Twenty Year Anniversary
Showing 1 - 9 of 9 RSS Feed


Biologger - A Biometric Keylogger Whitepaper
Posted Sep 7, 2007
Authored by Matthew Lewis | Site

Whitepaper entitled "Biologger - A Biometric Keylogger". This paper discusses using a "Biologger" to capture biometric data and replaying the data via man-in-the-middle attacks.

tags | paper
MD5 | 88e34353043a2a365a7d0bbf43940b13
Posted Oct 3, 2003
Authored by Evol

Writing describing the short comings of Cisco's LEAP authentication used on their wireless access points and how to score root on them.

tags | paper, root
systems | cisco
MD5 | bcf6a5675f0080ac019286e703d133c6
Posted Jul 10, 2002
Authored by David Litchfield | Site

Information on cracking the Microsoft SQL pwdencrypt() hash function which is used to generate SQL hashes.

tags | paper, sql injection
MD5 | b5129583890cd61330d4032e897d12f5
Posted Oct 1, 1999

Designing an Authentication System: A Dialogue in Four Scenes: A "play" in which the characters end up designing an authentication system much like Kerberos Provides an easy-to-understand description of why Kerberos is the way it is.

tags | paper
MD5 | 28ef2672a9f96e41fe3c67463e173b70
Posted Oct 1, 1999

Kerberos: An Authentication Service for Open Network Systems: A description of the Kerberos authentication system

tags | paper
MD5 | ece251d40450109e732b101721774e37
Posted Oct 1, 1999

Limitations of the Kerberos Authentication System: A description of some limitations and weaknesses in the Kerberos authentication system.

tags | paper
MD5 | 78771f72c99173315c38e2a5addb5629
Posted Oct 1, 1999

KryptoKnight Authentication and Key Distribution System: An authentication and key distribution system that provides facilities for secure communication in any type of network environment

tags | paper
MD5 | 976927e4865947539485f1eabc72ecc2
Posted Oct 1, 1999

Long Running Jobs in an Authenticated Environment: A system for running batch jobs in an environment in which users must have tokens or tickets to run

tags | paper
MD5 | c06fcd9e20536a24203ae2b48b940aab
Posted Oct 1, 1999

A Note on the Use of Timestamps as Nonces: A note on the use of timestamps in authentication protocols

tags | paper, protocol
MD5 | 671e3ea93fe9ff99d4c991357d8c8bb1
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Butlin's Says Guest Records May Have Been Hacked
Posted Aug 10, 2018

tags | headline, hacker, privacy, britain, data loss
AWS Error Exposed GoDaddy Biz Secrets
Posted Aug 10, 2018

tags | headline, amazon, data loss, flaw
Spec-Exec CPU Bugs Sweep Hacking Oscars
Posted Aug 10, 2018

tags | headline, hacker, flaw, conference, intel
Hack Causes Pacemaker To Deliver Life Threatening Shocks
Posted Aug 10, 2018

tags | headline, hacker, flaw, conference
Caesars Palace Ejected Matt Linton Over A Lousy Tweet
Posted Aug 10, 2018

tags | headline, hacker, usa, google, conference
WhatsApp Security Snafu Could Allow Message Manipulation
Posted Aug 9, 2018

tags | headline, privacy, phone, flaw, facebook, cryptography
Comcast Customer Portal Vulnerabilities Exposed Sensitive Data
Posted Aug 9, 2018

tags | headline, privacy, phone, data loss, flaw
Smart City Systems Are Riddled With Critical Security Vulnerabilities
Posted Aug 9, 2018

tags | headline, hacker, flaw, cyberwar, scada
Linux Vulnerability Could Lead To DDoS Attacks
Posted Aug 9, 2018

tags | headline, linux, denial of service, flaw
Hackers Could Cause Havoc By Pwning Irrigation Systems
Posted Aug 8, 2018

tags | headline, hacker
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By