Irregular Expressions:

February, 2011


February 27, 2011  9:51 PM

Anonymous vs HBGary



Posted by: Dan O'Connor
anonymous, HBgary, wikileaks

The hack on HBGary federal was one of two things. 1) Revenge, maybe they DID know who it was running the group and they were attacking the servers out of self preservation and just stumbled across the information that was released. 2) Protection of innocent people, they attacked HBGary...

February 27, 2011  9:41 PM

Geneva Convention for CyberSpace



Posted by: Dan O'Connor
links

http://news.bbc.co.uk/2/hi/programmes/click_online/9393589.stm Very interesting, this is going to be a difficult task to say the least. I don't want to re-write the link, but there are more then a few important...


February 27, 2011  2:28 AM

Stuxnet success?



Posted by: Dan O'Connor
links, Stuxnet

Seems to me that it worked better then previously reported. http://www.bbc.co.uk/news/world-middle-east-12588621


February 27, 2011  1:28 AM

Where does HBGary put us?



Posted by: Dan O'Connor
cyber war, HBgary, law, us law

So with HBGary's stash of 0-day attacks and custom rootkits where is the world going? First there is specific laws in the US and other places that make the use of such software illegal, I am interested in the legality of this.  I guess it like being part of the military, you can shoot people...


February 27, 2011  1:11 AM

Another good Ars story



Posted by: Dan O'Connor
links

A little more information on the HBGary stuff,


February 27, 2011  12:57 AM

ISC.SANS.EDU HBGary breakdown



Posted by: Dan O'Connor
links

Well done, why re-invent the wheel? http://isc.sans.edu/diary.html?storyid=10438


February 22, 2011  11:23 PM

Using John the Ripper to brute md5 hashes – Part 3



Posted by: Dan O'Connor
hashes, John The Ripper, md5

To start john with a list of passwords to try you can use;

john --wordlist=english.txt --pot=out --format=raw-MD5 u_password
The input english.txt is a dictionary file, and this is NOT pre-hashed.  John will run through the list and hash the string then compare it to the 'u_password'...


February 22, 2011  11:11 PM

Using John the Ripper to brute md5 hashes – Part 2



Posted by: Dan O'Connor
hash, John The Ripper, md5

Rainbow tables are a very very quick and effective way to figure out a password, but they have a big problem, and I mean big.  They are incredibly large, the more you pre-hash the bigger they get, they can be in the terabytes depending how many characters you are doing. The other method is...


February 22, 2011  11:04 PM

Using John the Ripper to brute md5 hashes – Part 1



Posted by: Dan O'Connor
John The Ripper, md5. jtr

So there is a few types of hashes you may come across, on most Unix type systems you could have a MD5 hash password file.  But not just a MD5 hash, these will include a salt to make the hash unique. Now other systems will use hashes, say like a web application. Now you could do these with a...


February 16, 2011  4:15 PM

Info regarding the HBGary hack



Posted by: Dan O'Connor
links

http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/ Not as exciting as I hoped, pretty standard stuff. SQL Injections Bad Passwords / Hashing Social Engineering Ta-Da!


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: