Do you think your wireless communications are secure? Think again. There is a vulnerability built into the WPA2 protocol itself! It's based on abusing the GTK (Group Temporal Key) and can be used to create man-in-the-middle and denial-of-service attacks. Too few people know this.
Read more »WPA2 is vulnerable (hole196)
Category: High End Tags:
- Login to post comments
New 'Kraken' GSM-cracking software is released
"On Friday, an open source effort to develop GSM-cracking software released software that cracks the A5/1 encryption algorithm used by some GSM networks." "The software is key step toward eavesdropping on mobile phone conversations over GSM networks. Since GSM networks are the backbone of 3G, they also provide attackers with an avenue into the new generation of handsets."
Read more »Category: Industry Tags:
- Login to post comments
Howto Crack Zip Files Password
If you want to crack zip file passwords use fcrackzip.fcrackzip is a fast password cracker partly written in assembler. It is able to crack password protected zip files with brute force or dictionary based attacks, optionally testing with unzip its results.
Read more »- Login to post comments
UK Government: Closed Minds on Open Source
To its eternal shame, the UK Government uses far less open source than most. Worse, it seems to have a closed mind to the whole idea.
Read more »Category: Government Tags:
- Login to post comments
How a Linux Server Gets Turned into a Zombie
This article describes the forensic analysis of a cracked server. The analysis process is describe in quite detail.
Read more »Category: High End Tags:
- Login to post comments
Holliday cracking - story of a cracked machine
"A friend of mine asked me to have a look at his Linux-server. "It behaves strangely" he said, most notably the web-server apache refused to start. It turned out to be more than just a problem with apache."
Read more »Category: High End Tags:
- Login to post comments