IPSec/IKE Protocol Hacking. ToorCon 2K2 San Diego, CA ... IKE Tools and preso Download http://ikecrack.sourceforge.net. Anton Rager arager@avaya.com ...
ToorCon 7 - Smoke and Mirrors. Don't Believe Anything I Say ' ... ToorCon 7 - Smoke and Mirrors. Lets Talk about Security. For the feds, 'Information Assurance' ...
system files and archives are false positives. use raw disk i ... nifty in-place algorithm, ask me about it offline. recursion available on all. tool: slacker ...
3rd party software, browser temp, AV/spyware. data recovery ... hits registry. creates remote registry conn. often fails and doesn't clean up. tool: sam juicer ...
temporal locality. technique. timestamps hint as to when ... temporal ... temporal locality (time stamps) spatial locality (file location) data recovery ...
Digital limpet mines. Bored quasi-geek employees. Back office ... Someone might use a digital limpet mine. Oops old news. Databases might be compromised...
universally available (in Outlook and Thunderbird) requires a PKI. email encryption and signing ... Thunderbird - open source reference. Crypto Boot Camp ...
Sony Ericsson T68i 20R1B. 20R2A013. 20R2B013. 20R2F004. 20R5C001 ? Yes ? ? Sony Ericsson T610 20R1A081. 20R1L013. 20R3C002. 20R4C003. 20R4D001 ? Yes No ? ...
DISCLAMER: Some of the views and opinions expressed in this presentation are presenter s alone, and may or may not reflect or align with organization s policies ...
Dump live memory (software/hardware) Gather volatile data (software) Optional ... Un-fucking /dev/mem--/proc/kcore dump. Few ready-to-use Linux tools...