Public DNS in Taiwan the latest victim to BGP hijack Security News & Discussion |
- Public DNS in Taiwan the latest victim to BGP hijack
- Bypass default AppLocker rules - A post about a small discovery in AppLocker
- Passive DNS - a tutorial to setup your own Passive DNS using D4 Project
- My thoughts after my first (real) attempt at Hackthebox - Beginner Guides - 0x00sec
- Exploiting File Uploads Pt. 1 – MIME Sniffing to Stored XSS
- Analyzing a Coin Mining and Remote Access Hybrid Campaign
- Pgen – Command-line passphrase generator
- A new super light protocol resistant to Eclipse Attacks
- I made this tool to look for all the build logs of CI tools such as Travis-CI which can then be used to find sensitive information
Public DNS in Taiwan the latest victim to BGP hijack Posted: 31 May 2019 11:00 AM PDT |
Bypass default AppLocker rules - A post about a small discovery in AppLocker Posted: 31 May 2019 05:20 AM PDT |
Passive DNS - a tutorial to setup your own Passive DNS using D4 Project Posted: 31 May 2019 01:43 PM PDT |
My thoughts after my first (real) attempt at Hackthebox - Beginner Guides - 0x00sec Posted: 31 May 2019 01:03 AM PDT |
Exploiting File Uploads Pt. 1 – MIME Sniffing to Stored XSS Posted: 31 May 2019 11:23 AM PDT |
Analyzing a Coin Mining and Remote Access Hybrid Campaign Posted: 31 May 2019 11:15 AM PDT |
Pgen – Command-line passphrase generator Posted: 31 May 2019 09:57 AM PDT The EFF has made and published three lists of words to use that are easy to spell and generally easy to remember. I wrote a command-line tool in Rust for generating passphrase using these wordlists. I use it myself any time I need a password. My tool is fast, free of charge, open source and it can also tell you the entropy that will result for any given choice of number of words. For example let's say I want it to give me four words from the long wordlist, and I want to know how many bits of entropy this corresponds to. 51.70 bits of entropy. What does that mean, you might ask. The Wikipedia article on password strength (https://en.wikipedia.org/wiki/Password_strength) explains it well:
Ok, so how good is 51.70 bits of entropy? Wikipedia, same article again:
So let's say that you are satisfied with 51.70 bits of entropy in this case. What does a password like that look like? Let's generate one. Pretty memorable right? :) Oh yeah, and about the claim that it's fast. Just how fast is it? Have a look. That's 5 milliseconds. But hey, let's say we wanted to generate a bunch of passphrases at once. How much time does it take to generate 10.000 passphrases and dump them into a text file? About zero point one seconds. Not that generating 10.000 passphrases is something that you are likely to do, but it just speaks to how fast this tool is ^^ Source and instructions on how to install it are on GitHub. [link] [comments] |
A new super light protocol resistant to Eclipse Attacks Posted: 30 May 2019 07:38 PM PDT |
Posted: 31 May 2019 03:25 AM PDT |
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment