asteroza + channel   76

[1901.01161] Page Cache Attacks
This is kinda bad, since it leverages software caches and can be hardware agnostic, allowing write once malware that works well all over (javascript?)
shadow  page  cache  side  channel  attack  exploit  security  hacking  pentesting 
january 2019 by asteroza
ECCploit: ECC Memory Vulnerable to Rowhammer Attacks After All - VUSec
DD3, but they think the same timing sidechannel is present in DDR4...
rowhammer  attack  exploit  timing  side  channel  DDR3  ECC 
november 2018 by asteroza
Publications | Outflank
DoH turning into a Doh! You may begin to hate yourselves...
virus  C2  secondary  communications  channel  beacon  DNS  DoH  HTTPS  SSL  TLS  SPF  security  hacking  pentesting  redteam 
october 2018 by asteroza
InventWood
Basically stripping lignin from trees to make an aligned fiber channel nannocellulose nanowood material, with anisotropic insulation properties. This spinout is marketing the stuff. Weird uses include blackening a top surface of an aligned block and floating it on a water surface, as a concentrated solar power receiver to make steam by capillary action through the aligned fibers.
insulation  insulator  materials  science  research  technology  wood  nanowood  nanocellulose  anisotropic  aligned  fiber  channel 
march 2018 by asteroza
TLS C2
Oh god, smuggling C2 commands in TLS cert subject names. I suppose it should be possible to be bidirectional using both server and client selfsign certs....
covert  channel  TLS  SSL  certificate  subject  name  C2  command  security  hacking  pentesting 
february 2018 by asteroza
ATACAMA
Wow, microfluidic channels embedded in fabric which allow directional control of fluid movement, so you can do things like channel sweat from a shirt into the shirt bottom so it will drip out.
microfluidic  channel  textile  fabric  fluid  directional  control  dry  materials  science  research  technology  mositure  wicking 
july 2017 by asteroza
Bit By a Mouse: Data Via Pointer Motion | It's Every Bit For Himself
Interesting... Wonder if a little Nethunter rubby ducky action might work, if keyboard logging was enabled on the PC...
mouse  pointer  movement  side  channel  data  transfer  security  research  hacking  Delicious 
october 2015 by asteroza
Speedify - Speed Up Everything You Do Online!
Uses a shotgun modem approach, with more intelligent load balancing.
shotgun  modem  channel  bonding  VPN  service  wifi  wireless  3G  4G  LTE  Delicious 
june 2015 by asteroza
Miniature switch-mode power transformers
Zaptec apparently developed a high power, high current transformer that is super compact for running a plasma channel drill.
ESA  Zaptec  switching  mode  transformer  high  power  current  electropulse  plasma  channel  drill  hardware  electronics  devices  research  technology  drillbit  space  mining  drilling  Delicious 
march 2015 by asteroza
NearBytes
Interesting alternative to NFC touchless comms, particularly for authentication/payment systems
NearBytes  acoustic  communication  protocol  proximity  short  range  ultrasonic  audio  sound  smartphone  android  iPhone  windows  app  software  authentication  side  channel  Delicious 
june 2014 by asteroza
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
Dooooooom in about an hour. With any ground probe as an alternative access to the side channel, everybody's screwed unless the something like the mitigation measures are used.
cryptography  side  channel  private  key  leak  leakage  security  acoustic  ground  RSA  research  Delicious 
december 2013 by asteroza
NearBytes
Audio modem communications SDK, to use the speaker/mic on smartphones as an auxiliary low data rate transmission channel, as an alternative to NFC, around 50-100Kbps.
app  audio  android  data  alternative  transmission  SDK  NearBytes  software  iPhone  rate  sound  NFC  low  channel  iOS  modem 
august 2013 by asteroza
Sharefest
Interesting semi-ephemeral p2p file sharing service. Similar to torrenting, in that you "seed" by keeping the browser tab open, and share files via a link. If everyone drops out, the sharing dies. If you stop,, but someone else keeps going, it stays alive. Uses javascript and webRTC's data channel for data hauling.
javascript  webRTC  ephemeral  data  opensource  web  software  P2P  sharing  file  browser  service  channel  Sharefest  Delicious 
june 2013 by asteroza
SonicNotify: Creating media in presence
Using embedded ultrasonic coded data to transmit information to smartphones, this is the audio equivalent to the QRcode. May have potential a digital watermark on live event music/audio streams. The advertising possibilities are almost endless, since any advertising URL's are automatically embedded (provided your particular audio codec which you use for recording doesn't strip ultrasonics out).
SonicNotify  embedded  high  frequency  ultrasonic  data  code  watermark  information  android  iPhone  app  software  advertising  marketing  secondary  communications  channel  Delicious 
february 2012 by asteroza
The XLR8r Flash Based Storage Array, 250,000 IOPS | WhipTail
$50K for a 1.5TB with monster random IO throughput. Has the strange property of writes being faster than reads (usually it's the opposite for flash memory storage). RAID 5 with hot spare, also uses dedup and compression to get above the nameplate storage capacity. If I didn't know better, I could almost swear they were using an all flash ZFS setup. While it could be used as a cache/high level storage tier, these guys are saying the cost/performance levels are getting to the point that it's hard to justify hard disk arrays anymore.
compression  deduplication  dedup  Whiptail  XLR8r  MLC  NAND  flash  block  storage  RAID  array  server  hardware  electronics  devices  virtualization  VDI  cloud  2U  rackmount  ISCSI  fiber  channel  infiniband  RAID  5  Delicious 
february 2012 by asteroza
The Next Wave of Botnets Could Descend from the Skies - Technology Review
Oh this is EVIL, which is why I love this. Wanna be a contract UAV driver for shadowy eastern european mafia groups, right out some Gibson novel? The added trick is the tradeoff between transit/loiter time while in VTOL mode, and long duration ops during a perching fixed/landed mode.
WaSP  AR.Drone  3G  GSM  wifi  wireless  roaming  attack  drone  hacking  security  botnet  remote  control  out-of-band  secondary  channel  hardware  electronics  devices  UAV  MAV  UAS  research  stalker  automated  warflying  wardriving  perch  perching  mobile  accesspoint  Delicious 
september 2011 by asteroza
Overview | Nexsan E60 | By Name | Products | Nexsan
Nice high density storage hardware, but a pity about the setup. RAID6 isn't going to save you from bitrot, and it only gets worse as the disk size goes up since spinning hard disk sustained access speeds have topped out around 125MB/sec, but disk sizes are going over 2TB now so restriping an array is an exercise in patience. AutoMAID is interesting, but that's really only applicable when using certain storage access styles and filesystems. Also note that it requires a 1.2m (48 inches!) depth rack (most racks are 32-36 inches!). Too bad I can't stuff Nexenta into this directly, though I suppose stringing it up via 10Gbit iSCSI to a Nexenta head wouldn't be too bad...
devices  Nexsan  E60  4U  60  disk  SATA  SAS  storage  server  appliance  iSCSI  fibre  channel  FC  SFP  LC  hardware  Delicious  electronics 
march 2011 by asteroza
IBM develops ZTIC USB stick for secure online banking
So, let me guess, windows only and uses autorun tricks to setup a USB to ethernet adapter. Seems like a retarded little brother of a BlackDog K9 personal server.
online  information  alternative  UI  USB  user  channel  dongle  reader  interface  SSL  smartcard  stick  banking  blackdog  IBM  trusted  ZTIC  zone  Delicious 
march 2009 by asteroza
SANS Internet Storm Center; Cooperative Network Security Community - Internet Security - isc
Wow, fake parking ticket with URL leading to a malware injection page. This would be good for targeted spearphishing some CFO.
engineering  social  tips  tricks  security  offline  channel  side  phishing  infection  malware  insertion  spearphishing  spear  Delicious 
february 2009 by asteroza

related tags

2.0  2U  3D  3G  4G  4U  24/7  absorber  accelerator  accelerometer  accesspoint  acoustic  additive  advertising  aggregator  air  airgap  airport  AJAX  aligned  alloy  alternative  analysis  android  animals  anisotropic  antenna  app  appliance  AR.Drone  arc  array  artificial  attack  attacks  attribute  audio  authentication  automated  back  backdoor  banking  beacon  BGM  bidirectional  binary  blackdog  block  blooming  boiling  bolt  bonded  bonding  book  botnet  branch  browser  C#  C&C  C2  cache  case  certificate  channel  chip  citrix  closeout  cloud  CNC  code  COM  comet  command  communication  communications  compact  compression  construction  consulting  context  contextual  contractor  control  cooling  covert  cryptanalysis  cryptography  culture  current  custom  cute  DAS  data  Dataram  DDR  DDR3  dedup  deduplication  defeat  defense  Delicious  deposition  detection  development  devices  DEW  DHT  dielectric  diffusion  directional  discharge  disk  distance  DIY  DNS  dogs  DoH  dongle  DRAM  dredging  drill  drillbit  drilling  drone  dry  duplex  DVC  dynamic  E60  ECC  electric  electrolaser  electronics  electropulse  embedded  enclave  enclosure  encrypted  encryption  energy  engineering  ephemeral  ESA  espionage  ethernet  evaporative  evaporator  event  exchanger  execution  exfilation  exfiltration  exploit  extraction  fabber  fabric  FC  FCoE  fiber  fibre  file  flash  fluid  fluidic  frequency  fuidic  gallium  gateway  Gbps  general  gigabit  gmail  google  GrandCentral  ground  GSM  guide  guided  gyro  gyroscope  hacking  hardware  heat  Heatric  HID  high  howto  HTTP  HTTPS  hybrid  IBM  IC  identity  induced  industrail  infection  infiniband  information  insertion  install  insulation  insulator  intel  interface  interference  introduction  ion  ionization  iOS  iPhone  iron  iSCSI  ISCSI  IT  japan  javascript  jazz  JSON  key  keylogger  land  laser  LC  leak  leakage  LED  LGE  library  lightning  linux  LIPC  liquid  long  low  LTE  magentic  malware  management  manufacturing  marine  market  marketing  materials  MAV  media  memory  mesh  messaging  metal  metasploit  meterpreter  michal  Micro  microchannel  microfluidic  microphone  military  mining  MLC  mobile  mode  modem  mositure  mouse  movement  music  name  NAND  nanocellulose  nanoparticle  nanowood  NAS  NASA  NearBytes  network  networking  news  Nexsan  NFC  NIC  offline  offshore  online  opensource  openSSL  optical  out-of-band  p2p  packet  page  password  patent  PCHE  penetration  pentest  pentesting  perch  perching  performance  pets  phishing  photoetch  PHP  PIN  plasma  plugin  PoC  pointer  port  power  prediction  printer  privacy  private  profile  programming  proof-of-concept  protection  protocol  proximity  proxy  PSTN  puppy  python  rack  rackmount  radio  RAID  RAIDinc  RAM  RamSan  range  raspberrypi  rate  RDP  reader  realtime  reclamation  reconfigurable  recovery  redirect  redirector  redteam  reference  reliable  remote  research  reverse  review  RF  roaming  rootkit  rowhammer  RSA  RSP  rule  sample  SAN  SAS  SATA  SBPA  science  SDK  SDR  secondary  secure  security  selective  server  service  setup  SFP  SGX  shading  shadow  Sharefest  sharing  shock  short  shotgun  side  sidechannel  simple  smartcard  smartphone  smooth  snort  social  sociology  Socket.IO  software  solid  SonicNotify  sound  space  spear  spearphishing  spectre  speculative  speed  SPF  SRP  SRP-Hermetic  ssd  SSL  stalker  state  steganography  stick  storage  structure  subject  switching  sysadmin  talos  taser  TCP  technology  telehash  TEMPEST  terminal  textile  thermal  timing  tint  tips  TLS  tools  transfer  transformer  transmission  tricks  trunking  trusted  Tsunami  tunnel  tutorial  TV  twitter  UAS  UAV  Ubuntu  UC  UDP  UI  ultrasonic  unified  USaBUSe  USB  user  utilities  UV  vaporwave  VDI  video  virtual  virtualization  virus  voice  voicemail  VoIP  VPN  wardriving  warflying  WaSP  watermark  WCF  weapon  weather  web  webRTC  whine  Whiptail  wicking  wifi  window  windows  wire  wireless  wood  Xanadu  XcelaSAN  XLR8r  youtube  Zalewski  zapper  Zaptec  zone  ZTIC 

Copy this bookmark:



description:


tags: