Author name: agent0x0

The Honey Stick Project: Tracking Mobile Storage Devices

Here is a pretty cool project that I stumbled upon over at Security Catalyst. The concept is to have a “Honey Pot for mobile storage devices” but each mobile storage device (USB key, iPod, etc…) in reality becomes it’s own “Honey Stick” where the researcher can safely track how many people are plugging these devices […]

The Honey Stick Project: Tracking Mobile Storage Devices Read More »

GNUCITIZEN on PaulDotCom

Larry and Paul from the PaulDotCom Security Weekly Podcast have a very good two part series interviewing pdp and Adrian from GNUCITIZEN. Lots of good information about embedded device hacking and all the cool things GNUCITIZEN is working on. Check out the mp3’s of the Podcast below….better yet…subscribe to the PaulDotCom Security Weekly Podcast! These

GNUCITIZEN on PaulDotCom Read More »

Online Google Hacking, Ethical Penetration Testing Tool

GNUCITIZEN has released a tool similar to the fat client Goolag Scanner that the cDc released a few weeks ago called GHDB. What makes the GHDB different is that it is browser based and uses JavaScript techniques to scrape information from Johnny Long’s Google Hacking Database without the need for hosted server side scripts. Add

Online Google Hacking, Ethical Penetration Testing Tool Read More »

Cold Boot Attacks on Encryption Keys- Whats the risk?

I am sure everyone has heard about and watched the YouTube video of the Princeton researchers that conduct cold boot attacks on encrypted hard disks. If you haven’t, I highly suggest you do. As everyone agrees…this is a very significant vulnerability and every organization that uses software to encrypt hard disks should look at ways

Cold Boot Attacks on Encryption Keys- Whats the risk? Read More »

802.11 Attacks Whitepaper

Foundstone always puts together great research and releases great tools. The other day Foundstone released a whitepaper describing all of the new and old 802.11 (Wireless) attacks. The paper gives some really good information about AP Impersonation, Rogue Access Points, Implementation Attacks (WEP, Dynamic WEP, WPA/WPA-2 cracking, including the Cafe Latte attack). The paper even

802.11 Attacks Whitepaper Read More »