2008
Cold Boot Attacks on Encryption Keys - Center for information technology policy
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.
KARMA Attacks Radioed Machines Automatically
KARMA is a set of tools for assessing the security of wireless clients at multiple layers. Wireless sniffing tools discover clients and their preferred/trusted networks by passively listening for 802.11 Probe Request frames.
2007
Security Compass - Application Security Canada
What is Exploit-Me?
A suite of Firefox web application security testing tools. Exploit-Me tools are designed to be lightweight and easy to use. Instead of using proxy tools like many web application testing tools, Exploit-Me integrates directly with Firefox.
CARTOME
Cartome, a companion site to Cryptome, is an archive of news and spatial / geographic documents on privacy, cryptography, dual-use technologies, national security and intelligence -- communicated by imagery systems: cartography, photography, photogrammetry, steganography, camouflage, maps, images, drawings, charts, diagrams, IMINT and their reverse-panopticon and counter-deception potential. (seems not maintained anymore however)
Zero Day Initiative
The Zero Day Initiative (ZDI), founded by TippingPoint, a division of 3Com, represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. The program's goal is threefold:
1. reward independent security research
2. promote and ensure the responsible disclosure of vulnerabilities
3. provide 3Com's TippingPoint division customers with the world's best security protection
security freak
Security-Freak.net is an attempt to lower the entry barrier for starting computer security research. During my interactions with security enthusiasts in general and students in particular, i have noticed that many lose interest because of the lack of organized learning resources in this area. This is not to undermine the sheer volume of tutorials written on various security related topics such as raw sockets, packet injection etc. But for most beginners it is very difficult to assimilate these voluminous documents at one go. This realization made me start Security-Freak.net .
2006
Wapiti - Web application security auditor
by 13 othersWapiti allows you to audit the security of your web applications.
It performs "black-box" scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data.
Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.
Wapiti can detect the following vulnerabilities :
* File Handling Errors (Local and remote include/require, fopen, readfile...)
* Database Injection (PHP/JSP/ASP SQL Injections and XPath Injections)
* XSS (Cross Site Scripting) Injection
* LDAP Injection
* Command Execution detection (eval(), system(), passtru()...)
* CRLF Injection (HTTP Response Splitting, session fixation...)
invisiblethings.org
invisiblethings.org is a non-profit website dedicated for sharing the thoughts of its author in the area of computer systems and network security.
joanna rutkowska
Trusted Computing - videoclip @ http://kanalB.org
animation Trusted Computing
Trusted Computing
TCPA stands for Trusted Computing Platform Alliance. For the technology we will speak from TCP (The trusted computing platform). This plans that every computer will have a TPM (Trusted Platform Module), also known as Fritz-Chip, built-in. At later development stages, these functions will be directly included into CPUs, graphiccards, harddisks, soundcards, bios and so on. The long term result will be that it will be impossible to use hardware and software that's not approved by the TCPA. Presumably there will be high costs to get this certification and that these would be too much for little and mid-range companies. Therefore open-source and freeware would be condemned to die.
CERIAS Weblogs » Reporting Vulnerabilities is for the Brave
CERIAS Weblogs » Reporting Vulnerabilities is for the Brave
Security Absurdity.com > Security Absurdity; The Complete, Unquestionable, And Total Failure of Information Security.
by 1 otherSecurity Absurdity: The Complete, Unquestionable,
And Total Failure of Information Security.
boot & nuke
by 6 othersDarik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.
dev.riseup.net: Software Libre
backup, security patches, bamboo cms
1
(13 marks)