Post is pinned.Post has attachment

Post has shared content
#Insight is one of the best hashtag#cloud hashtag#security service providers that support to deliver the reliable security risk hashtag#management assistance.

For more details:

Post has attachment
Why traditional #security measures are now obsolete? Download whitepaper now- #Cybersecurity #Infosec #ISO #AI #MDR

Post has attachment
Join us to get Insight on Security Operation, Analysis and Reporting (SOAR) Technology Stack to support workflow management and Automation, Analytics and Reporting to reduce manual efforts by IT Team for incident detection and to filters alerts.
Registration Link >>

Post has attachment
Have you registered for Accume partners IT Audit Hot Topics Webinar on August 15th? Don’t wait! There’s limited space available. Register to save your spot now:

Post has shared content
Get huge discount on SysTools Outlook Toolkit this FIFA World Cup 2018 Season. All in one solution to manage Outlook mailbox effectively. For more information:

#Fifa2018 #Worldcup2018 #russiaworldcup2018 #SysTools #Outlook #Toolkit #Solution

Post has shared content
Malicious Employee gain access to sensitive data. These people can quickly extract value, inflict damage or impact business operations. It is in trend that most of the data breach is done by internal employee for sake of money from competitor. So what to do next when it is already happened. There is no need worry. You just need to avail the digital forensics services by SysTools. The experts forensicator will do work for you and in minimum time suspect will be caught hang up.

For more information:

#cybersecurity #cyberthreat #fraud #SysTools #cyberbullying #databreach #dataloss #business #information #employee

Post has attachment

Post has attachment
Does anyone here read 2600 "the hacker quarterly" (great magazine)
If you do not I suggest checking it out. I was featured in a article in the 2017 spring issue.

A few things to start.
Each year I go on vacation like most of you. I try to find one thing to hack on vacation each year, I call these "vacation hacks"

Well this year my vacation hack was presented to me, I did not need to seek it out, didn't even get to unpack yet. A 7 hour drive to get to my uncles beach house. He only had to drive a Hour out. We meet at the beach house only to find out when he arrives that he forgot the key, He says not to worry I got a spare in a key lockbox here. Well he goes to open it and of course the pin he keeps entering isn't working, So he leaves to go get the key he left at home. Well I never feel like waiting for anything.... so I cracked open my laptop and started googling and messaging a close personal associate of mine ... the story that follows is what He submitted to 2600 and it got published.

Lockbox PIN Code Generator
2600: The Hacker Quarterly
by Victor · Spring 2017
Months ago, an associate was commenting on the oddities of a physical key lockbox.
I'm sure you're familiar with the type of lockbox typically used by realtors which are intended to securely store a house key; opened with a PIN code or dial combination lock.
So my associate's "uncle" had "forgotten" the combination or acquired one of these things and was trying to brute force the box.
The lock box in question was of the pushbutton variety, opening with a numeric PIN. While the PIN length can vary,
he knew that the PIN on his lockbox was four digits long.
Trying up to 10,000 PINs sounds like quite a boring task, right?
But wait, there's more.
The lockbox in question was made by Supra and, after some querying, he learned there were deficiencies in the design of this lockbox that significantly reduced the number of unique PINs. The PIN couldn't repeat any numbers and the order in which the pin was entered didn't matter (e.g. 1234 was the same as 4321)!
My associate started searching, but couldn't find a ready-made list of PINs.
His initial attempts at generating a list weren't quite right and I was drawn into the idea of solving this with some Python.
I'll give you the executive summary and you can jump straight to the code.
We're generating the PINs as a string,
so it can be padded with leading zeroes to the necessary length.
Converting the PIN to a list allows us to sort.
Sorting the PIN's characters is what addresses the fact that the order in which a PIN is entered does not matter.
There's also a check to eliminate PINs which use any digit more than once.
The check to eliminate PINs using any digit more than once might look strange to those less familiar with Python syntax.

[code]if [c for c in pin if pin.count(c) > 1]:[/code]

This is really a one-liner for creating a list.
See "List Comprehension" in the Python docs.
It iterates the characters in the PIN and returns a list containing only characters that exist more than once in the PIN.
Python's IF evaluates to True only when the returned list contains something.
It was reported to me that the resulting list of PINs and a six-pack later,
his uncle was triumphant!
I suspect the Supra lockbox model in question was mechanical in nature (as opposed to having some electronic guts),
which led to these strange properties.
The number of viable PINs was shockingly low, as you can see below.
What I hadn't thought of is that because PIN order doesn't matter, a five-digit PIN is the most secure - more or less digits reduces security.
Remember that when brute forcing, you're likely to hit on the winner halfway through the key space, so halve those numbers below to get a better idea of just how few tries it's likely to take.
It might be worth taking a minute to tinker and search for vulnerabilities with any lockbox you plan to use.
I suspect those industrious fellows in the Lockpick Village are having a chuckle at this.... I'm certain there are more egregious physical flaws in these types of products.
This is a fine start for PIN-generating needs which I've reused a couple of times already.
Happy hacking and I'd like to give a nod to $@LV@Ti0N for bringing this puzzle to my attention.

Post has attachment
Wait while more posts are being loaded