Uncategorized

So recently there has been lots of news about the linkedin password hashes being leaked which was finally confirmed on the linkedin blog.

Many of the hashes first 5 chars are obfuscated with zeros so it’s understood these are the passwords already cracked, presumably the simple ones?

1. There are 3,521,180 hashes that begin with 00000. I believe that these represent hashes that the hackers have already broken and… Continue reading

So I’ve got a Canon 400D (aka rebel & XIi) camera and love to tinker with it.

I wanted to take a series of photo’s over the course of a few hours in order to allow me to create a time-lapse video. Unfortunately the camera had no in built functionality to do this. My next idea was that the remote shutter release could be hacked up using an arduino in… Continue reading

Writeup by scriptmonkey: Onesixtyone’s origional developer (phreedom.org – 404) produced the great piece of code that was modified by Portcullis here. Unfortunately onesixtyone has never supported obscure ports and insteads is fixed using UDP port 161.

We’ll modify the code the allow a custom port using the -p flag

Wanted to add it as a custom flag so added it to the structure which stores the command line options… Continue reading

In my line of work we encourage encrypted communications and securing sensitive data especially when it comes to PII.

However it’s increasingly common to see systems put into place that are obviously only there to mitigate litigation aspects should anything go wrong.

Take American Express for example:

An email from them asking you to send a copy of your passport/driving licence/etc… to confirm your identity suggests that you may reply… Continue reading

Figured I’d keep a copy of this on here for the next time I need to do malware investigation.

  • urlvoid.com – checks URL’s against lots of blacklists, emergingthreats, malwaredomainlist and zeustracker/etc…
  • ipvoid.com – Same as above but for IP addresses
  • support.clean-mx.de – Searches above databases and records logs of abuse claims. Useful as it can sometime give you extra URI’s for a host to comb your logs for. Also usefully… Continue reading