Ten tings you did not know about wireshark.
Wireshark fits nicely in any toolbox of the network forensic analyst and ethical hacker. From hundreds of dissectors that decode the protocol and application fields, to the customization capability that enables you to find that one item of interest in a sea of packets, Wireshark gives you all the necessary insights into traffic. “Wireshark for Hackers” will be a two-part series (5 hacks each) where we will attempt to turn your crawl into a walk… and maybe even a little swagger. In Part I, ...
Read post
Brute Forcing TOTP Multi-Factor Authentication is Surprisingly Realistic
by Oscar BrolinBy default, Microsoft BitLocker protected OS drives can be accessed by sniffing the LPC bus, retrieving the volume master key when it’s returned by the TPM, and using the retrieved VMK to decrypt the protected drive. This post will look at extracting the clear-text key from a TPM chip by sniffing the LPC bus, either with a logic analyzer or a cheap FPGA board. This post demonstrates the attack against an HP laptop logic board using a TPM1.2 chip and a Surface Pro 3 using a ...
Read post
🛡 Safeguard
The story of safeguard The problem?We often forget to make unique passwords for every site. Hence use the same for each one. But often this poses a security issue as some of these sites make leak your passwords. Hence using a password manager can solve this problem for you as it will generate unique passwords, and all you have to remember is one password.Your data is stored in blockstack, so the entire app is actually like a UI. And if a better UI ever comes along, then you can change to that. ...
Read post