seeing is believing
Showing 1 - 9 of 9 RSS Feed


Biologger - A Biometric Keylogger Whitepaper
Posted Sep 7, 2007
Authored by Matthew Lewis | Site

Whitepaper entitled "Biologger - A Biometric Keylogger". This paper discusses using a "Biologger" to capture biometric data and replaying the data via man-in-the-middle attacks.

tags | paper
MD5 | 88e34353043a2a365a7d0bbf43940b13
Posted Oct 3, 2003
Authored by Evol

Writing describing the short comings of Cisco's LEAP authentication used on their wireless access points and how to score root on them.

tags | paper, root
systems | cisco
MD5 | bcf6a5675f0080ac019286e703d133c6
Posted Jul 10, 2002
Authored by David Litchfield | Site

Information on cracking the Microsoft SQL pwdencrypt() hash function which is used to generate SQL hashes.

tags | paper, sql injection
MD5 | b5129583890cd61330d4032e897d12f5
Posted Oct 1, 1999

Designing an Authentication System: A Dialogue in Four Scenes: A "play" in which the characters end up designing an authentication system much like Kerberos Provides an easy-to-understand description of why Kerberos is the way it is.

tags | paper
MD5 | 28ef2672a9f96e41fe3c67463e173b70
Posted Oct 1, 1999

Kerberos: An Authentication Service for Open Network Systems: A description of the Kerberos authentication system

tags | paper
MD5 | ece251d40450109e732b101721774e37
Posted Oct 1, 1999

Limitations of the Kerberos Authentication System: A description of some limitations and weaknesses in the Kerberos authentication system.

tags | paper
MD5 | 78771f72c99173315c38e2a5addb5629
Posted Oct 1, 1999

KryptoKnight Authentication and Key Distribution System: An authentication and key distribution system that provides facilities for secure communication in any type of network environment

tags | paper
MD5 | 976927e4865947539485f1eabc72ecc2
Posted Oct 1, 1999

Long Running Jobs in an Authenticated Environment: A system for running batch jobs in an environment in which users must have tokens or tickets to run

tags | paper
MD5 | c06fcd9e20536a24203ae2b48b940aab
Posted Oct 1, 1999

A Note on the Use of Timestamps as Nonces: A note on the use of timestamps in authentication protocols

tags | paper, protocol
MD5 | 671e3ea93fe9ff99d4c991357d8c8bb1
Page 1 of 1

Top Authors In Last 30 Days

Recent News

News RSS Feed
Domino's Pizza Delivers User Details To Spammers
Posted Oct 18, 2017

tags | headline, privacy, email, spam, fraud
Adobe Patches Zero-Day Used To Plant Gov't Spying Software
Posted Oct 17, 2017

tags | headline, hacker, government, usa, flaw, cyberwar, adobe, zero day, nsa
UK TV Drama About North Korea Hit By Hackers
Posted Oct 17, 2017

tags | headline, hacker, government, britain, cyberwar, korea
Russia Tweaks Telegram With Tiny Fine For Decryption Denial
Posted Oct 17, 2017

tags | headline, government, privacy, russia, cryptography
Never Mind The WPA2 Drama... Details Emerge Of TPM Key Fail
Posted Oct 17, 2017

tags | headline, wireless, flaw, cryptography
Millions Of High Security Crypto Keys Crippled By Newly Discovered Flaw
Posted Oct 16, 2017

tags | headline, flaw, cryptography
Pizza Hut Latest To Be Hit In Card Data Breach
Posted Oct 16, 2017

tags | headline, hacker, privacy, bank, cybercrime, data loss, fraud
Artificial Intelligence - Hype, Hope, And Fear
Posted Oct 16, 2017

tags | headline, botnet, cyberwar
KRACK Attacks: Breaking WPA2 By Forcing Nonce Reuse
Posted Oct 16, 2017

tags | headline, privacy, phone, wireless, flaw, cryptography
Even Pokemon Go Was Used By Russia To Meddle In The Election
Posted Oct 13, 2017

tags | headline, government, usa, russia, cyberwar
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By