/var/log/messages

Article

H-field electromagnetic sniffing

By Piotr Osuch on 16 September 2016

All cryptographic operations are processes where data elements must be represented by physical quantities in physical structures such as gates and transmission lines. These physical quantities and structures must necessarily have a time and spatial extent.

+ read more

Article

Malicious Outlook Rules

By Dave Hartley on 2 September 2016

The process of creating a malicious Outlook rule currently requires interactive GUI access on a compromised system or possession of credentials as well as the ability to interact directly to the exchange server from an attacker...

+ read more

Article

A quick intro to Needle

By Marco Lancini on 17 August 2016

Needle is an open source modular framework which aims to streamline the entire process of conducting security assessments of iOS applications, and acts as a central point from which to do so.

+ read more

Article

The hack that changed the blockchain perspective

By Hristo Georgiev on 11 August 2016

An attack on “The DAO” took place on 17th June 2016. However, believe it or not, the developers did know of the vulnerability before that date (12th of June).

+ read more

Article

Don't Try This at Home: Decapping ICs With Boiling Acid.

By Joel Clark on 24 June 2016

Decapping is the process of removing the black epoxy packaging which makes up a microchip in order to expose the silicon inside.

+ read more

Article

Alice, Bob, and Eve: How quantum technology can secure against adversaries.

By Niel Van Der Walt on 24 June 2016

How do you communicate a top-secret document if someone is sitting ready with a large quantum computer to decode your message? In this article, secure communications scenarios are described.

+ read more

Article

The current state of quantum cryptography, QKD, and the future of information security.

By Niel Van Der Walt on 20 June 2016

Progress in quantum key distribution (QKD) has been rapid over the last few years. In the light of current research progress, how far away is the first commercial roll-out of quantum key distribution? How would the...

+ read more

Article

D-Wave, why all the controversy?

By Niel Van Der Walt on 14 June 2016

When D-Wave released their first quantum annealing quantum computer in 2011, much of the world did not take note. This begs the question: Why not? Are QCs not supposed to be significantly more powerful than normal...

+ read more

Article

Quantum paradoxes: Popping the bubble with Shor's algorithm.

By Niel Van Der Walt on 7 June 2016

On 3 March 2016, MIT News published an article titled: “The beginning of the end for encryption schemes?” The article was prompted by the first demonstration of a generic Shor’s algorithm implementation on scalable hardware.

+ read more

Article

Visualising Organisational Charts from Active Directory

By Stuart Morgan on 6 May 2016

The success of a simulated attack is usually based on a good understanding of the target organisation, both from an infrastructure perspective and from a business perspective; one frequently adopted strategy to achieve a specific goal...

+ read more

Article

Safer Shellcode Implants

By Stuart Morgan on 21 April 2016

Almost all simulated attacks will require, at some point, the installation of a RAT and the establishment of a command and control (C2) channel.

+ read more

Article

Heap tracing with WinDbg and Python

By Sam Brown on 19 April 2016

This post will demonstrate how to write basic WinDbg scripts with Python and how to put together a basic heap visualiser. All of the example code for this post can be found here.

+ read more