THE

SPRAWL

  •  
  •  
  •  
  • researchlatest

    john the ripper

    John the Ripper is a multi-platform password cracking tool. Read more.

    packet filtering

    Packet filtering is an important skill when capturing and managing large network dumps. In this article you will learn several tools and techniques used to simplify searching and extraction of useful data from captured data. Read more.

    scapy

    Scapy is a packet forging tool using Python as its domain specific language. It was developed by Philippe Biondi in 2003. Read more.

    tor control protocol

    Tor implements a highly customizable control protocol which can be used to tune almost all aspects of its operation. In this article you will learn how to fine tune Tor client's operation, query runtime information, as well as create circuits of arbitrary size. Read more.

    tls and ssl cipher suites

    TLS/SSL protocols support a large number of cipher suites. A cipher suite is a collection of symmetric and asymmetric encryption algorithms used by hosts to establish a secure communication. Supported cipher suites can be classified based on encryption algorithm strength, key length, key exchange and authentication mechanisms. Some cipher suites offer better level of security than others (e.g. Several weak cipher suites were developed for export to comply with US export law). There are more than 200 known cipher suites. Read more.

    stunnel

    Stunnel allows a user to tunnel any TCP based application protocol through a connection secured by TLS/SSL. Read more.

    openssl

    OpenSSL is an open-source TLS/SSL toolkit implemented for a variety of platforms. In this article you will learn several openssl client and server commands useful in working with TLS/SSL protocol. Read more.

    decrypting tls/ssl traffic with wireshark

    Wireshark is capable of decrypting TLS/SSL traffic. This article will discuss the required conditions necessary for the decryption and walk you through the exact steps. Read more.

    tls/ssl protocol

    Transport Layer Security (TLS) and Secure Sockets Layer (SSL) are two closely related protocols designed to protect confidentiality and integrity of data in transit between two hosts. Read more.

    denial of service

    A Denial of Service (DoS) attack is designed to prevent legitimate access to a target system. This article will cover techniques used to DoS a machine or service. Read more.



    π
    ///\oo/\\\