public marks

PUBLIC MARKS from rike_ with tag security

2008

Cold Boot Attacks on Encryption Keys - Center for information technology policy

Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.

KARMA Attacks Radioed Machines Automatically

KARMA is a set of tools for assessing the security of wireless clients at multiple layers. Wireless sniffing tools discover clients and their preferred/trusted networks by passively listening for 802.11 Probe Request frames.

2007

Security Compass - Application Security Canada

What is Exploit-Me? A suite of Firefox web application security testing tools. Exploit-Me tools are designed to be lightweight and easy to use. Instead of using proxy tools like many web application testing tools, Exploit-Me integrates directly with Firefox.

CARTOME

Cartome, a companion site to Cryptome, is an archive of news and spatial / geographic documents on privacy, cryptography, dual-use technologies, national security and intelligence -- communicated by imagery systems: cartography, photography, photogrammetry, steganography, camouflage, maps, images, drawings, charts, diagrams, IMINT and their reverse-panopticon and counter-deception potential. (seems not maintained anymore however)

Zero Day Initiative

The Zero Day Initiative (ZDI), founded by TippingPoint, a division of 3Com, represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. The program's goal is threefold: 1. reward independent security research 2. promote and ensure the responsible disclosure of vulnerabilities 3. provide 3Com's TippingPoint division customers with the world's best security protection

security freak

Security-Freak.net is an attempt to lower the entry barrier for starting computer security research. During my interactions with security enthusiasts in general and students in particular, i have noticed that many lose interest because of the lack of organized learning resources in this area. This is not to undermine the sheer volume of tutorials written on various security related topics such as raw sockets, packet injection etc. But for most beginners it is very difficult to assimilate these voluminous documents at one go. This realization made me start Security-Freak.net .

2006

Wapiti - Web application security auditor

by 13 others
Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable. Wapiti can detect the following vulnerabilities : * File Handling Errors (Local and remote include/require, fopen, readfile...) * Database Injection (PHP/JSP/ASP SQL Injections and XPath Injections) * XSS (Cross Site Scripting) Injection * LDAP Injection * Command Execution detection (eval(), system(), passtru()...) * CRLF Injection (HTTP Response Splitting, session fixation...)

invisiblethings.org

invisiblethings.org is a non-profit website dedicated for sharing the thoughts of its author in the area of computer systems and network security. joanna rutkowska

Trusted Computing - videoclip @ http://kanalB.org

animation Trusted Computing Trusted Computing TCPA stands for Trusted Computing Platform Alliance. For the technology we will speak from TCP (The trusted computing platform). This plans that every computer will have a TPM (Trusted Platform Module), also known as Fritz-Chip, built-in. At later development stages, these functions will be directly included into CPUs, graphiccards, harddisks, soundcards, bios and so on. The long term result will be that it will be impossible to use hardware and software that's not approved by the TCPA. Presumably there will be high costs to get this certification and that these would be too much for little and mid-range companies. Therefore open-source and freeware would be condemned to die.

CERIAS Weblogs » Reporting Vulnerabilities is for the Brave

CERIAS Weblogs » Reporting Vulnerabilities is for the Brave

Security Absurdity.com > Security Absurdity; The Complete, Unquestionable, And Total Failure of Information Security.

by 1 other
Security Absurdity: The Complete, Unquestionable, And Total Failure of Information Security.

boot & nuke

by 6 others
Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.

dev.riseup.net: Software Libre

backup, security patches, bamboo cms

rike_'s TAGS related to tag security

0day +   Activism +   archive +   attack +   backup +   bug +   cartography +   cms +   covert channel +   data destruction +   dram +   encryption +   hacking +   linux +   privacy +   script +   trusted computing +   unix +   web +   windows +   wireless +