background preloader

HTTB Direct Distribution (V2)

Facebook Twitter

CloudCracker uses custom hardware to crack any VPN or Wi-Fi MS-CHAPv2 based password. (LiveHacking.com) — Moxie Marlinspike and David Hulton recently made a presentation at Defcon 20 on cracking MS-CHAPv2; now they have now integrated the techniques presented into the CloudCracker service.

CloudCracker uses custom hardware to crack any VPN or Wi-Fi MS-CHAPv2 based password

Source: MS-CHAP2 is an old authentication protocol which was first introduced by Microsoft with NT4.0 SP4 and Windows 98. Today, nearly 15 years later, the protocol is still widely used for PPTP VPNs, as well as in WPA2 Enterprise environments. Since it was introduced the protocol has been analysed many times and various weaknesses have been found. These weaknesses severely reduce the complexity of brute-force attacks and made them realistic with modern hardware. David Hulton’s company, PicoComputing, which specializes in building FPGA hardware for cryptography applications, has built a box which can crack MS-CHAP2 in at most 24 hours and often in just half that amount of time. The power and ease of the cracking process now means that: LinkedIn: Breach Cost Up to $1M, Says $2-3 Million in Security Upgrades Coming. In June, a breach disclosed by business social networking site LinkedIn resulted in a hashed password list containing some 6.5 million user passwords, forcing the company to urgently examine its infrastructure and investigate the incident that exposed some of its users.

LinkedIn: Breach Cost Up to $1M, Says $2-3 Million in Security Upgrades Coming

The company, which today announced solid financial results for Q2 2012 with record revenues of $228.2 million, shared details on some of the costs associated with investigating and addressing the breach, along with investments the company plans to make in order to further bolster security. "In the second quarter, I would say there was roughly $500,000 - $1,000,00 related primarily to forensics work and other elements of that," LinkedIn CEO Jeff Weiner said on a conference call discussing the company’s second quarter results. Weiner also reinforced previous statements from the company that security measures have been improved following the breach. Related Reading: LinkedIn Breach: How a 6.5M Hole Could Sink a 160M Ship. Wozniak: Cloud Could Create "Horrendous" Problems CIO.

Network World - Apple co-founder Steve Wozniak says he's worried about the continued adoption of cloud computing, which he contends does not give users enough control of their data.

Wozniak: Cloud Could Create "Horrendous" Problems CIO

RELATED: Is cloud really ready for prime time? MORE APPLE: What the iPhone 5 may very well look like "I really worry about everything going to the cloud," Wozniak was quoted as saying this weekend, according to news service AFP. "I think it's going to be horrendous. Image is not always everything in e-discovery: When is imaging hard drives worth the added expense? — Information Intersection. Pastebin.com - #1 paste tool since 2002!

An Exploit a Day... – 2012 08 06 COMPUTER FORENSICS EXAMINER Loudoun County Government Leesburg VA – Computer Jobs. Magazine homme GQ, mode, culture, beauté, lifestyle, Magazine homme GQ. InternetNews - Software, Storage, Security, Server, Networking News for IT Managers. Hacking the Cloud « Kynosarges Weblog. As cracking passwords and encryption by technical means is getting harder, the employees in charge of security become the weakest links in the chain.

Hacking the Cloud « Kynosarges Weblog

Social engineering hacks use a combination of publicly available data … See on kynosarges.wordpress.com. COMPUTER SYSTEM: Computer Hacking. In the 1960s, hackers were perceived as skilled computer wizards who curiosity would lead to technological advancement.

COMPUTER SYSTEM: Computer Hacking

At that time the term ‘hacker’ was used to describe an individual working with computers who was … See on compusystem-tech.blogspot.fr. Apple’s Support Department Blamed for Journalist’s Hacking … ICS Info Sharing Is Like Clearing Email – Digital Bond SCADA … Hackers ring alarm bells with call scams – Yorkshire Post. Yorkshire PostHackers ring alarm bells with call scamsYorkshire PostA SPATE of phone-hacking scams from computer hackers have been launched in West Yorkshire.

Hackers ring alarm bells with call scams – Yorkshire Post

See on www.yorkshirepost.co.uk. Car-hacking: Bluetooth and other security issues – Computerworld. Yahoo hacking reveals 10 most common passwords – Times of India. Hindustan TimesYahoo hacking reveals 10 most common passwordsTimes of IndiaLast month, a hacking collective posted account information belonging to thousands of Yahoo users on a public website in what they described as ‘a wake-up call’.

Yahoo hacking reveals 10 most common passwords – Times of India

See on timesofindia.indiatimes.com.