asteroza + key   243

KNOB Attack
The spec allowed 1 byte of entropy?!? What the hell were they smoking?
bluetooth  vulnerability  low  entropy  session  key  security  hacking  pentesting 
8 weeks ago by asteroza
So, fun thing Bloomberg did years ago, the B-Unit...
An updated generic version of the B-Unit as a yubikey alternative would be interesting...
bloomberg  security  card  2FA  private  key  optical  hardware  electronics  devices 
12 weeks ago by asteroza
How to BYOK (bring your own key) to AWS KMS for less than $15.00 a year using AWS CloudHSM | AWS Security Blog
Interesting, a one time import from CloudHSM to KMS to start you secret keys right, for those who need to do the HSM thing, then make a secure backup of the HSM in S3 to resurrect it if needed, then kill off the HSM
AWS  CloudHSM  KMS  migration  security  HSM  secret  key  generation  encryption 
may 2019 by asteroza
[SOLVED] Office 2019 - No MSI to install. How do I install it? - MS Office - Spiceworks
Read the comments about fixing the XML for VL 2019 standard, not retail ProPlus
microsoft  office  2019  install  standard  MAK  key 
february 2019 by asteroza
FIDO ®-Multi-Interface | FEITIAN
Looks like google's new Titan security key is an OEM Feitian multi, but allegedly with google built firmware (because Feitian firmware has had issues in the past...)
google  titan  USB  U2F  FIDO  NFC  BLE  bluetooth  security  key  hardware  electronics  devices  2FA  OTP  TOTP  authentication 
july 2018 by asteroza
Security Key Enforcement to Help Deter Phishing  |  Google Cloud
Google soon to be selling their own U2F/FIDO keys called Titan, in USB and BLE flavors. Yubikey not pleased...
google  2FA  U2F  FIDO  security  key  hardware  electronics  devices  USB  BLE  NFC  bluetooth 
july 2018 by asteroza
dgraph-io/badger: Fast key-value DB in Go.
has higher write performance for certain penalties in read
badger  key  value  store  database  noSQL  go  opensource 
june 2018 by asteroza
Security Settings for COM objects in Office
How to kill flash in office, don't forget the wow6432node keys to cover 64bit OS with 32bit office
windows  security  office  flash  block  registry  key 
june 2018 by asteroza
Bowley Lock Company
Interesting anti lockpicking design using an internal pin shield design
door  lock  padlock  slotted  key  security  hardware 
april 2018 by asteroza
Signed Malware
Implies the codesign certs and private keys leaked, which would be the older SHA-1 type that used files/exportable keys. That, or people using the newer dongle based SHA-2 codesign certificates were leaving the dongle plugged in, someone infiltrated the malware to be signed, performed the signature, then exfiltrated the signed malware back out of that company's build environment.
codesign  certificate  private  key  signed  malware  security  reference  information 
november 2017 by asteroza
B-Unit | Bloomberg Professional Services
A sort of beefed up FIDO U2F device, but with higher hardware protection features. Uses a photoreceptor to receive codes from the terminal screen itself, so no NFC/bluetooth/USB
bloomberg  terminal  authentication  portable  private  key  token  hardware  electronics  devices  security 
november 2017 by asteroza
Securing customer data with KMS and Envelope Encryption in Node.js
Interesting pyramid/stacked encryption model to encrypting data with per tenant keys, but the weak point is the AWS KMS stored master key
AWS  cryptography  stacked  envelope  encryption  federated  key  rotation  security  cloud 
october 2017 by asteroza
square/keywhiz: A system for distributing and managing secrets
interesting trick of allowing a FUSE mount of pseduo-files for accessing secrets to allow use with apps that can't handle this kind of secret management normally
security  vault  private  key  password  sharing  management  software  opensource 
september 2017 by asteroza
biokoda/actordb: ActorDB distributed SQL database
highly sharded distributed relational database, using SQLite backend. If you replicate the same thing to all nodes though, it effectively becomes rqlite though.
ActorDB  distributed  SQLite  RDBMS  database  sharding  key  value  store 
june 2017 by asteroza
yahoo/mdbm: MDBM a very fast memory-mapped key/value store.
Larry McVoy claims the version before yahoo fiddled with it was faster, and is in Bitkeeper?
MDBM  memory  mapped  key  value  store  noSQL  database  Delicious 
may 2017 by asteroza
dryman/opic: Fast serialization framework for C
Doing this in C because C++ results in runtime dependencies?
object  serialization  framework  hash  table  map  key  value  store  index  Delicious 
may 2017 by asteroza
Trialling Windows 10 Linked Clones with VMware Horizon View 7 | virtualhobbit
So the trick to faking KMS is setting composer to skip activation, then using a filler KMS key? But what about MAK's?
windows  10  VMware  view  horizon  7  license  activation  MAK  KMS  key  Delicious  skip  composer 
february 2017 by asteroza
Provisioning VMware Horizon View desktops fails with error: View Composer Agent ...
When you need to use a MAK key on a Horizon PoC, you need this, as it defaults to KMS activation otherwise
VMware  view  horizon  windows  license  key  MAK  activation  KMS  Delicious  composer  guest  VM  customization  error 
february 2017 by asteroza
dxa4481/truffleHog: Searches through git repositories for high entropy strings, ...
Good for hunting accidentally leaked AWS keys, but rumor is AWS is already hunting for AWS keys on github and disabling them so...
github  secret  key  high  entropy  string  search  engine  software  opensource  Delicious 
january 2017 by asteroza
« earlier      
per page:    204080120160

related tags

0-RTT  2.0  2D  2FA  2k3  3D  3DES  512MB  802.11  AAA  Abloy  accent  access  accessories  accessory  Accumulo  acoustic  activation  ActorDB  advanatage  Advisor  AES  airBNB  ajax  alarm  Alcatel  alert  algorithm  algorthm  ALT  alternative  ALV  amazon  AMI  analysis  android  anonymizer  anonymous  ANSI  ansible  antipiracy  antivirus  apache  API  apk  app  apple  appliance  apps  architecture  article  ascii  asymetric  attack  audio  audit  authenticated  authentication  authenticode  authority  automated  automatic  automation  availability  AVMA  AWS  backdoor  backup  bad  badger  bagpiper  barcode  based  bean  Belarc  Bell  benchmark  best  bigtable  bill  binding  biometrics  BIOS  bit  bitlocker  blank  BLE  block  blockchain  bloomberg  blowfish  bluetooth  boot  bootcamp  bootlace  break  breaking  brown  browser  brute  BSD  buckle  bug  building  bump  bus  bypass  C  C#  CA  cabinet  cache  calculation  can  carabiner  card  cardkey  caribou  cassandra  cellphone  cert  certificate  certifying  Certigate  chain  change  channel  character  chart  chat  check  chimera  chip  Chord  chrome  CIO  cipher  CIS  citadel  classic  cleanup  CLI  client  clientside  clip  cloud  CloudFlare  CloudHSM  cluster  CMS  code  coded  codesign  cold  colemak  collaboration  collection  color  combination  combo  comibination  common  communications  compact  comparison  compliance  composer  compression  compromised  computer  computing  concealed  concept  config  configuration  confirmation  console  construction  content  control  converter  cookie  coompromised  copyright  covert  cracker  cracking  crypto  cryptographic  cryptography  cryptsetup  CSKL  CSP  CSR  cuff  cufflinks  curve  customizable  customization  cyberkey  cyberlock  cylinder  dallas  DARPA  dashboard  data  database  datamatrix  datastore  ddon  deadmans  decrypter  decryption  defectivebydesign  defense  defensive  Delicious  deniable  deployment  Derivation  design  desktop  development  device  devices  devops  DHS  DHT  diacriticals  diagram  diceware  Diffie-Hellman  direct  directory  disk  display  distributed  distribution  DLL  DMA  DNS  DNSSEC  DoD  dongle  donotwant  door  drive  DRM  DSA  dvorak  DX1  dynamo  e-ink  EC2  ECC  ECDH  ECDHE  EFF  Egnyte  EKE  eKey  electromechanical  electronic  electronics  electyronics  elliptical  embedded  emergency  emulator  enclave  encrypted  encryption  engine  english  enterprise  entropy  entry  envelope  ephemeral  erase  Ergodex  ergonomic  erlang  error  escape  escrow  event  Evros  exchange  experiement  explicit  exploit  export  exposed  extension  extraction  extractor  fabbing  face  facebook  factor  factoring  FAIL  fake  fashion  fast  FDE  feature  federated  FIDO  field  file  filesystem  filetype:pdf  filevault  FIPS-140  firefox  firewire  flash  flathead  floppy  folding  footprint  force  forced  forensic  fork  form  formfactor  forward  framework  Fraunhofer  free  FreeBSD  freeware  full  function  FunctionFlip  FUSE  gadget  gagdet  gear  generation  generator  generic  genuine  geolocation  gift  github  global  go  goatse  goo  google  GPG  GPS  grade  Groo  ground  groupware  GSM  guest  guide  guideline  GVLK  hack  hacking  hadoop  handcuff  handset  handshake  hard  hardening  hardhack  hardware  hash  hast  hibernation  HID  hide  high  hoax  holder  home  horizon  host  hosting  hostproof  house  howto  HP  HSM  HTTP  HTTP/3  HTTP3  HTTPS  human  humor  hybrid  Hyper-V  HyperDex  HyperLevelDB  ibutton  identity  IICS  immutable  implementation  import  in-memory  index  IndexedDB  indexless  indicator  indicators  Infineon  informance  information  infrastructure  input  install  integration  intel  interface  interfaces  interior  internal  international  internet  invalidation  iOS  iPhone  IPMI  iPod  isolation  IT  J-PAKE  japan  java  javacard  javascript  jelly  joke  JSON  JTAN  kai  Kali  KB71033  KB971033  KBR  kernel  key  key-value  Key2Share  keyboard  keychain  keycode  keyfinder  keygen  keyhole  keylength  keyless  keylet  keylogger  keyport  keyring  keyswitch  keyvalue  keyway  Keywhiz  keyword  kickstarter  KMS  knocking  known  KPI  kumofs  Kuznyechik  Labs  LaCie  layout  LCD  LDAP  leak  leakage  leash  LED  length  level  LevelDB  library  licencing  license  lifehacks  Lightcloud  lightweight  limit  link  linked  LinkedIn  linux  list  littleblackbox  live  LMDB  loading  local  location  lock  lockbin  logger  logging  login  logjam  logon  lookup  low  lucene  Lucent  luggage  LUKS  mac  macbook  machine  macro  magical  MAK  malicious  malware  managed  management  manager  managment  Mandos  map  mapped  mapping  mark  master  MDBM  mechanical  mechnical  media:document  memcached  memory  message  messaging  metal  MFA  MFOC  microSD  microsoft  mifare  migration  miniHSM  minimum  mitigation  MitM  mix  mobile  mode  module  money  monitor  monitoring  MQ  MSP  multi  Multiclutch  multikey  multitouch  nCipher  network  networking  NFC  NFS  nirsoft  NIST  noise  nosql  novelty  npm  NSA  NSFW  NTP  nuke  number  obfuscation  object  ObPwd  observation  ODT  OEM  office  offline  OHCI  online  OPAQUE  open  openID  opensource  openSSH  OpenSSL  OpenWays  OPKP  optical  OS  OSX  OTP  overlay  p2p  packet  padlock  pair  PAKE  PAM  panic  paper  parameter  paranoia  party  pass  passcode  passphrase  Passware  password  passwords  Pastry  patch  PBKDF2  PC  PCI  PCMCIA  pentest  pentesting  performance  persistence  persistent  PFX  PGP  phillips  phone  Phonebook  php  physical  pick  picking  PIN  piracy  pirate  PKCS#11  PKCS11  PKI  plastic  platform  plugin  plurk  PoC  port  portable  position  poster  power  powershell  practices  preak  preshared  primary  printing  privacy  private  PrivaTegrity  product  productivity  programming  project  ProjectVoldemort  proof-of-concept  protection  protocol  prototype  provider  proximity  proxy  public  pubsub  purge  push  python  quantum  query  QUIC  qwerty  R2  RADIUS  rails  RAM  range  ransom  ransomware  raper  rare  RC4  RDBMS  read  realtime  recommendation  recommendations  recording  recovery  redis  refence  reference  registry  reinstallation  release  reminder  remote  removal  replacement  repository  research  retractable  retrieval  retro  review  revocation  rewrite  RF  RFID  RGB  Riak  RocksDB  Rohos  root  RoR  rotating  rotation  routing  RSA  RSMU  ruby  run  russia  S3  Safeberg  scalability  scalable  scalaris  scanning  scheduler  schemes  science  scraper  screwdriver  SD  search  searchable  seatbelt  secondary  secrecy  secret  secure  security  seed  selection  self  Self-Certifying  self-destruct  selfdestruct  semiconductor  serial  serialization  server  service  session  sets  setup  SFS  SG  SGX  shadow  shannon  sharding  shared  ShareKey  sharing  sheet  shell  shellcode  shoelace  shortcuts  side  sideload  sieve  sign  signal  signature  signed  signing  size  skip  SLA  slotted  small  smart  smartcard  smartphone  snitch  SOA  software  solution  sourcecode  sovereign  speakerphone  special  specification  speed  SPEKE  spotlight  spy  SQLite  SQN  SRP  ssh  sshkeychain  SSL  sslsnoop  SSO  stacked  standard  starter  status  stenography  storage  store  Streebog  string  structured  stuck  SuperMicro  support  survival  switch  SYN  synchronization  sysadmin  system  table  Tapestry  task  TCP  technologies  technology  temporary  terminal  tether  text  third  tips  titan  titanium  TKIP  TKlog  TLS  token  tokyo  tokyocabinet  tokyotyrant  tools  TOTP  touch  touchpad  TPM  transfer  transparent  transponder  transport  travel  tricks  trigger  truecrypt  TSA  tunnel  tutorial  tweaks  two  twofish  typewriter  typing  tyrant  U2F  U3  uninstall  unlock  untrusted  unusual  update  usage  USB  USB-C  use  user  utilities  utility  UWP  value  Vanish  variable  vault  Ventures  vibration  Videx  view  virtual  virus  vista  visualization  VLK  VLock  VM  VMware  voldemort  volume  VPN  vulnerability  vuze  wallet  weak  web  webdev  webmail  webshell  WEP  WGA  wifi  windows  wireless  WPA  WPA2  write  x.509  X9.31  XP  YoNTMA  YubiKey  Yubikey  ZOMM  Zstandard  ZSTD 

Copy this bookmark: