Friday already. I have to remember to go to the butcher tomorrow morning to pick up my brisket….mmmm…..brisket. On another note, I’ve noticed a decrease in posting on my RSS feeds today. I suspect that this may be due to everyone getting ready for Interop in Vegas next week.
Here’s the list:
pwdump6 1.5.0 as well as fgdump 1.5.0 Released for Download – New versions of some great tools.
A while ago some updates of pwdump and fgdump were released, namely pwdump6 1.5.0 as well as fgdump 1.5.0.
Version 1.5.0 of both programs takes advantage of some changes which makes them less likely to be detected by antivirus, at least as of today. This will be particularly helpful to those of you dealing with recent, more aggressive AV solutions. The README file for pwdump6 has also been updated to give some examples, as it seems some folks were having a hard time figuring out how to get started with it.
Does Using “Certified” Software Products Improve Compliance? – What does “Certified” really mean anyway?
You see software vendors touting that their products have been certified and that they will help companies meet “compliance,” but I have found very little research into what this really means, or if it means anything at all.
Estonian DDoS Attacks – A summary to date – Good analysis of the issues that Estonia was facing.
Largest attacks we measured: 10 attacks measured at 90 Mbps, lasting upwards of 10 hours. All in all, someone is very, very deliberate in putting the hurt on Estonia, and this kind of thing is only going to get more severe in the coming years.
Gone in 120 seconds: cracking Wi-Fi security – Does it scare you? It should.
When WEP was compromised in 2001, the attack needed more than five million packets to succeed. During the summer of 2004, a hacker named KoreK published a new WEP attack (called chopper) that reduced by an order of magnitude the number of packets requested, letting people crack keys with hundreds of thousands of packets, instead of millions.
Last month, three researchers, Erik Tews, Andrei Pychkine and Ralf-Philipp Weinmann developed a faster attack (based on a cryptanalysis of RC4 by Andreas Klein), that works with ARP packets and just needs 85,000 packets to crack the key with a 95 per cent probablity. This means getting the key in less than two minutes.