Welcome to Delicate template
Header
Just another WordPress site
Header

To carry out ethical spear phishing attacks in order to help organizations test their security awareness and attack preparedness levels, True begins by using the same techniques as cyber criminals, conducting online research to gather information about our targets that can be used to attempt to deceive individuals within an organization. Like malicious attackers, we search the web for publicly accessible documents on the target’s website, employee names, email addresses, phone numbers, company policies, business plans, internal communications, and any other available information sources that may be useful to our scheme.Read more

In the cyber-security realm, arguably one of the best methods of gaining hands-on experience is to compete in Capture the Flag (CTF) competitions. Since they are designed, hosted, and competed in by leading whitehats and blackhats, the challenges and the write-ups both reflect current exploits and strategies. These competitions are a great way to test one’s own skills and gain hands on experience leveraging cutting-edge attack techniques.Read more

The POODLE attack or “Padding Oracle On Downgraded Legacy Encryption” is a fairly recent attack that takes advantage of both the backwards compatibility integrated into SSL/TLS protocols and the means by which SSL/TLS protocols are negotiated. Its purpose is to force a downgrade from TLS 1.0/1.1/1.2 to SSL 3.0, which has an inherent flaw that allows for an actor to decrypt a client-side cookie containing authentication data.Read more

Logjam Vulnerability

May 21st, 2015 | Posted by Steven Anderson in Monitoring | Security | SIEM - (0 Comments)

The TLS protocol is the current standard for secure communication over the Internet and until now had been considered to be highly secure. A recent discovery of Logjam, a vulnerability that spawns results similar to that of FREAK (Factoring Attack on RSA-EXPORT Keys) affects 8.4% of the top one million web domains. Like FREAK, Logjam downgrades encrypted connections to a weak 512-bit encryption using the “export-grade” option. Once downgraded, the encryption key can be factored in less than twelve hours using Amazon EC2, and it will only cost the attacker about $100. This vulnerability impacts SMTP, StartTLS, secure POP3, IMAP, and of course SSL and TLS.
Read more

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that are designed to provide security for communications over a computer network. Theoretically, they establish a link through which to communicate securely. The protocols are only theoretically secure because the security is dependent on the following assumptions: Read more