THE

SPRAWL

  •  
  •  
  •  
  • sprawllatest

    geoip2kml

    Download Not Available
    Size Not Available
    DateJanuary 27th, 2010
    Version0.1

    Generate Google Earth KML files using provided GeoIP database. Read more.

    sslmap

    Download sslmap-0.2.0.py
    Size 58.8 KB
    DateJanuary 27th, 2010
    Version0.2

    SSLMap is a lightweight TLS/SSL cipher suite scanner.

    • Uses custom TLS/SSL query engine for increased reliability/speed (No need for third-party libraries such as OpenSSL)
    • Tests for 200+ known cipher suites.
    • Capable of discovering undocumented cipher suites.
    • Advises on cipher suite security based on Protocol, Key Exchange, Authentication, Encryption algorithm, and other parameters.
    • Configurable handshake versions (e.g. TLSv1.1, SSLv2.0) Read more.

    16 jan
    2010
    2600 magazine article

    My article on the Tor control protocol was published in the Winter 2009-2010 issue of the 2600 Magazine. Read more.

    04 oct
    2009
    rice tea

    A review of Rice Tea, a fun cyberfiction novel by Julien McArdle. Read more.

    net cafe - hackers

    The 1996 episode of Net Cafe we look at the hacker culture and their influence on the early growth of the internet. Guests include Dan Farmer, author of SATAN and COPS; Eliaz Levi (aka Aleph 1), webmaster of underground.org and Bugtraq; also "Omega" and "White Knight" from Cult of the Dead Cow. Read more.

    tor control protocol

    Tor implements a highly customizable control protocol which can be used to tune almost all aspects of its operation. In this article you will learn how to fine tune Tor client's operation, query runtime information, as well as create circuits of arbitrary size. Read more.

    tls and ssl cipher suites

    TLS/SSL protocols support a large number of cipher suites. A cipher suite is a collection of symmetric and asymmetric encryption algorithms used by hosts to establish a secure communication. Supported cipher suites can be classified based on encryption algorithm strength, key length, key exchange and authentication mechanisms. Some cipher suites offer better level of security than others (e.g. Several weak cipher suites were developed for export to comply with US export law). There are more than 200 known cipher suites. Read more.

    web warriors

    A CBC documentary Web Warriors begins by speculating the link between the release of Blaster worm and massive power blackouts that occurred shortly after. Following this assumption, the documentary explores how computer viruses can be used to disrupt national infrastructures. After a brief coverage of Defcon conference, there is an interview with MafiaBoy. Next there is an interesting twist, where we follow Donnie "a career hacker" trying and ultimately failing to track down the programmer behind the Microsoft Word virus (Sobig) in Moscow, Russia. The documentary concludes by discussing the threat of information warfare coming from Russia and China. Read more.



    π
    ///\oo/\\\