-
Archives
- January 2022
- December 2020
- December 2019
- June 2019
- January 2018
- March 2017
- January 2017
- February 2016
- March 2015
- January 2015
- December 2014
- November 2014
- September 2014
- July 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- November 2010
- October 2010
- September 2010
- July 2010
- January 2010
- October 2009
- September 2009
- August 2009
- June 2009
-
Meta
Category Archives: Security
Installing pyftdi on Ubuntu 18.04 for FT232H and FT2232H boards
Why use FT232H and FT2232H boards? I wanted to use a FT232H board for some hardware hacking. The FTDI FTxxx family of devices and boards based on this chip is categorized as a Multi-Protocol Synchronous Serial Engine (MPSSE), which can … Continue reading
Bus Pirate Cables – which is the best?
One of the more useful tools for reverse engineering hardware is a Bus Pirate. However, it does not come with any sort of cable or connector. You can use DuPont connectors, if your device has headers soldered to it. However, … Continue reading
Posted in Hacking, Security
Tagged Bus Pirate, Cables, Hardware Hacking, Reverse Breadboard
Leave a comment
LetsEncrypt + Amazon EC2 = SSLLabs A Rating
I wanted to easily add web security to a static AWS EC2 website to improve the search rankings. I found a guide by Ivo Petkov however there were a few problems with his instructions. I followed his advice: sudo yum install … Continue reading
Posted in Linux, Security, Shell Scripting, System Administration, System Engineering, Uncategorized, Web Security
Tagged Amazon, AWS, EC2, EFF, HTTPS, letsencrypt, ssllabs, Web
Leave a comment
Building a Teensy 3.2 w/SD and 8 position DIP switch + Reset button
I’ve always wanted to build a versatile Teensy-based device for use in physical security penetration testing. I’ve seen Irongeek’s device, and Mike Czumak’s dongle, but neither of these had an SD card, and only had a 4 of 5 position … Continue reading
Scanning for confidential information on external web servers
One of my clients wanted us to scan their web servers for confidential information. This was going to be done both from the Internet, and from an internal intranet location (between cooperative but separate organizations). In particular they were concerned … Continue reading
Setting up Kali 1.1.0 on the new Raspberry Pi 2
My new Raspberry Pi 2 arrived, and I wanted to install Kali on it. I was preparing to follow the steps of Richard Brain, but before I started, the folks at Kali tweeted that there was now a download available. … Continue reading
Posted in Hacking, Linux, Security, System Administration
Tagged kali, raspberry Pi 2, ssh
1 Comment
Extracting shell commands from Kali’s application menu
I use the Linux command line whenever I can. Using the mouse to execute something when my fingers are on the keyboard irritates me. I was using the Kali linux distribution to do some pentesting. And I was getting frustrated. … Continue reading
CBC Padding Oracle Attacks Simplified – Key concepts and pitfalls
There are hundreds of web sites that describe the Padding Oracle attack, but many people find the concept confusing. I am going to try to explain everything you need to know. I am not going to write a bunch of equations … Continue reading
Posted in Hacking, Security
Tagged AES, CBC, Cipher Block Chaining, Cryptography, Encryption, padding, Padding Oracle Attack, Security
4 Comments