Security

From Things and Stuff Wiki
Jump to navigation Jump to search


General

News

Passwords

Server

Firewalls

csf/lfd

Windows

Logging

Integrity

Hardening

AppArmor

SELinux

Detection

Shells

Honeypot

Cryptography

RSA

EC

Encryption

PGP / GPG

gpg --export --armor <keyid> | awk '{ print "    "$0 }' 

Google

  • Penango is a web browser add-on that allows people to send and receive authenticated and encrypted messages end-to-end on the Internet with standards-based, interoperable protocols.
  • gAES - Encrypt your google chats and make the NSA sad

File system

Other

Homomorphic

Protocol

SSL/TLS

  • Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet. They use asymmetric cryptography for authentication of key exchange, symmetric encryption for confidentiality and message authentication codes for message integrity. Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP).

In the TCP/IP model view, TLS and SSL encrypt the data of network connections at a lower sublayer of its application layer. In OSI model equivalences, TLS/SSL is initialized at layer 5 (the session layer) then works at layer 6 (the presentation layer): first the session layer has a handshake using an asymmetric cipher in order to establish cipher settings and a shared key for that session; then the presentation layer encrypts the rest of the communication using a symmetric cipher and that session key. In both models, TLS and SSL work on behalf of the underlying transport layer, whose segments carry encrypted data.

HTTPS

Certificates

Wildcard

CAs

Services


Self-signed

Vulnerable to MITM as cracker can generate their own.

Cacert.org

Community group providing certs. Web of trust based assurance point system. Not carried by major browsers, just Linux distros.

StartCom

Free certs, one cert per domain, 1 year.

Tools

PFS

Software

DNSSEC

DANE

Articles

Future

Connections

HTML

Scripting

Vulnerabilities

Legal

UX

Windows

Resources

Testing

Metasploit

Other

  • w3af is a Web Application Attack and Audit Framework. The project's goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend.

Burp

Inception

  • Inception is a FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP-2 DMA. The tool can unlock (any password accepted) and escalate privileges to Administrator/root on almost any powered on machine you have physical access to. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.

to sort

Other

  • Pond is forward secure, asynchronous messaging for the discerning. Pond messages are asynchronous, but are not a record; they expire automatically a week after they are received. Pond seeks to prevent leaking traffic information against everyone except a global passive attacker. [6]
  • EZCrypt - We provide you with the power to encrypt the data BEFORE it gets stored on our site. All encryption/decryption is done on the client end using AES-CBC 128bit with a hash key generated on each paste. The server will only store the encrypted data without the hash key, so only you have the power to decrypt it.