Friday, March 07, 2003

Crypto For Newbies
Alright, I know you have read some crypto tutorial on the web before and you probably got confused at the first site of "cipher". In this tutorial I will not discribe very indepth of how the crypto works, but I will go over the very basics and introduce you to the different types of common encryptions and encoding schemes used on the net. I will go over how to encrypt and decrypt each of them so this tutorial should be a walk in the park. I've added a section on JTR, it is not very detailed.. but nether is the rest of this tutorial. It should be enough to get you going with JTR and crack a few password files. There are a few basic encoding methods used. I say encoding because they are just other ways of presenting data, unlike encryption they do not try to keep the message secret. Anyone can decode them without knowing the key, all they need to know is which program to use to decode it, or how to arrange the letters. Three very basic forms of encoding are uuencode (.uue) base64 (.b64) and rot13 (doesn't have a file extention as far as I know) All of these encoding methods are really simple to understand and decode. I'll also go over XOR and DES, which are true forms of encryption.

Thursday, March 06, 2003

TAKEDOWN: Transcripts
In the course of tracking the attacker, a great deal of network traffic was captured by a specially modified version of tcpdump (here's information on the legality of the acquisition of this evidence), and then a program written by Tsutomu was used to produce playable logs. Another program will play them back (forwards or backwards) for you, in real-time (or faster, if you choose).
Attack Lab Design & Security Mini How-Two
This document provides guidance for building and securing an attack lab. An attack lab is a networking environment designed for evaluating exploits, viruses, and similar security related software, and sometimes provides a facility for pen-test training, practice, and exercises. There are security measures that should be put in place to minimize the risk associated with the aforementioned activities. This document describes the necessary hardware, software, and network setup for an efficient and effective attack lab, as well as procedures and mechanisms to minimize the risks associated with running an attack lab.
raptor's room
I'm a computer security researcher and consultant, a UNIX software developer and a system administrator. My particular interests are networking (specifically old-style X.25 packet switched networks and IEEE 802.11 wlan), telephony (fixed and mobile phones), communication protocols, and cryptography.
Security Is in the Smart Cards
News that a hacker recently accessed as many as 8 million Visa and MasterCard accounts would have been shocking if we weren't becoming so disturbingly numb to such break-ins. We really can't go on this way if retail e-commerce is to become a permanent, trusted part of our lives.

How did we get here? Credit card companies and online retailers bent over backward to make consumers feel secure about their transactions. Seeing to it that credit card numbers can't be lifted via communications over the wire or over the air was an important step.

But what of the credit card data once it's in the hands of the online retailer or the transaction processing company? In the instance above, Data Processing International, which services mostly television and catalog sales by phone, was the target. At a minimum, that data should be stored in encrypted form, preferably encrypted with the credit card vendor's public key so that the data is inaccessible to anyone but the vendor. But even better, it should not be stored at all.


The credit card data needed to complete a transaction should be submitted once and not retained. American Express' Private Payments program is a leader here, as the vendor gets a temporary transaction number, not the actual credit card number. But retailers have, by and large, chosen to store credit card numbers in online databases to encourage easier purchasing. Here's where smart cards can help. Using a smart card and scanner in combination with online wallet software can alleviate the chore of entering card data manually.

Monday, March 03, 2003

Hydan: Information Hiding in Program Binaries
Hydan steganographically conceals a message into an application. It exploits redundancy in the i386 instruction set by defining sets of functionally equivalent instructions. It then encodes information in machine code by using the appropriate instructions from each set.
SSH Tunneling part 1 - Local Forwarding
Want to encrypt an otherwise cleartext transmission? SSH Tunneling may be the tool for you.
Computer Crime Investigator's Toolkit
What I've tried to do is devise a summary of basic, practical knowledge, "tricks," if you like, that should interest all computer crime investigators. While they may not be the final word in preparing for an examination, these techniques will provide some insight into the ways and means of computer criminals. I hope to get you into the spirit of the hunt. Learning to think how a criminal looks at twisting, altering, hiding, and diverting information will definitely make the game more interesting. This is a pathfinder, a starting point to discovering other resources.