In association with heise online

19 April 2013, 16:24

Lost+Found: Android memories and real-time cuckoos

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Lost and Found Too small for news, but too good to lose, Lost+Found is a compilation of the other stories that have been on The H's radar over the last seven days: Android memory dump analysis, OCSP performance, 1Password security, Python crypto cracking, real-time cuckoo, Hack In The Box slides, Certificate Pinning, and the reason Linode was hacked.

  • Hardly anyone knows it, but almost everyone is using it: when browsing HTTPS pages, a browser will often contact an OCSP responder to verify the validity of the certificate. Netcraft has now investigated the performance and availability of responders over a four-month period. The result? OCSP has little effect on the duration of a connection though at one stage six per cent of requests to a StartCom responder were failing.

  • The encryption on 1Password's password safe isn't quite as secure as promised. Thanks to a clever optimisation by "atom" it is possible to use the oclHashcat cracker to test passwords at a rate of 3 million passwords per second. This is a considerably higher rate than you would expect when using PBKDF2, but no risk to a really good master password.

  • Anyone reading the book Hacking Secret Ciphers with Python is killing two birds with one stone. Not only do you learn how to crack crypto texts but you also get to learn Python programming from scratch. The author, Al Sweigart, will donate the proceeds of the book to the EFF, Creative Commons, and the Tor Project. Those who want to take a look first can download the entire book as a free PDF.

  • Version 0.6 of the malware analysis sandbox Cuckoo has been released and now gives the results of its analysis in real-time. The developers have also fixed a number of bugs in the sandbox.

  • Microsoft's Enhanced Mitigation Experience Toolkit (EMET) has introduced SSL Certificate Pinning in its latest beta for version 4 . With this function, users can select a number of trusted root CAs whose certificates will be trusted. This can help protect from fraudulent certificates that were issued after a CA hack or with the blessing of a government.

  • After the successful hack of hosting company Linode, it has become clear that the attackers were targeting the servers of Nmap developer Gordon "Fyodor" Lyon. He has restored the repositories from uncompromised backups.

(djwm)

Print Version | Send by email | Permalink: http://h-online.com/-1844057
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit