/dev/urandom

Heartbleeding Private Keys via Metasploit

2014-04-16 21:58:00 +0000

I’ve resisted posting about Heartbleed, just because I don’t think there’s much more to be said, so I’ll keep this brief. By now you know that it allows for reading raw server memory including things like credentials, session tokens, and whatever else happens to be in the web server processes memory near where your request is allocated. This also includes encryption keys used to secure SSL/TLS sessions.

continue reading ->

Open Redirect in benefits.gov for Eight Years

2013-10-14 08:10:00 +0000

While digging into some old phishing campaigns, I came across something interesting. It’s nothing earth-shattering, but the sheer length of time this vulnerability has remained viable, even after being identified in the press as actively exploited in the wild, is noteworthy.

continue reading ->

Hack My iPhone's TouchID @ Derbycon - win $100

2013-09-24 17:09:00 +0000

Just like the title says, if you’re the first to hack my iPhone 5s’ TouchID during Derbycon, I’ll give you $100.

continue reading ->

OTP, Stream Ciphers, and key reuse

2013-08-12 17:08:00 +0000

During (and just prior to) DEF CON, Druid ran a series of challenges for entrance into his LOLBitcoin party. I decided to give them a shot, and thought I’d document my approach to one of the challenges here.

continue reading ->

RoR CVE-2013-0156 In the Wild

2013-05-28 08:09:00 +0000

Ruby on Rails CVE-2013-0156 has recently been exploited in the wild. This vulnerability was the subject of much discussion, and an emergency RoR advisory back in January. It’s pretty suprising that it’s taken this long to surface in the wild, but less suprising that people are still running vulnerable installations of Rails. It also appears to be affected some web hosts

continue reading ->
me

Hi, I'm Jeff.

Twitter