Hakin9_Extra_June_2012.pdf
(
4599 KB
)
Pobierz
Atola Insight
That’s all you need for data recovery.
Atola Technology offers
Atola Insight
– the only data recovery device that covers
the entire data recovery process:
in-depth
HDD diagnostics
,
firmware recovery
,
HDD duplication
, and
file recovery
. It is like a whole data recovery Lab in one Tool.
This product is the best choice for seasoned professionals as well as start-up data
recovery companies.
• Case management
• Real time current monitor
• Firmware area backup system
• Serial port and power control
• Write protection switch
The Industry’s
First Commercial
Pentesting
Drop Box.
Air Freshener?
Printer PSU?
...nope
FEATURES:
J
Covert tunneling
J
SSH access over 3G/GSM cell networks
J
NAC/802.1x bypass
J
and more!
Discover the glory of
Universal Plug & Pwn
@
pwnieexpress.com
t)
@pwnieexpress
e)
info@pwnieexpress.com
p)
802.227.2PWN
DEAR READERS,
Managing:
Michał Wiśniewski
m.wisniewski@software.com.pl
THIS MONTH WE DECIDED TO PREPARE A SPACIOUS IS-
SUE ON TIMING ATTACKS. THERE ARE TWO REASONS FOR
THAT: IRST – AS AN ”EXTRA” BRANCH OF HAKIN9 WE
SEARCH FOR THE HOTTEST TOPICS IN IT-SECURITY AND
WE ENJOY EXPANDING ON THE TOPICS THAT WE HAVE
PREPARED. THE SECOND REASON, HOWEVER, HAS EVE-
RYTHING TO DO WITH THE LAUNCH OF THE NEWLY ESTA-
BLISHED CRYPTOMAG. WE ARE PREPARING COMPLETELY
NEW MAGAZINE, INDEPENDENT OF HAKIN9, AND SOLE-
LY DEVOTED TO CRYPTOGRAPHY (AS ITS NAME SUGGE-
STS). STAY TUNED TO HAKIN9 NEWS AND BE READY FOR
THE NEW MAGAZINE WHEN IT APPEARS. BELOW IS WHAT
WE HAVE PREPARED FOR YOU IN THIS MONTH’S HAKIN9
EXTRA. VINCENT RIJMEN IN HIS ARTICLE ON ”TIMING AT-
TACKS ON AES” WILL SHOW YOU HOW THE EXECUTION
TIME OF AN AES ENCRYPTION CAN BE USED TO DERI-
VE THE SECRET KEY. QI CHAI, IN THIS ISSUE’S SPECIAL
ARTICLE, WILL RE-VISIT TIMING ATTACKS AGAINST RSA.
WEIZHONG YANG AND JEFFREY ZHENG ARE GOING TO
PRESENT VARIANT PSEUDO-RANDOM NUMBER GENERA-
TOR. MICHAEL W. FARB, YUE-HSUN LIN, ADRIAN PERRIG
AND JONATHAN MCCUNE ARE GOING TO EXPATIATE ON
SAFESLINGER – AN EASY-TO-USE AND SECURE PUBLIC-
-KEY EXCHANGE. MARTIN RUBLIK, OR REGULAR COLLA-
BORATOR IS GOING TO PRESENT AN OVERVIEW OF SIDE
CHANNEL AND TIMING ATTACKS. IN AN ARTICLE ENTI-
TLED ”THE DICHOTOMY OF SYMMETRIC VS ASYMMETRIC
CRYPTOGRAPHY” WAYNE PATTERSON DISCUSSES THE
FUNDAMENTAL DILEMMA OF THE TWO KINDS OF CRYP-
TOGRAPHY IN TODAY’S USE. MATTHIEU BONTROND IS
GOING TO PRESENT TIMING ATTACK AGAINST CBC OPE-
RATING MODE – AN ATTACK THAT ENABLES DECRYPTION
OF BLOCKS WITHOUT ATTACKING THE ENCRYPTION KEY.
THEODOSIS MOUROUZIS HAS PRESENTED US AUTOMA-
TED ALGEBRAIC CRYPTANALYSIS. MICHAEL WISHER PRE-
SENTED HIS EXPERTISE ON ”CACHE-TIMING ATTACKS ON
SYMMETRIC CRYPTOGRAPHIC PRIMITIVES”. NITIN JAIN IS
GOING TO PRESENT YOU THE ARTICLE ON ”TIMING AT-
TACKS ON PRACTICAL QUANTUM CRYPTOGRAPHIC SYS-
TEMS. THE LAST, BUT NOT LEAST IS THE INTERVIEW WITH
VITALIY MOKOSIY – ATOLA’S BANDURA PROJECT MANA-
GER AND KEY DEVELOPER.
Senior Consultant/Publisher:
Paweł Marciniak
Editor in Chief:
Grzegorz Tabaka
grzegorz.tabaka@hakin9.org
Art Director:
Marcin Ziółkowski
DTP:
Marcin Ziółkowski
www.gdstudio.pl
Production Director:
Andrzej Kuca
andrzej.kuca@hakin9.org
Marketing Director:
Grzegorz Tabaka
grzegorz.tabaka@hakin9.org
Proofreadres:
Dan Dieterle, Michael Munt,
Michał Wiśniewski
Top Betatesters:
Ruggero Rissone,
David von Vistauxx,
Dan Dieterle,
Johnette Moody,
Nick Baronian,
Dan Walsh,
Sanjay Bhalerao,
Jonathan Ringler,
Arnoud Tijssen,
Patrik Gange
Publisher:
Hakin9 Media Sp. z o.o. SK
02-682 Warszawa, ul. Bokserska 1
www.hakin9.org/en
Whilst every effort has been made to ensure
the high quality of the magazine, the editors
make no warranty, express or implied,
concerning the results of content usage.
All trade marks presented in the magazine
were used only for informative purposes.
All rights to trade marks presented in the
magazine are reserved by the companies which
own them.
To create graphs and diagrams we used
program by Mathematical formulas created
by Design Science MathType™ DISCLAIMER!
I HOPE THAT YOU WILL ENJOY THE READING!
MICHAŁ WISNIEWSKI, HAKIN9 EXTRA
M.WISNIEWSKI@SOFTWARE.COM.PL
The techniques described in our articles may
only be used in private, local networks. The
editors hold no responsibility for misuse of the
presented techniques or consequent data loss.
Plik z chomika:
TirNaNog
Inne pliki z tego folderu:
Hakin9.07.(04.2004).PL.pdf
(49821 KB)
Hakin9.29.(09.2007).PL.pdf
(12061 KB)
Hakin9.17.(03.2006).PL.pdf
(58743 KB)
Hakin9.05.(02.2004).PL.pdf
(51314 KB)
Hakin9.01.(01.2003).PL.pdf
(3572 KB)
Inne foldery tego chomika:
ACE
AcornUser
AmigaComputing
AmigaFormat
AmigaShopper
Zgłoś jeśli
naruszono regulamin