hackinit.blogspot.com
Hack in it . com: September 2008
http://hackinit.blogspot.com/2008_09_01_archive.html
Hack in it . com. Just Rock n Roll. Tuesday, September 30, 2008. Reverse path forwarding (RPF). Reverse path forwarding (RPF). Is a technique used in modern routers. For the purposes of ensuring loop-free forwarding of multicast packets in multicast. And to help prevent IP address spoofing. Multicast RPF, typically denoted simply as RPF, is used in conjunction with multicast routing protocols such as MSDP. Where packets will be forwarded in both directions until their IP TTLs. URPF as defined in RFC 3704.
hackinit.blogspot.com
Hack in it . com: Cryptographic hash function
http://hackinit.blogspot.com/2008/09/cryptographic-hash-function.html
Hack in it . com. Just Rock n Roll. Tuesday, September 30, 2008. Is a transformation that takes an input (or 'message') and returns a fixed-size string, which is called the hash value. Sometimes termed a message digest. The ideal hash function has three main properties - it is extremely easy to calculate a hash for any given data, it is extremely difficult or almost impossible in a practical sense. Checks, digital signatures. And various information security. And be the subject of a FIPS. Methods to make...
binaryunit.blogspot.com
The Unbearable Lightness of Bit: January 2008
http://binaryunit.blogspot.com/2008_01_01_archive.html
A little script to backup an entire hard drive from bash:. License: do what you want but cite my blog ;). Http:/ binaryunit.blogspot.com. SuperSalva 1.0 by Eugenio Rustico * *. Backup utility for ALL types of partitions. Easy disk/partition image *even of unknown filesystems*. On the fly compression: no need for temporary files. May be more speedy. Reads and compress even zero-zones. Support for decompressor without zcat equivalent. Support for creating (better if bootable) iso images. Trap for CTRL C.
hackinit.blogspot.com
Hack in it . com: SHA
http://hackinit.blogspot.com/2008/09/sha.html
Hack in it . com. Just Rock n Roll. Tuesday, September 30, 2008. The SHA hash functions. Are a set of cryptographic hash functions. Designed by the National Security Agency. NSA) and published by the NIST. As a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The five algorithms are denoted SHA-1. The latter four variants are sometimes collectively referred to as SHA-2. Comparison of SHA functions. SHA-256 (a SHA-2 variant) pseudocode. Denotes a left bit rotation by n.
blogbt.net
Digital Certificates - The Basics @ The Blog-Based Training
http://blogbt.net/index.php/2015/02/digital-certificates-part
Networks Virtualisation Datacentre : Blog-Based Training. Skip to primary content. Skip to secondary content. Digital Certificates – Part I – The Basics. February 2, 2015. In the digital world, IT security is all about exchanging information securely while also considering –. 8211; it’s a characteristic of secure systems to ensure that exchanged information is and stays confidential between sender and intended recipients only. Confidentiality is achieved through. We also guarantee non-repudiation. Encryp...
hakhub.blogspot.com
HakHub - News and Security: June 2011
http://hakhub.blogspot.com/2011_06_01_archive.html
Monday, June 27, 2011. Basic PHP Hash Cracker. Well, I've moved from Java to C untill I had got more interested in web security. which led me to stray away from C and learn some web dev. Right now I'm learning PHP, and in the process made this simple hash cracker. Below you can find the source and a very basic dictionary ( Approx. 19mb), for testing purposes. You can check out the working version hosted here. Links to this post. Tuesday, June 21, 2011. Http:/ www.mediafire.com/? Links to this post. Compi...
hakhub.blogspot.com
HakHub - News and Security: September 2011
http://hakhub.blogspot.com/2011_09_01_archive.html
Friday, September 9, 2011. Mounting a windows partition. This is a quite "how-to" on mounting a partition in GNU/Linux. First we need to identify which partition we want to mount. To do this we'll issue the fdisk. This lists the partitions, we're looking for a partition that has NTFS under the system column. Device Boot Start End Blocks Id System. Dev/sda1 * 1 192 1536000 27 Unknown. Dev/sda2 192 7734 60579043 7 HPFS/NTFS - -. Dev/sda3 29333 30402 8586240 17 Hidden HPFS/NTFS. Links to this post. Darknet ...
hakhub.blogspot.com
HakHub - News and Security: Python Script for Monitoring a site to see whether it's up or down
http://hakhub.blogspot.com/2011/10/python-script-for-monitoring-site-to.html
Thursday, October 27, 2011. Python Script for Monitoring a site to see whether it's up or down. Quick script I coded to save me time checking to see if a site was down, so I wrote this script to do it for me and to send me an alert using " libnotify-bin. If it happens to go down. Two methods are available, Ping and HTTP Requests. If I decide to add more methods, or add more sites to the HTTP request (to insure accuracy) than I'll post an update. until then I hope you find this useful! Packet Storm - News.
hakhub.blogspot.com
HakHub - News and Security: February 2011
http://hakhub.blogspot.com/2011_02_01_archive.html
Saturday, February 19, 2011. WebSecurify - Web Vulnerability Scanner. Websecurify uses several key technologies combined together to achieve the best possible result when performing automatic and manual tests. At the core of the platform sits a Web Browser. This allows Websecurify to gain a fine-grained control over the targeted web application and as such detect vulnerabilities that are difficult to find with other tools. The built-in vulnerability scanner and analyzation engine are capable of automatic...