public marks

PUBLIC MARKS with tags security & hacking

2018

📛 HACK - VIDEO - Applied Hacking channel - Samy Kamkar - YouTube

by decembre
SITE: https://samy.pl/ Applied Hacking channel. I'm releasing original research, tools and videos around hacking, technology and security - typically around reverse engineering, coding, software, hardware, radio, electronics, fabrication and physical security (as in physical lock picking, not as in flying karate chops). Full source code, schematics, 3D models, and documentation will often be provided, and I'll go step by step into many of these projects so you can follow along, and build even better things! If I don't forget, I'll also explain how to protect yourself from such attacks and methods to improve security.

2016

Parrot Security OS 3.3

by alamat & 1 other (via)
Palinuro has announced the release of Parrot Security OS 3.3, a new release of the project’s Debian-based, specialist distribution with a collection of utilities designed for penetration testing, computer forensics, reverse engineering, hacking, privacy and cryptography:

The WordPress megahack that wasn’t

by alamat & 1 other (via)
Since 2013, WordPress has been updating itself, which is a good thing.

2014

Penetrasyon Testi

by SadeceSEO
Kısaca Pentest diyebilirsiniz. Penetrasyon testi; firmaların bilişim sistemlerini oluşturan ağ altyapılarını, donanım, yazılım ve uygulamalara kötü niyetli birinin (hackerın) saldırmasını öngören yöntemler kullanılarak yapılan saldırı ve müdahaleler ile güvenlik açıklarının tespit edilip bu açıklarla sisteme sızılmaya çalışılmasının simüle edilmesi ve tüm bu işlemlerin raporlanmasıdır.

2012

BackTrack Linux - Penetration Testing Distribution

by jdrsantos & 1 other
"BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack you Install BackTrack, boot it from a Live DVD or thumbdrive, the penetration distribution has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester."

Hackers For Charity

by jdrsantos & 11 others
"Hackers for Charity is a non-profit organization that leverages the skills of technologists. We solve technology challenges for various non-profits and provide food, equipment, job training and computer education to the world's poorest citizens. "

2009

Bypasser le chiffrement de disque sous Linux - devloop :: blog

by Xavier Lacot
Un article très intéressant de devloop, au sujet du contournement de l'encryptage des disques sous Linux. Comme d'habitude, toujours aussi brillant !

USA 2008 Briefings Speaker List

by brianwaustin (via)
BH USA 2008 is now available for free download, and is in several formats, the first of which is a large, hi-resformat with video-sync speaker and presentation.

2008

The Usability of Passwords - Baekdal.com

by ghis & 5 others
Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones. So let's dive into the world of passwords, and look at what makes a password secure in practical terms.

Cold Boot Attacks on Encryption Keys - Center for information technology policy

by rike_
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.

Ophcrack

by jdrsantos & 14 others
Ophcrack is a Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a GTK+ Graphical User Interface and runs on Windows, Mac OS X (Intel CPU) as well a

2007

Combobulate

by jdrsantos
The main goal of Combobulate is to make a central location for software tools and to share computer support problems and solutions with your peers so everyone can benefit. There are many sources on the Internet of good and bad information for the computer

PUBLIC TAGS related to tag security

blog +   create_image +   icon +   identify +   ip +   online +   story +   visual +  

Active users

decembre
last mark : 29/05/2020 12:10

alamat
last mark : 31/12/2016 03:40

kamuran
last mark : 18/09/2016 10:12

SadeceSEO
last mark : 08/06/2014 20:03

jdrsantos
last mark : 02/11/2012 07:56

piouPiouM
last mark : 29/09/2009 08:46

Xavier Lacot
last mark : 01/06/2009 21:20

brianwaustin
last mark : 01/04/2009 14:31

fbureau
last mark : 02/03/2009 13:09

bluetouff
last mark : 25/10/2008 11:08

ghis
last mark : 04/06/2008 15:29

rike_
last mark : 07/03/2008 19:48

kemar
last mark : 25/01/2008 07:56

Thornz
last mark : 03/12/2007 17:24

signalsurf
last mark : 19/10/2007 08:46

cbrocas
last mark : 07/08/2007 07:57