it_sicherheit   11

Subgraph OS
Subgraph OS is a desktop computing and communications platform that is designed to be resistant to network-borne exploit and malware attacks. It is also meant to be familiar and easy to use. Even in alpha, Subgraph OS looks and feels like a modern desktop operating system.

Subgraph OS includes strong system-wide attack mitigations that protect all applications as well as the core operating system, and key applications are run in sandbox environments to reduce the impact of any attacks against applications that are successful.
linux  it_sicherheit 
september 2017 by grenzreiter
Home Lab for researching, learning and testing - Networking / Discussion - 0x00sec - The Home of the Hacker
Hey everyone,
how do you realize you lab used for testing, reversing, playing around, etc? Do you use virtualization or do you have seperate hardware, or do you even simply work on your normal working system?

At the moment I am thinking about building up a small network testing lab using several raspberry pis, two TP-link routers and in future may also some old x86 Linux and Windows SoC. The first use case for this setup would be to learn more about IP-Sec, sniffing, spoofing and general network setup.
it_sicherheit  hacking 
july 2017 by grenzreiter
How To Build A Password Cracking Rig
Why build a cracking rig? Because it's fun! This article will explain every step in building what I call a "budget" cracking rig. I wanted to save as much money as possible while still maintaining a robust solution that can perform at a small enterprise class level. I never could have imagined the hardest part was getting Nvidia drivers to install properly on Ubuntu, but never fear, every step of the process is included below. With a budget of $5,000 you will find the parts list, assembly, installation, and expected benchmarks if you want to try your hand at building this rig. Or you can go all out and attempt to match the awesome speed of Sagitta's Brutalis.
passwort  it_sicherheit 
may 2017 by grenzreiter
Cracking 12 Character & Above Passwords
What do I mean by cracking 12 characters passwords and above? I'm simply stating that with modern hardware, like the "budget" cracking rig, we can almost exhaustively search the highest probability keyspace for candidate passwords, against fast hashes like MD5, NTLM, SHA1, etc..., in a reasonable amount of time. Normally anything above 8 characters isn’t practical and/or feasible to brute force against standard fast hashing algorithms. When factoring in language and human peculiarities, like the average English word is only 4.79 characters long and people preferring multiple common words when creating 10 characters or longer passwords, you are within cracking distance of these passwords. For a quick reference guide to the various cracking tools and their usage check out Hash Crack on Amazon.
hacking  passwort  it_sicherheit 
january 2017 by grenzreiter
Maths for Hackers - The Hacker Theorem
There is a lot computer science owes to mathematicians such as Ada Lovelace, Charles Babbage, Emil Post, Alan Turing, Stephen Cole Kleene, et al. But much of the beautiful mathematics of Computability Theory and other areas of Mathematical Logic are unknown to many in the area of computer science - and here I include hackers, makers, programmers, systems administrators, etc.
mathematik  hacker  it_sicherheit 
november 2016 by grenzreiter
So funktioniert der Heartbleed-Exploit | heise Security
Der Heartbleed-Exploit macht sich eine Schwachstelle in der Umsetzung der Heartbeat-Erweiterung des TLS-Protokolls in OpenSSL zunutze. Er funktioniert erstaunlich einfach und absolut zuverlässig.
heartbleed  it_sicherheit  tech  internet 
april 2014 by grenzreiter
Botnet-Studie: Größe ist nicht alles Die Europäische Agentur für Internetsicherheit (European Network and Information Security Agency, ENISA) hat einen Bericht zur Erkennung, Messung und Bekämpfung von Botnetzen veröffentlicht
Internetsicherheit  IT_Sicherheit  Botnetz  Bots 
march 2011 by Telemedicus

related tags

botnetz  bots  hacker  hacking  heartbleed  internet  internetsicherheit  kryptographie  linux  mathematik  netzwerktechnik  passwort  tech 

Copy this bookmark: