Reading time:
~5 min
Posted
by frans
on
16 October 2017
This post assumes a passing familiarity with what a Distinguishing Attack on a cryptographic hash is, as well as the...
Reading time:
~3 min
Posted
by Rogan Dawes
on
06 October 2017
Sometimes on an engagement, you’d like to construct a believable certificate chain, that you have the matching private keys for....
Reading time:
~1 min
Posted
by behrang
on
19 August 2013
We are publishing the research paper and tool for our BlackHat 2013 USA talk on the Z-Wave proprietary wireless protocol...
Reading time:
~4 min
Posted
by behrang
on
22 June 2012
We had published a network protocol analysis challenge for free entry to our BlackHat 2012 Vegas training courses and received...
Reading time:
~2 min
Posted
by behrang
on
14 June 2012
This year marks a special anniversary for us at SensePost in that we’ve been training at BlackHat for over a...
Reading time:
~7 min
Posted
by saurabh
on
24 October 2011
This blog post steps through how to convert encrypted iPhone application bundles into plaintext application bundles that are easier to...
Reading time:
~1 min
Posted
by behrang
on
05 March 2010
BackupExec agent is often among common services found on the internal pen tests. The agent software stores an encrypted “logon...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
05 June 2009
The first one from hacker news, aptly titled “How I Hacked Hacker News (with arc security advisory)” and the 2nd,...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
28 April 2009
Chris Eng over [at the Veracode blog] documents how he approached, and decoded the info behind the [2009 Verizon Data...