb is a next generation web scanner that identifies what websites are running. Flexible plugin architecture with over 80 plugins so far. Passive plugins use information in the headers, cookies, HTML body and URL. Aggressive plugins can identify versions of Joomla, phpBB, etc by making extra requests to the webserver. Screenshots on the homepage.
-
13:02
»
Packet Storm Security Recent Files
WhatWeb is a next generation web scanner that identifies what websites are running. Flexible plugin architecture with over 80 plugins so far. Passive plugins use information in the headers, cookies, HTML body and URL. Aggressive plugins can identify versions of Joomla, phpBB, etc by making extra requests to the webserver. Screenshots on the homepage.
-
-
23:01
»
Packet Storm Security Tools
WhatWeb is a next generation web scanner that identifies what websites are running. Flexible plugin architecture with over 80 plugins so far. Passive plugins use information in the headers, cookies, HTML body and URL. Aggressive plugins can identify versions of Joomla, phpBB, etc by making extra requests to the webserver. Screenshots on the homepage.
-
23:01
»
Packet Storm Security Recent Files
WhatWeb is a next generation web scanner that identifies what websites are running. Flexible plugin architecture with over 80 plugins so far. Passive plugins use information in the headers, cookies, HTML body and URL. Aggressive plugins can identify versions of Joomla, phpBB, etc by making extra requests to the webserver. Screenshots on the homepage.
-
-
17:01
»
Packet Storm Security Tools
WhatWeb is a next generation web scanner that identifies what websites are running. Flexible plugin architecture with over 80 plugins so far. Passive plugins use information in the headers, cookies, HTML body and URL. Aggressive plugins can identify versions of Joomla, phpBB, etc by making extra requests to the webserver. Screenshots on the homepage.
-
-
10:00
»
Hack a Day
This is the fourth generation MIDIbox sequencer which has a features set that’s several screens long. We’ve embedded the teaser video of this 16-track marvel after the break. You can use it via a traditional MIDI connection or with USB. Standalone Ethernet features are also in the works. It’s fully documented and you can etch [...]
-
-
12:42
»
Hack a Day
Meet GuruPlug, an all-in-one server that is now available for pre-order. This is the next generation of the popular SheevaPlug that features some added goodies. The base model sells for the same $99 and appears to have the same specs as the original but for $30 more, the GuruPlug Server PLUS moves to 2 Gigabit [...]