There was a story on Slashdot last weekend about a cipher invented in 1918: the Chaocipher. In summary: John F. Byrne invented a two wheel enciphering device. He tried, unsuccessfully, to sell the…| my 20%
I’ve been busy with a lot of things lately, but figured I should probably post my final undergraduate thesis in case it is useful for someone interested in information assurance. I’ve …| my 20%
Update: I’ve moved all these materials to their own page for easy reference.| my 20%
Update: The module has been added to the Metasploit tree. Thanks to jduck for cleaning it up and generalizing it! View here; now just use svn update to get the module. — In my previous post…| my 20%
While perusing Full Disclosure recently, I came across Jon Butler’s Proof of Concept (PoC) exploit for Easy FTP Server 1.7.0.2, an obscure FTP server. I’m no expert on exploit developme…| my 20%
Small update. A few changes since v0.2: if new password is set and mode is not, default mode to “command” (this will cause password to be enforced rather than ignored) clarified usage …| my 20%
I released v0.2 of my efipw tool originally discussed here. It’s a complete rewrite in Python for a number of reasons (manageability, simplicity, and v0.1 stopped working on Snow Leopard at …| my 20%
This is a follow-up to my previous post. For background on this post, please read that post. The botnet master behind the attacks described in the last post could be*: Romanian trancetears@yahoo.c…| my 20%
First of all, I want to apologize for not getting around to writing part 2 of my previous post yet. I have more free time now and have started research for that post, but haven’t had a chance…| my 20%
Recently, as part of Professor Brumley’s Vulnerability, Defense Systems, and Malware Analysis class at Carnegie Mellon, I took another look at Aleph One (Elias Levy)’s Smashing the Stac…| my 20%