background preloader


Facebook Twitter

IT Security. Introduction to Strong Cryptography. One thing that amazes me is that the most developers are not familiar with strong cryptography.

Introduction to Strong Cryptography

In my career, I’ve seen all sort of mistakes that lead to leaked data, guessable passwords, unfortunate disclosures, and worse. The nice thing is, you don’t have to understand the ridiculously complex math behind the algorithms, you only have to know the rules for using them correctly. By the end of this series, my goal is to de-mystify the magic, so you can start using the primitives in your code right away!

But first, when I say Strong Cryptography, what the hell am I referring to anyway? Strong cryptography or cryptographically strong are general terms applied cryptographic systems or components that are considered highly resistant to cryptanalysis. One thing I’ve seen repeatedly done is that developer ‘invents’ a cryptography scheme for a particular purpose. Finally, I just wanted to mention this is actually a very personal subject that I have a long history with. -Jonathan on cryptography. Java Examples & Code Snippets - crypto. Encrypt/Decrypt object with DES This is an example of how to encrypt and decrypt an object with DES.

Java Examples & Code Snippets - crypto

DES in computing refers to the Data Encryption Standard and is supported by Java. To encrypt and decrypt an object ... Encrypt/Decrypt string with DES In this example we shall show you how to encrypt and decrypt a String with DES. Acunetix Kullanımı ve Acunetix ile XSS saldırısı - Eyüp ÇELİK // Bilgi Teknolojileri Güvenlik Uzmanı. Web uygulamalarında, güvenlik açıklarının çok olması sebebi ile bilinen tüm güvenlik açıklarını bir web sayfası üzerinde manüel olarak test etmemiz neredeyse imkânsız denilebilecek bir zaman gerektirmektedir.

Gün geçtikçe yeni güvenlik açıkları keşfedilmektedir. Hazırlamış olduğumuz web uygulamasının güvenliği, web uygulamasının çalışmasından çok daha önemlidir. Bir web sitesinin hâlihazırda çalışır halde olması değil, güvenli bir şekilde çalışıyor olması önemlidir. 2008’den bu yana hackerlar saldırılarını sistem ve network hackingden, web hackinge doğru değiştirdiler. Bunun en büyük nedeni, web uygulamalarına yapılan saldırıların daha kolay ve daha çok getirisi olmasıdır. Bu makalemizde Acunetix Security Scanner kullanarak, web uygulamaları üzerinde bulunan güvenlik zafiyetlerinin nasıl taranacağını inceleyeceğiz. Başlat\Tüm Programlar\Acunetix Web Vulnerability Scanner 7\Acunetix WVS 7 yolundan Acunetix’i çalıştırıyoruz. Resim-01. Certified Ethical Hacker. SecLists.Org Security Mailing List Archive.

SSL MITM Proxy. Description mitm-proxy is an Java-based SSL proxy that acts as a "man in the middle".


In other words, proxied HTTPS requests are terminated by the proxy and resent to the remote webserver. The server certificates presented to the client (i.e. a web browser) are dynamically generated/signed by the proxy and contain most of the same fields as the original webserver certificate. The subject DN, serial number, validity dates, and extensions are preserved. However, the issuer DN is now set to the name of the proxy's self-signed certificate and the public/private keys of the proxy are used in creating the forged certificate. Documents Download NOTE: this tool can NOT be used for any commercial purposes, as is, because it makes use of an educational/research version of the IAIK JCE library.

Version 1.0 (April 12th, 2007) Usage The mitm-proxy requires a Java runtime (1.5 or later) and has been tested on various windows and linux platforms. Notes on the options: Credits. SecLists.Org Security Mailing List Archive. Security Aegis. Main Page. Complexity is the enemy of Security. Hackvertor. Exploits Database by Offensive Security.