Posts:

EncFSGui – GUI Wrapper around encfs for OSX

Introduction

3 weeks ago, I posted a rant about my frustration/concern related with crypto tools, more specifically the lack of tools to implement crypto-based protection for files on OSX, in a point-&-click user-friendly way.  I listed my personal Read more

Read More

Crypto in the box, stone age edition

Introduction

First of all, Happy New Year to everyone! I hope 2016 will be a fantastic and healthy year, filled with fun, joy, energy, and lots of pleasant surprises.

I remember when all of my data would fit on Read more

Read More

BlackHat EU 2012 – Day 3

Good morning,

Since doing live-blogging seemed to work out pretty well yesterday, I’ll do the same thing again today.  Please join in for day 3 at BlackHat Europe 2012, in a cloudy and rainy Amsterdam.

The first talk Read more

Read More

BlackHat EU 2012 – Day 2

Welcome back friends, at day 2 of BlackHat Europe 2012, held in the Grand Hotel Krasnapolsky in the wonderful city of Amsterdam.

Today, I’m going to do things slightly different.  I will try to post write-ups immediately after Read more

Read More

Exchange 2010 Certificates

In an older blog post on Certificate Authorities, I have provided some information about the process to generate Exchange 2007 certificates.  This process has slightly changed in Exchange 2010, and Johan Delimon (pro-exchange.be) has written an excellent article Read more

Read More

Blog performance

I have noticed some blog performance issues over the last couple of days, so I have decided to make some system changes on the web and database servers that are hosting this blog.

These changes are in place, but Read more

Read More

Free tool : Windows 2003/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates

In one of my earlier posts, I have talked about setting up a Windows 2008 based Certificate Authority/PKI. Once your Windows 2008 CA setup is in place and configured, you can go ahead and starting issuing certificates. But Read more

Read More

Cheatsheet : Cracking WPA2 PSK with Backtrack 4, aircrack-ng and John The Ripper

Basic steps :

  • Put interface in monitor mode
  • Find wireless network (protected with WPA2 and a Pre Shared Key)
  • Capture all packets
  • Wait until you see a client and deauthenticate the client, so the handshake can be captured
  • Crack Read more
Read More

Nessus/OpenVAS wrapper for ike-scan

ike-scan is a great tool to audit VPN/IPSec implementations.  This tool, which runs under Lunix, Unix, MacOS and Windows, can be found at www.nta-monitor.com/tools/ike-scan/ (Latest version at time of writing is 1.9). My Nessus ike-scan NASL wrapper may Read more

Read More

Juniper : Netscreen Remote Dial-UP VPN with AD Radius Authentication and route based VPN / tunnel interface

The following procedure explains how to set up a Juniper ScreenOS based firewall to accept Netscreen Remote Client VPN connections and authenticate users using Active Directory (Radius via Windows 2003 IAS or Windows 2008 NPS). 

We’ll assume that all Read more

Read More