Crowbar (crowbar) is brute forcing tool that can be used during penetration tests. It is developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH key. So SSH keys, …
Tag: checksum
Permanent link to this article: https://www.darknessgate.com/2015/02/23/crowbar/
Alpine Linux
Alpine Linux is a community-developed operating system designed for x86 Routers, Firewalls, VPNs, VoIP and servers. Alpine Linux is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Alpine Linux with anyone for absolutely nothing. Alpine Linux was designed with security in mind. It …
Permanent link to this article: https://www.darknessgate.com/2014/11/17/alpine-linux/
BackBox Linux
BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known …
Permanent link to this article: https://www.darknessgate.com/2014/11/17/backbox-linux/
SEANux
SEANux is an Ubuntu-based Linux distribution with a modified Gnome Shell interface, icons and GTK Theme. It is charged up with penetration testing tools and other useful applications for general purposes. http://seanux.sea.sy/#download
Permanent link to this article: https://www.darknessgate.com/2014/11/02/seanux/
Cryptography and Cryptanalysis
This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/
Permanent link to this article: https://www.darknessgate.com/2014/10/12/cryptography-cryptanalysis/
Cryptography from Fachbereich Informatik
This lecture deals with the following cryptographic topics: Cryptographic Foundations (security goals, historical ciphers, AES, a sketch of RSA) Foundations of information theory (terms, probability theory, Shannon’s theorem) Entropy Design principles of cryptographic hash functions Pseudo random number generators and stream ciphers A sketch of elliptic curve cryptography Quantum cryptography Implementation issues (efficiency, obfuscation) https://www.fbi.h-da.de/organisation/personen/baier-harald/teaching/lectures-summer-term-2012/cryptography.html
Permanent link to this article: https://www.darknessgate.com/2014/09/25/cryptography-fachbereich-informatik/
Cryptography and Protocols – Spring 2014
http://www.cs.sfu.ca/CourseCentral/404/abulatov/
Permanent link to this article: https://www.darknessgate.com/2014/09/20/cryptography-protocols-spring-2014/
Introduction to Modern Cryptography 2012
Cryptography has a very long and exciting history. For centuries, political leaders and military forces have used cryptographic techniques, primarily to communicate securely. Modern cryptography is concerned with an enormous variety of scenarios where the involved parties do not fully trust each other such as internet banking, electronic voting, integrity of data, security of computer …
Permanent link to this article: https://www.darknessgate.com/2014/09/18/introduction-modern-cryptography-2012/
Online Audio and Video Lectures on Computer Networking
Prof. Shiv Kalyanaraman’s Online Audio and Video Lectures on Computer Networking Fundamentals of Wireless Broadband Networks (Lecture Slides & Video) Broadband and Optical Networks Internet Protocols Computer Communication Networks http://www.ecse.rpi.edu/Homepages/koushik/shivkuma-teaching/video_index.html
Permanent link to this article: https://www.darknessgate.com/2014/09/12/online-audio-video-lectures-computer-networking/
TSIT03 Cryptology 2013
The course covers – the reasons for using cryptography in computer systems – what basic classes of algorithms there are, how they differ and how they should be used in different situations – the basic criteria for each algorithm class – how to find the characteristics of given pseudorandom number generators and how to construct …
Permanent link to this article: https://www.darknessgate.com/2014/09/08/tsit03-cryptology-2013/
Course F21CN: Computer Network Security
The purpose of Course F21CN Computer Network Security is to provide a solid understanding of the main issues related to security in modern networked computer systems. This covers underlying concepts and foundations of computer security, basic knowledge about security-relevant decisions in designing IT infrastructures, techniques to secure complex systems and practical skills in managing a …
Permanent link to this article: https://www.darknessgate.com/2014/09/07/course-f21cn-computer-network-security/