You are viewing a read-only archive of the Blogs.Harvard network. Learn more.
Skip to content

Monthly Archives: January 2008

2007 Myspace Hack Archive

archived just in case from [http://kinematictheory.phpnet.us/] How the myspace SWF hack worked First note: I DID NOT MAKE THE HACK. I simply downloaded the .swf’s, decompiled them, looked at the actionscript, worked out what it did, found the Javascript that it uses, and tidied it up & commented it. I’ve probably got some bits wrong, […]

Decrypting Wireless Packets

http://www.kismetwireless.net/Forum/General/Messages/1148589487.250937 If I’ve used kismet to create a dump file (full packet capture) with WEP encrypted data and then later learn the WEP key, how can I can I apply this key (and BSID) to decrypt the data?

Top 2007 Symantec Vulnerabilities

MAY 25, 2006 | EEye Digital Security revealed this afternoon a software vulnerability inside Symantec’s Anti-Virus Corporate Edition 10.0. The vulnerability warning, posted on the vendor’s Upcoming Advisories page, requires no user intervention and could be used to create a worm. A Symantec representative told Dark Reading that eEye notified Symantec of the problem today […]

Thinking like the enemy?

Years in the vulnerability management space has taught me that companies can protect themselves by thinking like the attackers. This message seems to be broad in application and a recent anti-terrorism expert voiced the same thought. Yet this story has the anti virus industry up in arms for a consumer protection agency doing just that. […]

山中送别

山中相送罢 日暮掩柴扉 春草明年绿 王孙归不归

China Net Eyes

The field of journalism is vast, so there is a lot that we can talk about. But usually the third last sentence that we say with a degree of resignation is this: “We can’t publish that. So we won’t discuss that.” 2007年中国博客市场调查报告