This tag is associated with 7 posts

Automatically decompiling virii

While looking for better and faster ways of analyzing virii to attack CNCs faster I ended up finding some new tools out in the world these days. You guys keep me on my toes with coming out with open source tech constantly! There is a free .Net compiler called JustDecompile recently release by Telerik(ok of … Continue reading

Mass Social Network Ease of Use Vulnerability: Pt 4 MySpace

Disclosure of usernames has long been considered a security vulnerability of equal importance as a password. Security experts recommend avoiding the use of admin and root as usernames, and we can even see that practice taken to heart with leaks like Gawker. Administrators and users especially consider the password the only part that of the … Continue reading

Detecting Steganography in JPG Images

If you read my article on using MITM attacks on Tor you might be wondering about practical purposes other than stealing passwords and personal information. The fact is that I have no interest whatsoever in targeting specific people. I do what I do for 2 reason, I find the synergy and flow of data sexy, … Continue reading

An Introduction to Steganography aka Stenography

What is Steganography Steganography is the art and science of hiding that communication is happening. Classical steganography systems depend on keeping the encoding system secret, but modern steganography is detectable only if secret information is known, e.g. a secret key. Because of their invasive nature, steganography systems leave detectable traces within a medium’s characteristics. This … Continue reading

MITM Attack against Tor SSL for Deep Packet Analysis

Tor is wonderful tool to ensure your privacy on the Internet. Tor prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor achieves this by bouncing through other Tor users via an anonymous and encrypted interchange. In short a series … Continue reading

Digital image steganography of encrypted text

Paranoia allows a user to securely transfer a text message by hiding it in a digital image file. 128 bit AES encryption is used to protect the content of the text message even if its presence were to be detected. Currently, no methods are known for breaking this kind of encryption within a reasonable period … Continue reading

Detect nude images and pornography without using OpenCV

OpenCV (Open Source Computer Vision) is a library of programming functions for processing video and images. The library has more than 2500 optimized algorithms. Usage ranges from interactive art, to mines inspection, stitching maps on the web or through advanced robotics. Below is some code copied from that OpenCV group that gives a mask for … Continue reading