Irregular Expressions

June 29, 2012  2:25 PM

John the ripper now with GPU support

Dan O'Connor Dan O'Connor Profile: Dan O'Connor

I will have to update my tool box this weekend.

Always exciting to get updates to the old stand-by’s.



June 29, 2012  1:38 PM

Julian Assange

Dan O'Connor Dan O'Connor Profile: Dan O'Connor

So Mr.Assange has declined to surrend him self at this time.  This should not be seen as a insult to the local police and the order, at this point the international law would take precedence.  Once Ecuador has reviewed this application he will either leave or stay.  If he stays he might never leave the embassy, and there is no way for the embassy to get him legally out of the country.  Once he leaves the grounds he can be arrested.  The other alternative is that he lives in the embassy for a really long time, years to decades.

Technically they could try and close the embassy then he could be taken in to custody.

June 29, 2012  1:04 PM

Messing with drones

Dan O'Connor Dan O'Connor Profile: Dan O'Connor

The implications of this could be bad.

The short version is that they use cheap equipment ( sub $1,000 ) to create a fake GPS signal to confuse the drone.  This could range from crashing it in to something like a building or the ground or misleading it to another zone for combat.

Civilian GPS is no encrypted, I wonder how well the military version is?

June 28, 2012  2:39 PM

Mega Updates

Dan O'Connor Dan O'Connor Profile: Dan O'Connor

A NZ judge has ruled that the search warrants used to raid Mr.Dotcoms home were invalid.  It seems that the warrants were too vague when it came to the material they were searching for.

The judge also ruled that the copy of the data that was taken was also unlawful.


I am very unsure of how all of this is supposed to play out?

Megaupload was not a US company or is Mr.Dotcom a US citizen, so I don’t get how he is being charged with breaking US law?  The whole intent may have been to just destroy the business and him.


June 27, 2012  1:20 PM

New Tool

Dan O'Connor Dan O'Connor Profile: Dan O'Connor

Mandiant has added a new tool to their repository.

It’s a memory analysis tool for Macs.

I can’t wait for an excuse to use it for something constructive.  You will find tools like this extremely useful when investigating issues of possible infections or strange behaviour.

June 27, 2012  12:57 PM

Update to WinAUTOPWN

Dan O'Connor Dan O'Connor Profile: Dan O'Connor

Fun little framework to play with.


I usually prefer *nix based tools but it’s always good to have a spare around.

June 26, 2012  1:55 PM

Hash cracking with GPU’s

Dan O'Connor Dan O'Connor Profile: Dan O'Connor

Most interesting thing I have seen on this topic in a long time.

For quick reference here is the software he is using.

My spare machines never had a video card that was capable of running this, but I think I will see if I can get a hold of a card just to play around with it.

The performance comes from the architecture of the video card, it goes for parallel processing which just happens to work very well for making lots and lots of hashes at the same time.

June 25, 2012  11:41 PM

Lulz Sec updates

Dan O'Connor Dan O'Connor Profile: Dan O'Connor

A couple of the accused members have pleaded guilty, my thoughts are there was some sort of deal.  But you never know if they did not want to have to go through a trial.  It could also have implications on sentencing, making the difference between months and years.

Ryan Ackroyd’s evidence will take over 3,000 hours to review alone.

June 22, 2012  2:50 PM

More cyberwar / corporate espionage stuff

Dan O'Connor Dan O'Connor Profile: Dan O'Connor

This happens far more then is reported.

Surprisingly Chinese government authorities have assisted with the investigation, typically this can be very difficult to have international law enforcement cooperate with issues like this.

June 21, 2012  10:58 PM

Flame malware authors

Dan O'Connor Dan O'Connor Profile: Dan O'Connor

I don’t think it’s surprising to hear that it was a government behind the development of the Flame malware.  What I am shocked to hear is that there is sources directly confirming this.

This is a direct attack by governments against another government.  In the non-cyber would this would be a full scale conflict at this point.  Also considering the US governments official response to some form of cyber attack would be kinetic.

I have to wonder if there is some sort of response from Iran, do they have the ability to respond?  Would they?  Why is there no heated political response from Tehran?

Personally I think these kinds of activities have been going on for well over 5 years at least.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: