Location:Okemos Rd,,United States
Tuesday, December 27, 2011
Wednesday, December 7, 2011
GPU Password Cracking
Those days are gone !
Brute force cracking password hashes is becoming too easy thanks to apps that make use of the multiple cores in graphics cards.
CPU Password cracking
Core 2 Duo 2.13 GHz - 2.5 Million Hashes / Second
Core i7 980x - 19. Million Hashes / Second
GPU Password cracking
Radeon HD 5830 ($109) - 290 Million Hashes / Second
Radeon HD 6990 (($740) - 760 Million Hashes / Second
Multi GPU setups can achieve staggering rates of performance.
The White Pixel system (http://whitepixel.zorinaq.com/) has 4 AMD Radeon HD 5970 graphics cards and custom software. (each 5970 Card has dual GPU ‘s and costs around $400).
it can churn through more than 33 Billion Password hashes per second.
What's the best Alternative to passwords ?
-Posted from my IPhone 4S
Tuesday, December 6, 2011
Honeypot Folders
I recently heard mention of setting up a system using honeypot folders on servers as a easier and cheaper alternative.
Basically, you can do the following.
1. Configure a folder on each server and place one or several documents in it which appear to contain confidential data. The folder name should indicate that it is important, like “Accounting Backup Data” but the data within it is actually fake and may even be misleading.
2. Notify users that the folder is not to be accessed.
3. Configure logging of all access to the folder and also alerting
Should an intruder gain access into the network, they will almost certainly look in the folder, which will generate and aid in their detection.
1. Configure a folder on each server and place one or several documents in it which appear to contain confidential data. The folder name should indicate that it is important, like “Accounting Backup Data” but the data within it is actually fake and may even be misleading.
2. Notify users that the folder is not to be accessed.
3. Configure logging of all access to the folder and also alerting
Should an intruder gain access into the network, they will almost certainly look in the folder, which will generate and aid in their detection.
-Posted from my IPhone 4S
Location:Okemos Rd,,United States
Friday, December 2, 2011
iPhone 4s rocks
Siri has issues with my new Zealand accent but short commands work ok.
Just need to migrate from my Motorola zoom to an iPad next.
-Posted from my IPhone 4S
Location:Work
Tuesday, November 15, 2011
NetWitness
-Posted from my IPhone 4S
Tuesday, November 1, 2011
iPhone 4s
Posted from my IPhone 4S
Location:Okemos Rd,,United States
Friday, October 28, 2011
New IPhone 4S
- Posted using BlogPress from my iPhone
Location:Okemos Rd,,United States
Tuesday, August 30, 2011
Data Exfiltration
Are your network monitoring systems warching for data exfiltration over voip ? Probably not.
I saw a great demo of a exploited system using voip to call into a conference number and the hacker calling into the conference number and isuing commands to the hacked system. He even had the hacked system read back the contents of a text file from its drive and the commands were issued from a simple dumb cellphone.
scary stuff.
Monday, August 22, 2011
External Port Scanners
Hackers continually scan prospective targets looking for vulnerabilities.
What if we analysed each request in real time and generated a reply to indicate we were vulnerable, when in actuality we are not.
The external hacker will try to exploit these false positives and give us, on the defensive team, more time to analyse thier attacks and gather evidence while not having to worry about the risk of the hacker being successful.
This will also help to hide the real vulnerabilities we may have in an ocean of false ones.
Thursday, August 18, 2011
Passive Offensive
A new view of honey pots.
A honey pot has traditionally been a vulnerable system you place in your dmz (which has fake data on it)for hackers to attack so you can gain info on the attacker while the attacker thinks they have penetrated an important system.
Why not integrate a fake network in your dmz, add a few virtual honeypot systems with virwual firewalls.
Write a few extra input form pages in your production web apps which your regular users canot navigate to. These fake pages will be found by hackers doing eb scans and the form inputs can be pointed to a fake database on a fake server.
Giving the hackers all this virtual booty will slow them down allow you to weed out the more dangerous smart hackers, monitor them and gather info for a legal case if necessary.
Stay tuned for more.
Playing to win - Active network security
Current information security doctrine leads to reactive security. We incorporate layers of firewalls and monitoring tools into our networks in the vain hope of stopping most hackers and slowing down and monitoring the smart few who can penetrate the security.
This defensive only playbbook is a recipe for disaster as can be seen in the news every week as company after company suffers data breaches.
With the complexity of modern networks and the inability to fully automate everything fully the human error factor will eventually leave an opening for hackers to get in.
Its time to re-evaluate our approach to security and take a page out of another playbook. The information security battle is just that, a battle between two teams, The good guys trying to protect confidentiality - integrity and availability of the data, and the bad guys trying to access that data or deny others access to it.
You dont win a battle by sidelining your offense. Admittedly legal issue prevent us from hacking the hackers but we can safely integrate passive defensive tequniques and systems to make it much more difficult for hackers to gain access. And if its too hard the majority of hackers will go looking for an easier target.
Passive Offensive can be implemented in a number of ways and I will describe them in following articles.
Lets play to win and not rely on a purely defensive network infrastructure.
Monday, July 11, 2011
Another lame email scam
Got this lovely email scam and lame phishing attempt in my gmail inbox today......
We are shutting down some accounts that are not presently updated on our database system and your account was authomatically choosen. We are sending you this Email to verify and let us know if you still want to use this account..
*Full Name :
*Email ID :
*Password :
*Occupation :
*Alternative Email:
*Region/Territory :
Note: This email is only for Gmail users (Users should reply within 48 hours to avoid "Permanently Lockup" Account)
Thank you for using Gmail !
The Gmail Team
-------
If it hadnt been from google-inc.com I still wouldnt have fallen for it. I feel for the thousands of victimw out there who do fall for these and wish I could track down the senders and make thier online lives miserable as the victimes will be.
Saturday, July 9, 2011
Friday, June 10, 2011
Telephone calls on the Motorola Xoom
Install Groove IP and link it to your Google voice account and then you can dial out and receive calls over wifi on your Xoom.
Motorola Xoom overclock
My Xoom is currently running the tiamat kernel. Its over locked to 1.4 ghz, but when I kick it up to 1.7ghz the quadrant score tops 3800.
Saturday, June 4, 2011
Monday, March 28, 2011
Trip to florida was fun
Well, we are back from florida. Tons of pictures and a bag full of toys for the kids.
Will be posting pics soon.
Sunday, March 13, 2011
Motorola xoom
Just got a motorola xoom last night. I love it.
.
I installed Fring which will let me video chat to someone with an iphone.