>
> https://github.com/cisagov/RedEye
Disclaimer: Informationen som läggs upp på denna blogg är inte jobbrelaterad utan endast av mitt eget intresse. Lägger upp eller länkar till intressanta inlägg på nätet.
17 februari 2023
Ascon – Authenticated Encryption and Hashing
https://ascon.iaik.tugraz.at/index.html
Ascon
Lightweight Authenticated Encryption & Hashing
Ascon is a family of authenticated encryption <https://en.wikipedia.org/wiki/Authenticated_encryption> and hashing <https://en.wikipedia.org/wiki/Cryptographic_hash_function> algorithms designed to be lightweight and easy to implement, even with added countermeasures against side-channel attacks. Ascon has been selected as new standard <https://www.nist.gov/news-events/news/2023/02/nist-selects-lightweight-cryptography-algorithms-protect-small-devices> for lightweight cryptography in the NIST Lightweight Cryptography competition (2019–2023) <https://csrc.nist.gov/projects/lightweight-cryptography/finalists>. Ascon has also been selected as the primary choice for lightweight authenticated encryption in the final portfolio of the CAESAR competition (2014–2019) <https://competitions.cr.yp.to/caesar-submissions.html>.
9 februari 2023
Initial Access on Pen Tests | SANS Institute
Bra intro.
https://www.sans.org/webcasts/
Initial Access on Pen Tests
Tim Medin will present content and lab demos from SEC560: Enterprise Penetration Testing on gaining initial access on penetration tests. The initial access mechanisms described are used by Tim and his team to successfully compromise the first system(s) on pen tests, which then leads to post-exploitation and a deeper analysis of the target network. Join him for this fun and interesting look at common methods used to compromise target systems as part of a successful enterprise penetration test.
https://www.sans.org/webcasts/
Initial Access on Pen Tests
Tim Medin will present content and lab demos from SEC560: Enterprise Penetration Testing on gaining initial access on penetration tests. The initial access mechanisms described are used by Tim and his team to successfully compromise the first system(s) on pen tests, which then leads to post-exploitation and a deeper analysis of the target network. Join him for this fun and interesting look at common methods used to compromise target systems as part of a successful enterprise penetration test.
Prenumerera på:
Inlägg (Atom)