Shawn Merdinger sent me this screenshot entitled "btcrack_pr0n" : Sonicwall seems to think that Btcrack cracks something else then Bluetooth ? (Most probably though the positive signature is due to the FLV downloading site)
Disclaimer: The views and opinions expressed on this blog are my personal views and are not intended to reflect the views of my employer or any other entity.
Have I Been Pwned Demos Are Now Live!
-
Well, one of them is, but what's important is that we now have a platform
on which we can start pushing out a lot more. It's not that HIBP is a
particula...
Self-Replicating Worm Hits 180+ Software Packages
-
At least 187 code packages made available through the JavaScript repository
NPM have been infected with a self-replicating worm that steals credentials
fro...
Kerberoasting
-
I learn about cryptographic vulnerabilities all the time, and they
generally fill me with some combination of jealousy (“oh, why didn’t I
think of that”) o...
Overview of Content Published in August
-
Here is an overview of content I published in August: Blog posts: Update:
pdf-parser.py Version 0.7.13 SANS ISC Diary entries: Wireshark 4.4.9
Released pdf...
What a lovely sunset
-
Oh, hi. Long time no blog, eh?
Well, it is time to sunset this blog, I will be deleting it in the next few
weeks.
So long, and thanks for all the fis...
The Future of the FTC: Part II
-
A previous blog post discussed FTC Chairwoman Slaughter’s first priority as
the newly designated chairwoman – the COVID-19 pandemic. The FTC’s second
prior...
Minecraft Mod, Follow up, and Java Reflection
-
After yesterday's post, I received a ton of interesting and creative
responses regarding how to get around the mod's restrictions which is what
I love abou...
Youtube channel
-
I've continued to make updates to the python version of satori and have put
a lot of time in the past few weeks to updating fingerprints and fixing
some mi...
In Which You Get a Chance to Save Democracy
-
Let’s start with the end: you can do something to change the broken
political landscape in the United States, but you have to act quickly.
Here’s a link to...
Ma contribution au mois de la cybersécurité
-
Dans le cadre du mois de la sécurité, l'ANSSI met en avant son MOOC : la
SecNumAcadémie. Il m'a semblé opportun de vous résumer les 2h48 que j'ai
passées ...
Introducing Qualys Project Zero?
-
Google's Project Zero team was announced in July 2014. Since then, it has
become very well known for publishing offensive security research of
exceptional ...
VulnHub Stapler 1 Solution
-
Well, after long time, I'm back to blogging ..!!
This post is about the solution for the Stapler VM from VulnHub. The VM
gets the following IP:
Stapler VM...
McAfee SiteList.xml password decryption
-
Recently, a very good friend of mine (@Sn0rkY) pointed me out the story of
a pentester who recovered the encrypted passwords from a McAfee
SiteList.xml fil...
La géolocalisation du salarié par l’employeur
-
Avec l’avènement des nouvelles technologies et leur perfectionnement, de
plus en plus d’employeurs décident de recourir à la géolocalisation de
leurs véh...
Learning SDR
-
I recently launched Software Defined Radio with HackRF, an instructional
video series that I hope will make it easier than ever for people to learn
the bas...
USENIX Security Symposium Slides
-
We're very happy to present the paper
Revisiting SSL/TLS Implementations - New Bleichenbacher Side Channels and
Attacks
by Christopher Meyer, Juraj Somo...
New Insights into Email Spam Operations
-
Our group has been studying spamming botnets for a while, and our efforts
in developing mitigation techniques and taking down botnets have
contributed in d...
RSA Announces End of RSA Security Conference
-
Aims to bring clarity to cloudy marketing messages through exhibit hall
chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of
EMC, today ...
Samsung Galaxy S5 could be cheaper than Galaxy S4
-
Good news for would-be Samsung Galaxy S5 customers - the main smartphone
may end up being more economical as opposed to Galaxy S4 was when it
established. ...
Why I _am_ Speaking At RSA 2014
-
There’s been quite a bit of drama with regards to whether or not to boycott
the RSA conference over a deal that the RSA security vendor had made with
the N...
Router backdoor reloaded...
-
S i vous avez aimé l'histoire de la backdoor D-Link, vous allez A-DO-RER
celle-ci. C'est encore sur /dev/ttyS0 que ça se passe, où on apprend que
les route...
One year after, end of Magnificent 7 project !
-
It has been a year already since the start of the Magnificient 7 program !
So what happened during this year ? We added some features to enhance your
analy...
Mobile Device Forensics - Course Update
-
It's been a few weeks since the last update, but things have been busy. The
Fall 2012 term is now in Week 5 (wow, the semester is flying by). We've
covered...
NWScript JIT engine: Wrap-up (for now)
-
Yesterday, I provided a brief performance overview of the MSIL JIT backend
versus my implementation of an interpretive VM for various workloads.
Today, I’l...
0 comments
Post a Comment