Blogg

15 08, 2015

Maligno v2.4 Released

By |2017-01-24T18:42:22+02:00august 15th, 2015|Categories: Maligno, tools|Kommentarer er skrudd av for Maligno v2.4 Released

Maligno is an open source tool designed for security testing and adversary replication. It can also be used for training IT staff in detecting advanced attacks, and to make security testing in corporate networks more realistic. New functionality and improvements have been implemented in the tool during the course of the month, reaching now [...]

3 08, 2015

Pcapteller – Customizing and Replaying Network Traffic

By |2017-01-24T18:42:49+02:00august 3rd, 2015|Categories: exercises, Pcapteller, tools|Kommentarer er skrudd av for Pcapteller – Customizing and Replaying Network Traffic

Pcapteller is a tool that allows the customization and replay of recorded network traffic. Mainly, the tool can help blue teams training their network security monitoring skills, by reusing resources already available on the Internet (e.g. PCAP files). The tool also helps increasing the degree of realism of the scenarios included in the PCAPs, [...]

18 07, 2015

Pcapteller – New Tool Released

By |2017-01-24T18:42:58+02:00juli 18th, 2015|Categories: Pcapteller, tools|Kommentarer er skrudd av for Pcapteller – New Tool Released

Encripto has released a new tool called "Pcapteller", which is a simple tool that allows you to re-create a recorded network traffic scenario that occurred in a foreign network, as it really happened in yours. Basically, the tool reads network packets from a PCAP file, and it replaces a given IP address with one [...]

12 07, 2015

Exercise With Block Cipher Modes

By |2017-01-24T18:43:34+02:00juli 12th, 2015|Categories: exercises|Kommentarer er skrudd av for Exercise With Block Cipher Modes

Today, I would like to propose a simple exercise based on AES-128, and two different block cipher modes: ECB and CBC. The idea is to prove how a secure encryption algorithm encrypts some data based on these block cipher modes. The results will show that even when encrypted, the information might not be protected [...]

Go to Top