Read it and weep
http://hashcat.net/forum/thread-2301.html
Excerpt:
Everything is written 100% on GPU.
There is no copy overhead to the host, thus your CPU will stay cool at 0% and you can do whatever you want to do with it.
Current implementation is able to crack all the supported hashes:
RipeMD160
SHA512
Whirlpool
So far for the hashes (and thats what makes cracking TrueCrypt slow).
For the ciphers, I'm currently doing only AES and of course the XTS block-cipher.
Serpent and Twofish and there cascaded modes will be added next.
Here are some speeds from 2x hd6990:
PBKDF2-HMAC-RipeMD160 / AES: 223 kHash/s
PBKDF2-HMAC-SHA512 / AES: 95 kHash/s
PBKDF2-HMAC-Whirlpool / AES: 49 kHash/s *updated*
PBKDF2-HMAC-RipeMD160 boot-mode / AES: 451 kHash/s
These tests show oclHashcat-plus is new worlds fastest TrueCrypt cracker
While I was implementing the Whirlpool hash I found out how this hash can be optimized by over 50% in raw mode. However, some of these technique can also be used within an PBKDF2-HMAC construct.
PS: I'll explain the technique at my talk on passwordscon 2013 in Las Vegas.
Stay tuned for v0.15 release
Just in the case that you've been living under a rock, I wanted to let people know that EMET 4.0 Beta has been released at http://www.microsoft.com/en-us/download/details.aspx?id=38761
Here are some of the changes (from rapid7):
SSL certificate pinning - allows mitigation of "man-in-the-middle" attacks by detecting situations where the Root CA for an SSL certificate has changed from the "pinned" value configured in EMET. For example, you can configure EMET to say "There is only a single trusted root CA that should ever be issuing certificates for acme.com, and if I see a certificate for any FQDN ending in .acme.com from a different CA, report this as a potential man-in-the-middle attack. You can pin the CA for entire domains or for individual certificates. EMET 4.0 beta ships with pinned certificates for login.live.com and login.microsoftonline.com, but administrators can add their own.
Enhanced ROP mitigation. There is a never-ending arms race between OS and application developers on the one side and exploit developers on the other side. When a new mitigation technique is developed by Microsoft, clever exploit developers work hard to find ways to bypass the mitigation. In the case of ROP mitigations, EMET 3.5 included some basic ROP mitigations that blocked assembly language "return" calls to memory addresses corresponding to known lists of low-level memory management functions in certain DLLs. This rendered a common exploit technique ineffective. However, exploit developers responded with adjusted techniques to bypass EMET's ROP mitigations, such as returning into the memory management code a few bytes beyond the function prologue. I don't have enough time or space to do this fascinating topic justice, but you can read a good overview of ROP exploit techniques here.
I have a question I know this great community can answer: what is the best way to view SMS/phone log on an android phone without the owner/target knowing. I know there are many so called sms-spy programs out there but I have not used any so I ask for your help. I know this is invasion of privacy but I have exhausted all other alternatives. This is a family matter so it is very important to me. So the only ideas I came up with so far are to create an online account using the primary number and view the detail sms logs but I'm concerned the owner will receive an email to notify of the active account. I have also thought about these spy programs but I am still reading more about them. The phone is a galaxy s2 on cricket network. Thank you in advance.
Anyone been getting a new error when running java apps?
Want to know what that error with the yellow shield is?
Relax, its a legitimate warning from Java itself, Looks flaky, but its legit. The Java 7 11 update that was recently released as a response to the recent and ongoing exploitating of new critical and unknown vulnerabilities in Java, They decided to change the security settings from "medium, as they were in Java update 10, to "High" in the latest update 11, so now your going to get a warning every single time you run a Java app.
And thats all it is really.
Find out more here. https://service.parachat.com/knowledgebase/273/I-see-a-Do-you-want-to-ru...
Allright bby, feeling pretty good bout this one.
Ive been running Squid proxy cache for a long time, I know some of you are sick of hearing about it probably, but, I was considering doing inline AV for a while, and with the recent increased threat of phishing attacks via social networks to myself and my family, due to (media exposure and douchebags who like to drop my dox at random to get at me ) Well I finally got off my duff and installed c-icap server and SquidClamAV.
If any of you have a debian box and/or allready run a squid, this was sooo easy to do I would highly recommend you do so.
I actually used two tuts to get the job done, and I would recomment you check them out first if this is something that you are also interested in doing.
http://squidclamav.darold.net/installv6.html
http://jasminklipic.blogspot.com/2012/05/squid-clamav-debian-squeeze.html
and psst, if you need some native ACL for squid http://squidblacklist.org (I couldnt resist)
Apparently, its trivial to pull someones home address from comcasts website by playing with some stuff on their site from an actual comcast subscriber line. See the url below for more info. Not good.
http://www.reddit.com/r/netsec/comments/15gow9/comcast_physical_address_...
Allright, I suppose this a proper follow up to my previous posting about blacklists.
I decided that I wanted to share my work on blacklists with others, and what better way than to toss up a site. Will be featuring blacklists formatted for squids native acl so you can blacklist without having to use add ons. Also we have apps for automaticly updating from our blacklists into windows or linux hosts file for hosts file immunization.
Cloudflare is setup and Im just waiting for the vhost go to live, should be within the next 24 hours.
Figured I would start a blacklist dump thread, some of you might also be interested in perimeter security, and I think blacklisting is a useful strategy.
Here is a blacklist I personally painstakingly compiled for use with Squid proxy.
======================================
Porn - Malware - Drive By Exploit sites - Ads -
======================================
http://haxradio.com/downloads/squid-block.acl.tar.gz
Now heres a really special blacklist. (Ill be posting it soon, ive got to format it for general use)
======================================
US mil/government and other uber seecret unwanted hosts.
======================================
many of these hosts were taken from multiple publicly available lists, and dramatically expanded by probing nearby ranges, many uber seecret goobermant hosts you will not find anywhere else are contained in this blacklist.
Dear VoIP enthusiasts and Community members,
We're writing in order to invite you all to participate in a research open-source project, we've been working in since the beginning of this year. This project is sponsored by the Science and Technology Government Department from Córdoba province, Argentina.
The link to the project: http://artemisa.sourceforge.net/ . Our work is related to an open source honeypot, named Artemisa, for VoIP networks deploying the SIP protocol. We'll really appreciate the participation of anyone that has interest to play the attacker's role, if possible concentrating in the VoIP service we are exposing. So as to let us capture relevant information related with real attacks. As a result, we'll be able to do an analysis of the efficiency of the platform.
Furthermore, a statistical analysis, of all the received attacks, will be performed.
Target sip extensions:
1) sip:[email protected] or sip:[email protected] (Public Free ext)
Written in USA Today:
Hack of tech journalist reveals flaws in cloud security
http://www.usatoday.com/money/industries/technology/story/2012-08-09/pas...
Why should cost determine security?