Lately, several backdoors in cryptographic constructions, protocols and implementations have been surfacing in the wild: Dual-EC in RSA's B-Safe product, a modified Dual-EC in Juniper's operating system ScreenOS and a non-prime modulus in the open-source tool socat. Many papers have already discussed the fragility of cryptographic constructions not using nothing-up-my-sleeve numbers, as well as how such numbers can be safely picked. However, the question of how to introduce a backdoor in an already secure, safe and easy to audit implementation has so far rarely been researched (in the public). We present two ways of building a Nobody-But-Us (NOBUS) Diffie-Hellman backdoor: a composite modulus with a hidden subgroup (CMHS) and a composite modulus with a smooth order (CMSO). We then explain how we were able to subtly implement and exploit it in a local copy of an open source library using the TLS protocol.
SSL 3 is broken. RC4 is broken. Diffie-Hellman is broken. SHA-1 is all but broken. And millions of servers on the Internet are still supporting these protocols and algorithms. If the Internet hasn't broken down already, it will any time now.
Or will it?
This presentation aims to give the audience a more nuanced view. In non-technical terms, it will explain not only the details of some major vulnerabilities and how they could be exploited, but also look at how likely such exploits are in practice.
It will explicitly not give the audience an excuse not to deploy the best cryptographic protocols available, but it will help them understand what to consider when a choice has to be made between supporting weaker protocols and making services unavailable to people with older devices. It will also help understand that crypto, despite its apparent flaws, rarely ever is the weakest link in a secure system.
Have you ever wonder if the access to your cloud kingdom is secure? Have you ever thought how cyber criminals are hunting for your secrets? How can you be sure that your secret is not “mistakenly” available to the public? In my presentation I’m going to present you hackish methods used by cyber criminals to find access keys in the public Internet. How can Shannon Entropy help you? During the presentation, I’ll release my own scaners to search AWS and Azure space and in the end I will demonstrate my own tool to analyze big amounts of data in search for sensitive data. Lots of demos, technical stuff and educating moral for unaware specialists in the end. It’s gonna be fun!
Additional materials: https://www.securing.biz/en/seven-step-guide-to-securing-your-aws-kingdom/index.html
SSL 3 is broken. RC4 is broken. Diffie-Hellman is broken. SHA-1 is all but broken. And millions of servers on the Internet are still supporting these protocols and algorithms. If the Internet hasn't broken down already, it will any time now.
Or will it?
This presentation aims to give the audience a more nuanced view. In non-technical terms, it will explain not only the details of some major vulnerabilities and how they could be exploited, but also look at how likely such exploits are in practice.
It will explicitly not give the audience an excuse not to deploy the best cryptographic protocols available, but it will help them understand what to consider when a choice has to be made between supporting weaker protocols and making services unavailable to people with older devices. It will also help understand that crypto, despite its apparent flaws, rarely ever is the weakest link in a secure system.
Have you ever wonder if the access to your cloud kingdom is secure? Have you ever thought how cyber criminals are hunting for your secrets? How can you be sure that your secret is not “mistakenly” available to the public? In my presentation I’m going to present you hackish methods used by cyber criminals to find access keys in the public Internet. How can Shannon Entropy help you? During the presentation, I’ll release my own scaners to search AWS and Azure space and in the end I will demonstrate my own tool to analyze big amounts of data in search for sensitive data. Lots of demos, technical stuff and educating moral for unaware specialists in the end. It’s gonna be fun!
Additional materials: https://www.securing.biz/en/seven-step-guide-to-securing-your-aws-kingdom/index.html
Have you ever wonder if the access to your cloud kingdom is secure? Have you ever thought how cyber criminals are hunting for your secrets? How can you be sure that your secret is not “mistakenly” available to the public? In my presentation I’m going to present you hackish methods used by cyber criminals to find access keys in the public Internet. How can Shannon Entropy help you? During the presentation, I’ll release my own scaners to search AWS and Azure space and in the end I will demonstrate my own tool to analyze big amounts of data in search for sensitive data. Lots of demos, technical stuff and educating moral for unaware specialists in the end. It’s gonna be fun!
Which tradeoffs have to be solved while designing a PoS consensus protocol: a talk of Andrey Sobol on the Pandora Boxchain meetup in Berlin (https://www.meetup.com/pandoraboxchain-berlin-meetup/events/253033999/)
Cloud security, sounds like a myth does it not? Many organizations still cling to the belief that cloud services can not be used in a secure infrastructure in this session I'll cover emerging and available technologies which can help abate some of these concerns.
Threat models
- What's a side channel attack?
- What's a co-residency attack?
Amazon
- Available amazon AWS compliance documentation and how it is relevant to secure infrastructure
- Available amazon AWS services such as KSM and how they may be used to secure your deployments, VPC and netowrk isolation, IAM.
Openstack
- What's openstack bandit and why should I care?
- What options do I have in my openstack deployment to secure my infrastructure and how are they relevant to my needs?
Federated cloud infrastructure
- What is it?
- Why you need one
- Ensuring secure "chain of custody" through to deployment
Docker / LXC
- What is container virtualization and how does it differ to regular virtualization?
- How does this affect my attack surface?
- Should I have this in production ?
Security CI
- How can security be part of your CI process?
Emerging technologies
- pki.oio
- vaultproject.io
- haka
Telemetry processing
- Why your logs are your most important data source
- Handling thousands, millions or more lines per second
- Using the right components
Building the castle
- Thoughts in putting this all together to produce infrastructure hardened from developer though to production.
BSides CHARM 2015 Talk "InfoSec Hunters and Gatherers" - Learn how to go beyond automated tools to truly be the "Hunter" and find both bad guys and vulnerabilities.
Guest Brooke Butler with CRU at UC Berkeley
Ravi Zacharias said, “We have to find the back door to peoples’ hearts because the front door is heavily guarded.” Arguing on the basis of facts, reason and rationality can often lead to mere debate and sharp exchanges of opinions rather than any significant discussion and dialogue. Using cultural “tools” such as films, art, stories and music, we can more readily access the deeper thoughts and feelings of the people who we are trying to reach with the Gospel. Two interesting outreaches we have developed are; a Renaissance dinner that employs the food, story and art of Rembrandt; and Story of the Soul that employs a combination of short presentations and discussion in small groups.
Have you ever wonder if the access to your cloud kingdom is secure? Have you ever thought how cyber criminals are hunting for your secrets? How can you be sure that your secret is not “mistakenly” available to the public? In my presentation I’m going to present you hackish methods used by cyber criminals to find access keys in the public Internet. How can Shannon Entropy help you? During the presentation, I’ll release my own scaners to search AWS and Azure space and in the end I will demonstrate my own tool to analyze big amounts of data in search for sensitive data. Lots of demos, technical stuff and educating moral for unaware specialists in the end. It’s gonna be fun!
Which tradeoffs have to be solved while designing a PoS consensus protocol: a talk of Andrey Sobol on the Pandora Boxchain meetup in Berlin (https://www.meetup.com/pandoraboxchain-berlin-meetup/events/253033999/)
Cloud security, sounds like a myth does it not? Many organizations still cling to the belief that cloud services can not be used in a secure infrastructure in this session I'll cover emerging and available technologies which can help abate some of these concerns.
Threat models
- What's a side channel attack?
- What's a co-residency attack?
Amazon
- Available amazon AWS compliance documentation and how it is relevant to secure infrastructure
- Available amazon AWS services such as KSM and how they may be used to secure your deployments, VPC and netowrk isolation, IAM.
Openstack
- What's openstack bandit and why should I care?
- What options do I have in my openstack deployment to secure my infrastructure and how are they relevant to my needs?
Federated cloud infrastructure
- What is it?
- Why you need one
- Ensuring secure "chain of custody" through to deployment
Docker / LXC
- What is container virtualization and how does it differ to regular virtualization?
- How does this affect my attack surface?
- Should I have this in production ?
Security CI
- How can security be part of your CI process?
Emerging technologies
- pki.oio
- vaultproject.io
- haka
Telemetry processing
- Why your logs are your most important data source
- Handling thousands, millions or more lines per second
- Using the right components
Building the castle
- Thoughts in putting this all together to produce infrastructure hardened from developer though to production.
BSides CHARM 2015 Talk "InfoSec Hunters and Gatherers" - Learn how to go beyond automated tools to truly be the "Hunter" and find both bad guys and vulnerabilities.
Guest Brooke Butler with CRU at UC Berkeley
Ravi Zacharias said, “We have to find the back door to peoples’ hearts because the front door is heavily guarded.” Arguing on the basis of facts, reason and rationality can often lead to mere debate and sharp exchanges of opinions rather than any significant discussion and dialogue. Using cultural “tools” such as films, art, stories and music, we can more readily access the deeper thoughts and feelings of the people who we are trying to reach with the Gospel. Two interesting outreaches we have developed are; a Renaissance dinner that employs the food, story and art of Rembrandt; and Story of the Soul that employs a combination of short presentations and discussion in small groups.
APNIC Product Manager - Registry gives a presentation on why it is important to secure Internet routing at Y4IT 2021, held online from 12 to 14 October 2021.
What are Hash function and why is it used is security.
How to store passwords.
What are symmetric and asymmetric encryption function.
What is PGP program and how to use to encrypt and sign documents.
За последние годы разными специалистами и компаниями (от Google до Сноудена) был проделан колоссальный объём работы с целью популяризации протокола SSL, а позже и TLS. Дорабатывались протоколы и шифры, обнаруживались десятки уязвимостей, криптографические библиотеки форкались и проводили аудиты, правозащитные фонды выдавали сотни миллионов сертификатов "забесплатно". В конце концов, TLS явочным порядком, в обход стандарта, стал обязательным для HTTP/2-серверов. Так много сил было приложено, что просто-напросто уже невежливо всё это игнорировать.
Однако процесс внедрения TLS за это время, как это ни удивительно, не стал проще ни на йоту. Сисадмины, приступающие к развёртыванию TLS, вынуждены столкнуться с классификацией типов сертификатов, с множеством центров сертификации (которые непонятно, чем друг друга лучше) и с великим множеством дополнительных заголовков и "ручек", каждую из которых можно подёргать с непредсказуемым результатом. В результате даже крупные компании при внедрении TLS допускают ошибки той или иной степени серьёзности (включая, но не ограничиваясь масштабным даунтаймом клиентов GlobalSign), а небольшие стартапы предпочитают, вообще, обходить криптографию стороной.
За отведённые на доклад 45 минут мы постараемся дать описание каждой из пресловутых "ручек" и рекомендации по их [не]применению, а также дадим рекомендации по развёртыванию TLS на крупной инфраструктуре.
Frontera распределенный робот для обхода веба в больших объемах / Александр С...Ontico
В этом докладе я собираюсь поделиться нашим опытом обхода испанского интернета. Мы поставили перед собой задачу обойти около 600 тысяч веб-сайтов в зоне .es с целью сбора статистики об узлах и их размерах. Я расскажу об архитектуре робота, хранилища, проблемах, с которыми мы столкнулись при обходе, и их решении.
Наше решение доступно в форме open source фреймворка Frontera. Фреймворк позволяет построить распределенного робота для скачивания страниц из Интернета в больших объемах в реальном времени. Также он может быть использован для построения сфокусированных роботов для выкачивания подмножества заранее известных веб-сайтов.
Фреймворк предлагает: настраиваемое хранилище URL документов (RDBMS или Key Value), управление стратегиями обхода, абстракцию транспортного уровня, абстракцию модуля загрузки.
Доклад построен в увлекательной форме: описание проблемы, решение и проблемы, которые возникли в ходе разработки решения.
A chronicle of my attempt to create a real time web app using pure clojure at every layer of the stack, from the client to the styles to the web server
This is the slides accompanying the talk I gave at BSides Hannover 2015, discussing the reverse engineering and exploitation of numerous vulnerabilities in Icomera Moovmanage products along with the post exploitation of such, including the potential creation of a firmware rootkit
13 practical tips for writing secure golang applicationsKarthik Gaekwad
Writing secure applications in a new language is challenging. Here are some tips to help get you started for writing secure code in golang. Presented at Lascon 2015
Introduction to the stealth mode functionality an open source Host Intrusion Detection System called Samhain and analysis on how exactly it applies it in the operating system.
In this talk, we discuss white box cryptography, a technique used to protect cryptographic keys from a local attacker. In keeping with the theme of building and breaking security, we will discuss the challenges involved in building a white-box crypto system.
[CB19] I KNOW WHAT YOU DID LAST NIGHT : Pwning The State-Of-The-Art the IoT H...CODE BLUE
With the emergence of IoT, which stands for Internet of Things, our daily life is being convenient more than ever. IoT market today grow continuously. To manage a plethora of IoT devices at once, it is changing to the way to control all IoT devices easily and conveniently, rather than operating IoT devices independently. Since the IoT Hub can control the connected IoT devices, it is at high risk for serious damage such as malicious control by an attacker, privacy invasion, leakage of personal information in case of security breaches.
We will present the overall process of exploitation in IoT hub from acquiring root shells to analyzing the multiple IoT Hub firmware for showing how we derive the vulnerabilities. We made a data flow diagram(called as DFD) through the network packet analysis, firmware analysis, security threats we defined, and vulnerabilities. Subsequently, We will also discuss the vulnerabilities found in recently commercialized IoT Hub, and introduce the critical threats that could be derived from the vulnerabilities.
Finally we will show the live demonstration of the full-chain exploitation scenarios in smart home such as “opening door lock, sniffing password and Eavesdropping through the device's microphone control”. By doing so, we will contribute improvement of the security of IoT Network and smart home with the awareness of the threats of IoT Hub.
Our hope is that defenders and reverse engineers can make use of the project updates to validate their preparedness and techniques against highly targeted malware. As discussed in our presentation, detection of malicious code in runtime interpreted languages is error prone and difficult. Shortly after our initial presentation at INFILTRATE, Kaspersky created an AV signature that flagged as malicious many of the most popular GO language applications such as Docker, a Bitcoin wallet and the actual Golang installer in an attempt to flag EBOWLA binaries – oops.
We’ve updated the project to include a new loader for PowerShell. This ubiquitous Windows scripting language is widely used in offensive testing and by defenders for incident response. Now the incident responder will need to be proficient in PowerShell debugging to begin the task of decrypting targeted malware that could also end up being more PowerShell! Post-Ekoparty, the team is working on a traditional loader using C++ compiled code, so stay tuned and visit our EBOWLA GitHub page for future updates.
Our hope is that defenders and reverse engineers can make use of the project updates to validate their preparedness and techniques against highly targeted malware. As discussed in our presentation, detection of malicious code in runtime interpreted languages is error prone and difficult. Shortly after our initial presentation at INFILTRATE, Kaspersky created an AV signature that flagged as malicious many of the most popular GO language applications such as Docker, a Bitcoin wallet and the actual Golang installer in an attempt to flag EBOWLA binaries – oops.
We’ve updated the project to include a new loader for PowerShell. This ubiquitous Windows scripting language is widely used in offensive testing and by defenders for incident response. Now the incident responder will need to be proficient in PowerShell debugging to begin the task of decrypting targeted malware that could also end up being more PowerShell! Post-Ekoparty, the team is working on a traditional loader using C++ compiled code, so stay tuned and visit our EBOWLA GitHub page for future updates.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
2. TLS
pre-2007: Absence of TLS
2007: TLS only for login forms (Graham sniffs gmail
cookies live at Blackhat)
2009: Moxie releases SSLstrip at Blackhat
2010: HSTS introduced in Firefox
2013: Facebook is full-https
2014: preloaded-HSTS introduced in Chrome
3. TLS
pre-2007: Absence of TLS
2007: TLS only for login forms (Graham sniffs gmail
cookies live at Blackhat)
2009: Moxie releases SSLstrip at Blackhat
2010: HSTS introduced in Firefox
2013: Facebook is full-https
2014: preloaded-HSTS introduced in Chrome
4.
5. TLS
pre-2007: Absence of TLS
2007: TLS only for login forms (Graham sniffs gmail
cookies live at Blackhat)
2009: Moxie releases SSLstrip at Blackhat
2010: HSTS introduced in Firefox
2013: Facebook is full-https
2014: preloaded-HSTS introduced in Chrome
6. TLS
pre-2007: Absence of TLS
2007: TLS only for login forms (Graham sniffs gmail
cookies live at Blackhat)
2009: Moxie releases SSLstrip at Blackhat
2010: HSTS introduced in Firefox / Firesheep
2013: Facebook is full-https
2014: preloaded-HSTS introduced in Chrome
7.
8. TLS
pre-2007: Absence of TLS
2007: TLS only for login forms (Graham sniffs gmail
cookies live at Blackhat)
2009: Moxie releases SSLstrip at Blackhat
2010: HSTS introduced in Firefox / Firesheep
2013: Facebook is full-https / Snowden leaks
2014: preloaded-HSTS introduced in Chrome
9. TLS
pre-2007: Absence of TLS
2007: TLS only for login forms (Graham sniffs gmail
cookies live at Blackhat)
2009: Moxie releases SSLstrip at Blackhat
2010: HSTS introduced in Firefox / Firesheep
2013: Facebook is full-https / Snowden leaks
2010/2014: preloaded-HSTS introduced in Chrome
18. • hardcoded DHE parameters in Apache
• NSA believed to be able to compute discrete
logarithm in modulo 1024-bit integers
• too much work
Logjam
19. • hardcoded DHE parameters in Apache
• NSA believed to be able to compute discrete
logarithm in modulo 1024-bit integers
• too much work
Logjam
20. • hardcoded DHE parameters in Apache
• NSA believed to be able to compute discrete
logarithm in modulo 1024-bit integers
• too much work
Logjam
21. U.S. export rules
• weak “Export” Cipher Suites
• 512-bit primes for Diffie-Hellman
• 40-bit keys for DES
22. U.S. export rules
• weak “Export” Cipher Suites
• 512-bit primes for Diffie-Hellman
• 40-bit keys for DES
23. U.S. export rules
• weak “Export” Cipher Suites
• 512-bit primes for Diffie-Hellman
• 40-bit keys for DES
24.
25. LOTUS NOTES
• 64-bit crypto allowed…
• …if 24 bits of the key are encrypted to the NSA
• NSA’s RSA public key O=MiniTruth CN=Big Brother
26. LOTUS NOTES
• 64-bit crypto allowed…
• …if 24 bits of the key are encrypted to the NSA
• NSA’s RSA public key O=MiniTruth CN=Big Brother
27. LOTUS NOTES
• 64-bit crypto allowed…
• …if 24 bits of the key are encrypted to the NSA
• NSA’s RSA public key O=MiniTruth CN=Big Brother
28. Kleptography
• A kleptographic attack is an attack which uses
asymmetric cryptography to implement a
cryptographic backdoor.
• A secure kleptographic attack is undetectable as
long as the cryptosystem is a black-box.
• what about white-box? Reverse Engineering?
29. Kleptography
• A kleptographic attack is an attack which uses
asymmetric cryptography to implement a
cryptographic backdoor.
• A secure kleptographic attack is undetectable as
long as the cryptosystem is a black-box.
• what about white-box? Reverse Engineering?
30. Kleptography
• A kleptographic attack is an attack which uses
asymmetric cryptography to implement a
cryptographic backdoor.
• A secure kleptographic attack is undetectable as
long as the cryptosystem is a black-box.
• what about white-box? Reverse Engineering?
89. Detect and Protect
• Check for prime modulus
• Better: check for safe prime modulus
• Google Chrome -> deprecating DHE
• migrating to ECDHE
90. Detect and Protect
• Check for prime modulus
• Better: check for safe prime modulus
• Google Chrome -> deprecating DHE
• migrating to ECDHE
91. Detect and Protect
• Check for prime modulus
• Better: check for safe prime modulus
• Google Chrome deprecating DHE (-> ECDHE)
• migrating to ECDHE