Twenty Year Anniversary
Showing 1 - 9 of 9 RSS Feed

Files

Biologger - A Biometric Keylogger Whitepaper
Posted Sep 7, 2007
Authored by Matthew Lewis | Site irmplc.com

Whitepaper entitled "Biologger - A Biometric Keylogger". This paper discusses using a "Biologger" to capture biometric data and replaying the data via man-in-the-middle attacks.

tags | paper
MD5 | 88e34353043a2a365a7d0bbf43940b13
ciscoLEAP.txt
Posted Oct 3, 2003
Authored by Evol

Writing describing the short comings of Cisco's LEAP authentication used on their wireless access points and how to score root on them.

tags | paper, root
systems | cisco
MD5 | bcf6a5675f0080ac019286e703d133c6
cracking-sql-passwords.pdf
Posted Jul 10, 2002
Authored by David Litchfield | Site ngssoftware.com

Information on cracking the Microsoft SQL pwdencrypt() hash function which is used to generate SQL hashes.

tags | paper, sql injection
MD5 | b5129583890cd61330d4032e897d12f5
kerbdial.ps
Posted Oct 1, 1999

Designing an Authentication System: A Dialogue in Four Scenes: A "play" in which the characters end up designing an authentication system much like Kerberos Provides an easy-to-understand description of why Kerberos is the way it is.

tags | paper
MD5 | 28ef2672a9f96e41fe3c67463e173b70
kerberos.ps
Posted Oct 1, 1999

Kerberos: An Authentication Service for Open Network Systems: A description of the Kerberos authentication system

tags | paper
MD5 | ece251d40450109e732b101721774e37
kerblim.ps
Posted Oct 1, 1999

Limitations of the Kerberos Authentication System: A description of some limitations and weaknesses in the Kerberos authentication system.

tags | paper
MD5 | 78771f72c99173315c38e2a5addb5629
kknight.ps
Posted Oct 1, 1999

KryptoKnight Authentication and Key Distribution System: An authentication and key distribution system that provides facilities for secure communication in any type of network environment

tags | paper
MD5 | 976927e4865947539485f1eabc72ecc2
longjobs.ps
Posted Oct 1, 1999

Long Running Jobs in an Authenticated Environment: A system for running batch jobs in an environment in which users must have tokens or tickets to run

tags | paper
MD5 | c06fcd9e20536a24203ae2b48b940aab
ntn.ps
Posted Oct 1, 1999

A Note on the Use of Timestamps as Nonces: A note on the use of timestamps in authentication protocols

tags | paper, protocol
MD5 | 671e3ea93fe9ff99d4c991357d8c8bb1
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close