timoh6.github.io
Aggressive password stretching - A solution to the low-entropy keys problem?
http://timoh6.github.io/2013/11/26/Aggressive-password-stretching.html
Web App Sec Quiz. Aggressive password stretching - A solution to the low-entropy keys problem? We have probably known for years. That user’s password should be properly cooked prior to saving to a user database. Actually, we have (or at least we should have) known this for decades. In late 1970s, Unix 7th Edition DES-based crypt(3). Hash function used 25 iterations (25 DES encryptions) and a 12-bit salt. Steven M. Bellovin. Explained password hashing back in April 1995 as follows. What happens when passw...
password-policy-testing.wikidot.com
Gratitudes - Password Policy Testing Framework
http://password-policy-testing.wikidot.com/grats
Password Policy Testing Framework. I'd like to say thanks to. My company, Parallels, Inc. They actually asked me to do research and let me do a major part of it during work time. For invaluable advices, consultations, support. And of course for great hardware. Without it I'd burn my MacBook to death. Org for giving presentation opportunity and being great motivator. For constant attention and support to this work and great motivation to continue it. My wife, Alexandra for math lessons. General Wikidot...
2014.zeronights.org
Hardware Village||ZeroNights
http://2014.zeronights.org/hwv.html
QIWI PWN 2 PAY. Rejoice, hardware and hacking device geeks: the open Hardware Village space will operate at ZeroNights again this year. At HWV, anyone can touch, use, or test any hardware they like as well as ask for usage tips and tricks. There will be workshops dedicated to the security of embedded systems and wireless networks. For DIY enthusiasts, we will deliver an overview of modern hardware DIY based on these platforms:. Teensy 2.0, 3.1. Raspberry Pi (B ). Bus Pirate, Bus Blaster.
2014.zeronights.org
Speakers||ZeroNights
http://2014.zeronights.org/conference/speakers.html
QIWI PWN 2 PAY. Alexander ‘Solar Designer’ Peslyak. Is infosec a game? Jean-Philippe (JP) Aumasson is Principal Cryptographer at Kudelski Security, in Switzerland. He is known for designing the cryptographic functions BLAKE, BLAKE2, SipHash, and NORX. He has spoken at conferences such as Black Hat and CCC, and initiated the Crypto Coding Standard and the Password Hashing Competition projects. He is member of the technical advisory board of the Open Crypto Audit Project. JP tweets as @veorq. Anton Kochkov...
2014.zeronights.org
Python Arsenal Contest||ZeroNights
http://2014.zeronights.org/contests/python-arsenal-contest.html
QIWI PWN 2 PAY. There are plenty of bug bounty programmes now, where hackers are paid for finding vulnerabilities or patching software. There are also exploit contests. In the end, all of this is done for the vendor's benefit. But the drive behind it is the hacker's prowess and tools. This is a contest of tools which help solve complex RE tasks. We believe that the whole security community will benefit here because all of your plugins will be available to everyone for the sake of experience exchange.
2014.zeronights.org
Contests||ZeroNights
http://2014.zeronights.org/contests.html
QIWI PWN 2 PAY. QIWI PWN 2 PAY.
2014.zeronights.org
Workshops||ZeroNights
http://2014.zeronights.org/conference/workshops.html
QIWI PWN 2 PAY. IOS forensics with OpenSource tools. This workshop is for attendees who want to become familiar with current state-of-the-art techniques in iOS forensics. The focus will be on data extraction and we will try to limit ourselves to open-source or freely available tools. Both jailbroken and non-jailbroken devices will be covered. I will walk you through all required theoretical background and we will then run the hands-on exercises. Introduction to digital forensics. I2 New fraud schemes.
2014.zeronights.org
Mini contests at Hardware Village||ZeroNights
http://2014.zeronights.org/hwv/hwv-contests.html
QIWI PWN 2 PAY. Mini contests at Hardware Village. Especially for hacking device lovers, three contests are planned at the ZeroNights Hardware Village. With prizes, too:. This contest will go on during the entire conference. The first one to break a hacking device designed by the organizers will get this device as a gift. There will be several unique devices. Stand up and Hack – a mini talk contest. HackDev – develop and present your own hacking device.
2016.zeronights.org
ZERONIGHTS 2016 Conference
https://2016.zeronights.org/2016/12/02/the-results-of-the-zeronights2016
The results of the ZeroNights’2016. The results of the ZeroNights’2016. Key topics of 2016 ZeroNights included: web security; security of Windows, MacOS, iOS; hardware vulnerabilities; backdoors in hardware from the global vendors; search for vulnerabilities; attacks on neuron networks; reverse engineering; attacks in the world of transactions; hacking top-class and inexpensive smartphones; security of process automation systems; and new hacker techniques.
2016.zeronights.org
ZERONIGHTS 2016 Conference
https://2016.zeronights.org/conference-materials/photo
First day 17 November. Second day 18 November. Опубликовано 22.12.2016.