public marks

PUBLIC MARKS with tag attack


Switcher: Android joins the ‘attack-the-router’ club

by alamat & 1 other (via)
Recently, in our never-ending quest to protect the world from malware, we found a misbehaving Android trojan.

Another Massive DDoS Closes Out 2016, But Mirai Not To Blame

by alamat & 1 other (via)
This past year has been one for the record books when it comes to distributed denial of service (DDoS) attacks, so it is only proper that 2016 closes out with news of another massive DDoS attack, reported by Imperva researchers. According to them, the Imperva Incapsula network was forced to mitigate a 650 Gbps DDoS attack just a few days before Christmas.

Bruce Schneier: ‘The internet era of fun and games is over’

by alamat & 1 other (via)
Internet pioneer Bruce Schneier issued a dire proclamation in front of the House of Representatives’ Energy & Commerce Committee Wednesday: “It might be that the internet era of fun and games is over, because the internet is now dangerous.”


Sneak Attack

by alamat (via)
Main Deck 1 Angel of Despair 1 Arcanis the Omnipotent 1 Crater Hellion 1 Darksteel Colossus 1 Dragon Tyrant 1 Havoc Demon 1 Kokusho, the Evening Star 1 Nicol Bolas 1 Penumbra Wurm 1 Reiver Demon 1 Serra Avatar 4 Solemn Simulacrum 1 Symbiotic Wurm


ADD / XOR / ROL: April 2006

by sylvainulg
More on automated malware classification and naming


Cold Boot Attacks on Encryption Keys - Center for information technology policy

by rike_
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.


Birthday problem / Birthday paradox

by wabaus
A great description of the concept/math behind the Birthday problem. Basically, if you have 23 people in a room, odds are better than 50-50 that 2 folks will share the same birthday. [With a group of 7, odds are better than 50-50 that two folks have a birthday within a week of each other.] Also the basis for the "Birthday attack" hacking vector. Given a hashing (1-way encryption) algorithm of fixed length output, multiple inputs can result in the same hash. It is very difficult to guess an alternate input that will hash into a match of a single given result. But given a large known set of results (e.g., a user account database table) it become more likely that an alternate input might result in a match of at least one existing hash. Thinking on such things keeps the mind sharp :)

Attacks on Concrete Fortifications

by 97Olds (via)
(WWII U.S. Intelligence Bulletin, February 1943)


Underground Bomb Shelters, Nuclear, Biological, Chemical Weapons Protection

by CarolineBogart
Radius Engineering Inc. underground disaster and storm shelters, is engineered protection for your family, valuables, company or organization. Radius Engineering specializes in assisting you develop a disaster plan that custom fits your needs of protection., Charles Culverhouse is the vice president of sales and marketing for Radius Engineering International, Walton McCarthy is the president and owner of Radius Engineering, Intl."


bandwidth attack

by ryanne
[tuesday, 02 august 2005] 轟炸人家的 bandwidth, 實非正人君子所為! 單是八月一日的頭十小時間,便炸了2.7GB...抓破頭也想不明,為何連一個 small potato like me 都不放過?炸了我的網頁又如何?你們以為

PUBLIC TAGS related to tag attack

1 +   2005-11-20 +   2005-11-21 +   9/11 +   a45 +   abuse +   against +   air +   apache +   bandwidth +   biological +   bomb +   brute +   chemical +   ddos +   defense +   dos +   force +   german +   hack +   hacking +   heavy +   intelligence +   ip +   k +   K1attack +   linux +   mercedes +   mirai +   nuclear +   php +   politics +   ponsfrilus +   problem +   robots +   securing +   security +   smtp +   spams +   tank +   tech +   terrorist +   tiger +   traffic +   tunisia +   underground bomb shelter +   volvo +   web_application +   ww2 +   wwii +  

Active users

last mark : 30/12/2016 02:33

last mark : 18/09/2016 10:12

last mark : 11/02/2009 10:35

last mark : 28/10/2008 13:27

last mark : 07/03/2008 19:48

last mark : 09/11/2007 18:36

last mark : 03/11/2007 14:53

last mark : 19/04/2007 23:45

last mark : 19/03/2007 15:36

last mark : 15/06/2006 13:08

last mark : 21/11/2005 11:12

last mark : 14/10/2005 18:30

last mark : 31/08/2005 03:53