This weekend I was running a workshop with my awesome friend James, where we were discussing the realities of wireless network security, man in the middle attacks and what we have found in the field, both from an offensive perspective and as corporate network defenders. As with all things in life, sometime reality doesn’t work quite as well as a demo! So I’ve done a quick thread on twitter showing the kill chain an adversary can deploy when attacking WPA2 PSK (without PMF enforced) networ...| PwnDefend
Most of what you will find on this blog is file format identification. I see this as the first step in a longer process of preservation and ultimately access. Hopefully the analysis of some file formats can help make better decisions when needing to render the file in an emulator or migrate to another format. I don’t spend much time trying to parse the files I look at to understand the actual content, just enough to properly identify and differentiate between important versions of the format. | Obsolete Thor
No, you're not personally responsible for slavery, but the entrenched legacy of policies like redlining keep the past alive in a way we can't just get over.| Legal Reader
I just spent at least 15 minutes trying to figure out why every single post on the Internet tells me to place MD5 hash in a file and call John like this john --format=raw-md5 --wordlist=/usr/share/dict/words md5.txt and yet, it constantly gives me an error message: No password hashes loaded (see FAQ) The content of md5.txt was: 20E11C279CE49BCC51EDC8041B8FAAAA I even tried prepending dummy| Everything about nothing
What is Hydra: Hydra is a classic, fast network logon cracker that was created by Van Hauser. It is commonly used as a network logon cracker. The tool is great since it’s both fast and have built-in support for many different protocols. You can find the code at: https://github.com/vanhauser-thc/thc-hydra How to install Hydra: Hydra comes […] The post Brute Forcing With Hydra first appeared on TzuSec.com.| TzuSec.com
How I recovered a Bitcoin passphrase by performing a Breadth-First search on typos of increasing Damerau-Levenshtein distances from an initial guess.| alexbowe.com
Believe it or not, despite the fact it is 2016 I am still finding LanManager (LM) hashes on internal networks during penetration tests. Although in my experience it is becoming more frequent that L…| GrimBlog
Okay, I've been waiting for a long time for a case worth posting in my blog. I ran into this one during a search for much less interesting, standard challenges, for teaching newbies the basics of RE. | Ben Hayak - Security Blog
Why did you choose to start aggressively de-protecting, archiving and re-distributing Apple II software? It’s tempting to rewrite history and give myself some noble purpose for starting this hobby, but in this case the truth [more...] The post Confessions of a Disk Cracker: the secrets of 4am. appeared first on Paleotronic Magazine.| Paleotronic Magazine