+

Tagged With / 'Trojan'

December 1, 2007


Designing a Crypto Attack on the Ccrp (Bit Shuffling) Cipher

A bitdump (after encryption) of Mary had a little lamb, its fleece was white as snow, and everywhere that Mary went the lamb was sure to go. Note the variable clustering of 1 and 0 bits. This is what actual random ciphertext should look like. Author: Dale Thorn Source: https://hakin9.org Hakin9 12/2007 What you will learn… Crypto vulnerabilities […]

Read more

February 2, 2006


Snort_inline as a solution

Using Snort_inline in many different environments and scenarios has proved to be a winning strategy to secure internal networks, DMZ networks or home networks. In order to work properly in the drop mode, it should adapt to the features of the environment it is protecting. Therefore, we will not only present its configuration techniques but […]

Read more

May 1, 2005


Robot wars – how botnets work

One of the most common and efficient DDoS attack methods is based on using hundreds of zombie hosts. Zombies are usually controlled and managed via IRC networks, using socalled botnets. Let’s take a look at the ways an attacker can use to infect and take control of a target computer, and let’s see how we […]

Read more

April 1, 2005


Outsmarting Personal Firewalls – an Introduction for Windows Developers

Many Internet users use socalled personal firewalls, like Softwin BitDefender or Norton Personal Firewall. These applications generate prompts when other programs try to establish Internet connections and block such attempts if they are not confirmed by the user. Nevertheless, there is at least one possibility of outsmarting such firewalls. Author: Mark Hamilton Source: https://hakin9.org Hakin9 4/2005 What You […]

Read more

February 1, 2005


MD5 – Threats to a Popular Hash Function

MD5 is probably the most used one-way hash function nowadays. Its area of application starts with simple file checksums and propagates even to DRM (Digital Rights Management). Although serious openings within MD5 had been considered problematic, one of them was found by Chinese researchers and presented at the CRYPTO conference in 2004. Authors: Philipp Schwaha, Rene […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa