background preloader

Security

Facebook Twitter

Signal >> Specifications >> The Double Ratchet Algorithm. The Double Ratchet algorithm is used by two parties to exchange encrypted messages based on a shared secret key.

Signal >> Specifications >> The Double Ratchet Algorithm

Typically the parties will use some key agreement protocol (such as X3DH [1]) to agree on the shared secret key. Following this, the parties will use the Double Ratchet to send and receive encrypted messages. The parties derive new keys for every Double Ratchet message so that earlier keys cannot be calculated from later ones. The parties also send Diffie-Hellman public values attached to their messages. The results of Diffie-Hellman calculations are mixed into the derived keys so that later keys cannot be calculated from earlier ones. Signal >> Specifications >> The Sesame Algorithm: Session Management for Asynchronous Message Encryption.

This document describes the Sesame algorithm for managing message encryption sessions in an asynchronous and multi-device setting.

Signal >> Specifications >> The Sesame Algorithm: Session Management for Asynchronous Message Encryption

Sesame was designed to manage Double Ratchet sessions created with X3DH key agreement [1], [2]. However, Sesame is a generic algorithm that works with any session-based message encryption algorithm that meets certain conditions. 2.1. Signal >> Specifications >> The XEdDSA and VXEdDSA Signature Schemes. This document describes how to create and verify EdDSA-compatible signatures using public key and private key formats initially defined for the X25519 and X448 elliptic curve Diffie-Hellman functions ([1]–[4]).

Signal >> Specifications >> The XEdDSA and VXEdDSA Signature Schemes

We refer to this as the "XEdDSA" signature scheme (or "XEd25519" or "XEd448" for specific curves). XEdDSA enables use of a single key pair format for both elliptic curve Diffie-Hellman and signatures. In some situations it enables using the same key pair for both algorithms. This document also decribes "VXEdDSA" which extends XEdDSA to make it a verifiable random function, or VRF (as defined in [5] and [6]). Successful verification of a VXEdDSA signature returns a VRF output which is guaranteed to be unique for the message and public key. Journal-Archiv - MIS - Magdeburger Institut für Sicherheitsforschung. Using Gathering Information Tools Through TOR Network. Previous days I have been playing with nmap and other tools to gather information, through tor network.

Using Gathering Information Tools Through TOR Network

I wanted to share my experience with it, and the configuration that I am currently using. I hope you can find here some tips or ideas useful for you. Inside a low budget consumer hardware espionage implant. Programming Assignment 1: Bufferbloat. Hack Naked Show Notes - Paul's Security Weekly. Secure Digital Life - Paul's Security Weekly. Tradecraft Security Weekly - Paul's Security Weekly. Episode #12 - Automating Screenshots to Quickly Assess Many WebApps.

Tradecraft Security Weekly - Paul's Security Weekly

Design thinking to increase information security and data privacy. Digital security and data privacy best practices are essential for organizations of all sizes and kinds.

Design thinking to increase information security and data privacy

Plenty has been written about threats, DDoS (distributed denial of service) attacks, legal battles, ransomware, and executive orders that impact this landscape. I’m interested in how we put threat awareness into practical and collaborative action, and how to recruit coworkers, bosses, employees and family to work with you on reducing threats, while protecting privacy and increasing security. How can leaders prioritize and manage the additional responsibility of security and privacy while running a growing business or nonprofit? We find clues by looking to the history and success of design thinking. Design thinking is now considered an essential business capability because it forces organizations to re-imagine their value propositions by applying a customer centric perspective. Vulnerability analysis, Security Papers, Exploit Tutorials. Space_20807681. 2.

space_20807681

Act normal. Space_15204361. 2.

space_15204361

Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour. 3. Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used. Space_15204355. [User #14587667]: Merlin 4.2 - pcap analyzerI placed a copy of Merlin 4.2 on the TestRange share (\\10.9.8.21\Share\Software\Merlin 4.2).

space_15204355

This version of Merlin is suppose to ingest pcap data. I haven't actually tried it yet myself... Space_3276804. 2.

space_3276804

Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour. 3. Remove traces of your submission. Space_1736706. Web Security Fundamentals - Free Video Course. Internal Layout D-Link DIR-825. This article describes the internal layout and configuration of the D-Link DIR-825. This particular hardware has two physical network interfaces, eth0 and eth1, whereas most emebedded devices have only one: eth0. It also has two two wireless network interfaces using the IEEE 802.11 protocol, represented by wlan0 and wlan1. Additional information on the rtl8366s switch. Switch 1: rtl8366s(RTL8366S), ports: 6 (cpu @ 5), vlans: 16 (4096 starting with 10.03.1-rc4) The default config provided looks something like below:

IBM developerWorks : developerWorks Security Open Badges. The Schoolhouse Archives. Explain like I’m 5: Kerberos – roguelynn. Explain like I’m 5 years old: Kerberos – what is Kerberos, and why should I care? While this topic probably can not be explained to a 5 year-old and be understood, this is my attempt at defragmenting documentation with some visual aids and digestible language. In a nutshell. Big List of Free CPE Resources for CISSPs. Podcasts fall under the “self-study” category of CPE requirements. One hour of study (listening to the podcast) is considered one CPE.

We’d recommend keeping a document recording when you listened to each podcast episode, it’s length and potentially even a short (approx 25 word) summary. Like any form of media, the actual content of a podcast can vary from lightly entertaining to incredibly educational and sometimes both at the same time. Our general recommendation is to take your continuing education seriously and seek out the podcasts that you find are best at expanding your knowledge. The Inside Out Security Show Discussion of the security topics of the day and how they fit into the larger IT ecosystem.

The SEORG Book List. Free online cybersecurity courses. Education/Free Training. The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security. Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!

If you are interested in setting up a training event through OWASP, submit your request here, we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. Click here for more information. Open SecurityTraining. Category:OWASP Download. The OWASP Download category should be used to mark any page that has a significant download available. The download should be clearly marked and described near the top of the page. Our old download center is located at SourceForge. Many of our documents and tools are still available there. Important Note Many OWASP projects have not included the OWASP Download tag in their pages, so they are not listed here.

How to add a new OWASP Download article You can follow the instructions to make a new OWASP Download article. External Resources. Open Source & Open Access. 6.858 Fall 2014 Lectures. Upload Nickolai Zeldovich Loading... Working... Welcome. Degreed. Gray Hat Hacking, 3rd Edition. PeerBlock – Peerblock Site. Hack This Site!