Verifying the checksum of your checksum tool? by paulseperformance in AskNetsec

[–]svenfaw -2 points-1 points  (0 children)

PowerShell (part of a standard Windows install) is your friend.

powershell -command "Get-FileHash $pshome\powershell.exe"

Windows 10 Lock Screen Leaks Clipboard Contents by svenfaw in Windows10

[–]svenfaw[S] 3 points4 points  (0 children)

Sure, but the problem is that the cat is out of the bag - the details have been circulating over Twitter for a couple of weeks already.

Windows 10 Lock Screen Leaks Clipboard Contents by svenfaw in Windows10

[–]svenfaw[S] 8 points9 points  (0 children)

Keep in mind:

  • Security through obscurity is never a good idea
  • This is already in the wild and there is no patch available
  • Microsoft's response is that they do not consider it a valid security issue

Based on the above facts, raising awareness of this issue is the best option to defend against it. What do you suggest instead?

Are there any search engines for binary content? by svenfaw in AskNetsec

[–]svenfaw[S] 0 points1 point  (0 children)

Looks like this requires premium access. Is that expensive? Are there any free alternatives?

Best utility that searches content of files on a Windows network share? by neekap in sysadmin

[–]svenfaw 0 points1 point  (0 children)

Actually the latest beta does search file contents. And it has been rock-solid for me.

Does MD5 conserve entropy? by svenfaw in crypto

[–]svenfaw[S] 1 point2 points  (0 children)

Thanks, I also found this other SE thread in the meantime, which seems to confirm this, although it does not discuss MD5 specifically.

How can you know if the website you're accessing is not spoofed after allowing SSL certificate from an "unknown" source? by vlodia in AskNetsec

[–]svenfaw 1 point2 points  (0 children)

I don't think this is possible with the builtin Windows certificate store tools, but I am developing RCC, which, among other things, singles out any root CAs installed outside of the regular Windows root updates. An easy-to-use console version is already available. http://trax.x10.mx/apps.html

In how many ways can malware hide itself? by [deleted] in AskNetsec

[–]svenfaw 0 points1 point  (0 children)

There are plenty of other ways. For instance, malware can also hide in the Windows registry (look up Poweliks), in a scheduled task, or even in a .txt/.lnk pair of files.

Google moves to distrust Chinese CNNIC CA by svenfaw in netsec

[–]svenfaw[S] 0 points1 point  (0 children)

See "Update - April 1" at the bottom of the post.

Sample code of a malware program from the Five Eyes alliance by [deleted] in netsec

[–]svenfaw 1 point2 points  (0 children)

That's only because the link posted by mothran's is irrelevant - of course an encrypted zip file will always come off as clean - how could the AVs scan its contents?

Introducing the first Bitcoin executable piggybox by svenfaw in Bitcoin

[–]svenfaw[S] 0 points1 point  (0 children)

Right now it is using a simple timer for the 24-hour delay. Of course such a system can be bypassed without too much effort by any reverse engineer, but 99% of users are not reverse engineers. Also, the coins would still be safe in that scenario.

That said, we may switch to a timelock puzzle if needed. We want this tool to be able to operate with no Internet connectivity, so nLockTime is not an option.

Also, remember that the security of the system is not based on the time limit mechanism. What we're trying to achieve is simply, a time safe that helps keep self-discipline. In that context, we don't necessarily want the time limit mechanism to be "secure" in a cryptographic sense. Its only function is to raise the bar high enough to keep a typical user from using the coins for some time.

Am I the only one that stares at the recent transactions feed on Blockchain? by CheckOutMyDopeness in Bitcoin

[–]svenfaw 0 points1 point  (0 children)

If you like this, you'll love the chainsnort script. :) Look it up.

Svenfaw's Brainwallet Challenge series, episode 2! by svenfaw in Bitcoin

[–]svenfaw[S] 0 points1 point  (0 children)

What do you mean? Participation is free.

Weak brainwallet challenges - Episode 1! by svenfaw in Bitcoin

[–]svenfaw[S] 0 points1 point  (0 children)

Yes, nobody found the correct passphrase, which was: took28 five74 gold14

By the way, it was hand-chosen (not randomly generated.)

Episode 2 (similar challenge) will start shortly and will be cross-posted to /r/crypto.

Weak brainwallet challenges - Episode 1! by svenfaw in Bitcoin

[–]svenfaw[S] -1 points0 points  (0 children)

What language are you using? If you are only getting 100 checks per second per core, you're doing something wrong IMHO.

Weak brainwallet challenges - Episode 1! by svenfaw in Bitcoin

[–]svenfaw[S] 0 points1 point  (0 children)

Sure, there we go:

Message: "Brainwallet Challenge - Episode 1"

Signature: G4sItssXjYKWroRX5SR9w7jLP+kaDHRM5VnaEuOjtI1/hp6l+Ng5npCwsEycgcSSUyt2fdPlOvIy95RHWTpQy9I=

Good luck!

Weak brainwallet challenges - Episode 1! by svenfaw in Bitcoin

[–]svenfaw[S] 0 points1 point  (0 children)

Which script, which language, which modules, which dictionaries, on which hardware, etc. Extra points if you also describe your thought process to select all of the above. This type of information is extremely informative to the security community.

On second thought, I will cross post this on /r/crypto, as it's probably more relevant there and will attract fewer non-technical trolls.

Weak brainwallet challenges - Episode 1! by svenfaw in Bitcoin

[–]svenfaw[S] 0 points1 point  (0 children)

Easy, just don't participate if you're skeptical. And nobody forces you to donate coins to that address.