<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>DarthNull.org - David Schuetz Rambles about Stuff on Darth Null</title>
    <link>https://darthnull.org/</link>
    <description>Recent content in DarthNull.org - David Schuetz Rambles about Stuff on Darth Null</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 23 Apr 2025 16:12:51 -0400</lastBuildDate>
    <atom:link href="https://darthnull.org/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>About</title>
      <link>https://darthnull.org/about/</link>
      <pubDate>Tue, 01 Apr 2014 02:09:18 -0400</pubDate>
      <guid>https://darthnull.org/about/</guid>
      <description>&lt;hr/&gt;&#xA;&#xA;&lt;h2 id=&#34;-me&#34;&gt;&amp;hellip; me&lt;/h2&gt;&#xA;&lt;p&gt;Hi. I&amp;rsquo;m David. I&amp;rsquo;m a security geek. Mostly. Well, that&amp;rsquo;s my job, anyway. In real life, I like to program, goof around with network stuff, watch movies, and other typical geek-like activities. Though I also have three kids, so really what I like most is making them laugh. Which is good, &amp;lsquo;cause that&amp;rsquo;s about all I have time for.  Especially since my biggest extra-curricular activity for the last 4 or 5 years has been supporting Scouting America.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Job Hunt!</title>
      <link>https://darthnull.org/job-hunt/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://darthnull.org/job-hunt/</guid>
      <description></description>
    </item>
    <item>
      <title>Publications</title>
      <link>https://darthnull.org/publications/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://darthnull.org/publications/</guid>
      <description>&lt;p&gt;Somehow, calling this &amp;ldquo;Publications&amp;rdquo; feels a little pretentious, but I really wasn&amp;rsquo;t sure what else to use. Basically, I wanted to be sure there was a good way to share slides from the talks I&amp;rsquo;ve given, or papers I&amp;rsquo;ve written, etc.&lt;/p&gt;&#xA;&lt;p&gt;I know I&amp;rsquo;ve had people ask me after a talk for copies of the slides, and I know there are many who I&amp;rsquo;ve forgotten to get in touch with later. For that, I apologize. This way, I can just say &amp;ldquo;It&amp;rsquo;ll be on my website later today.&amp;rdquo;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Topics</title>
      <link>https://darthnull.org/topics/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://darthnull.org/topics/</guid>
      <description>&lt;p&gt;Here I should have a short list or index of the tags used. Ideally, this would be automatically generated based on all the topics currently being used. Or maybe just the top ten.&lt;/p&gt;&#xA;&lt;p&gt;For now, here&amp;rsquo;s just a list of the top 5, in roughly decreasing order of how much I&amp;rsquo;ve babbled about each topic.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://darthnull.org/tags/ios&#34;&gt;Apple iOS&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://darthnull.org/tags/security&#34;&gt;Security&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://darthnull.org/tags/cryptography&#34;&gt;Cryptography&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://darthnull.org/tags/puzzles&#34;&gt;Puzzles&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://darthnull.org/tags/mobile&#34;&gt;Mobile Security&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;lists&#34;&gt;Lists&lt;/h2&gt;&#xA;&lt;p&gt;Lists of items on the site, mostly about references (but could include posts), and generally more about the &amp;ldquo;kind&amp;rdquo; of document than about content.  For now, I just have a few lists:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Projects</title>
      <link>https://darthnull.org/projects/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://darthnull.org/projects/</guid>
      <description>&lt;p&gt;Like any geek, I&amp;rsquo;ve got about a dozen things happening at once. Some of my bigger projects include:&lt;/p&gt;&#xA;&lt;h3 id=&#34;khanfu&#34;&gt;KhanFu&lt;/h3&gt;&#xA;&lt;p&gt;In 2009, I got my first iPhone (a hand-me-down 1st generaton phone from my little brother, in fact). Three weeks later, I was heading to DEF CON, and I thought, I can put the DEF CON schedule on my phone! I built some simple HTML pages, using &lt;a href=&#34;https://code.google.com/p/iui/&#34;&gt;the iUI Framework&lt;/a&gt;, stuck them on my web server, and set it out there for people to use.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dark Mode, and other site improvements</title>
      <link>https://darthnull.org/dark-mode/</link>
      <pubDate>Wed, 23 Apr 2025 16:12:51 -0400</pubDate>
      <guid>https://darthnull.org/dark-mode/</guid>
      <description>&lt;p&gt;I&amp;rsquo;ve been listening to the &lt;a href=&#34;https://atp.fm&#34;&gt;Accidental Tech Podcast&lt;/a&gt; for years. They recently had a &lt;a href=&#34;https://atp.fm/atp-insider-our-websites&#34;&gt;members-only special&lt;/a&gt; about the technology they use for their personal websites. Building customized, Rube Goldberg-esque systems for managing a website is a time-honored time sink for many, myself included. And since an earlier version of this site used a system developed by one of the &lt;a href=&#34;https://marco.org&#34;&gt;podcast&amp;rsquo;s hosts&lt;/a&gt; (and inspired its look and feel), I was looking forward to the episode.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Latest news on Spotlight Knowledge Events</title>
      <link>https://darthnull.org/spotlight-update-15.4.1/</link>
      <pubDate>Fri, 18 Apr 2025 10:02:50 -0400</pubDate>
      <guid>https://darthnull.org/spotlight-update-15.4.1/</guid>
      <description>&lt;p&gt;This is a quick update. Yes. I know I say that a lot (or at least, I certainly &lt;em&gt;think&lt;/em&gt; it when I start a post). This one really will be quick.&lt;/p&gt;&#xA;&lt;p&gt;First, background. My main computer, a 2018 Intel Mac Mini, has been having its internal drive fill up. Regularly. To the point that apps crash without warning overnight, backups fail, Mail stops working, etc. In February, &lt;a href=&#34;https://darthnull.org/disk-space-woes&#34;&gt;I traced the main source of the problem&lt;/a&gt; to a folder called SpotlightKnowledgeEvents (I&amp;rsquo;m just gonna say SKE most of the time.) At the time, this folder had over 37 gigabytes of data in it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Word Salad - Slicing and Dicing with awk and sort</title>
      <link>https://darthnull.org/slice-n-dice/</link>
      <pubDate>Fri, 11 Apr 2025 09:39:45 -0400</pubDate>
      <guid>https://darthnull.org/slice-n-dice/</guid>
      <description>&lt;p&gt;A few days ago, as I write this, &lt;a href=&#34;https://mastodon.social/@verso&#34;&gt;Kelly Guimont&lt;/a&gt; posted the &lt;a href=&#34;https://mastodon.social/@Verso/114310262350085295&#34;&gt;following question&lt;/a&gt;:&lt;/p&gt;&#xA;&lt;div class=&#34;text-quote&#34;&gt;&lt;p&gt;Let&amp;rsquo;s say you have a data set made up of a selection of songs by one artist.&#xA;Let&amp;rsquo;s also say you want to slice and dice information from said dataset like how many songs come from each album, or average song length.&lt;/p&gt;&#xA;&lt;p&gt;As of now what I want to know is the easiest way to &amp;ldquo;ask&amp;rdquo; my data set for this information. Do I have to type everything in a spreadsheet and filter? Can I use this to learn a teeny bit of python or something?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Managing Sequoia Disk Space</title>
      <link>https://darthnull.org/sequoia-disk-space-way-forward/</link>
      <pubDate>Tue, 11 Mar 2025 18:02:00 -0400</pubDate>
      <guid>https://darthnull.org/sequoia-disk-space-way-forward/</guid>
      <description>&lt;p&gt;Disk Usage Woes: Day&amp;hellip;&lt;em&gt;&lt;strong&gt;whatever&lt;/strong&gt;&lt;/em&gt;. How long has it been since I installed macOS Sequoia?&lt;/p&gt;&#xA;&lt;p&gt;I&amp;rsquo;ve been struggling with the disk constantly filling up on my Mac Mini. See &lt;a href=&#34;https://darthnull.org/disk-space-woes/&#34;&gt;my last&lt;/a&gt; &lt;a href=&#34;https://darthnull.org/spotlight-update&#34;&gt;two posts&lt;/a&gt; for a deep and wonky dive into the situation, and lots of data collection to confirm my suspicions (or not).&lt;/p&gt;&#xA;&lt;p&gt;At this point, I&amp;rsquo;m still continuing to collect data, but it&amp;rsquo;s more in the realm of &amp;ldquo;just making more graphs for reference&amp;rdquo; than actually figuring anything out. I think the fix is pretty clear at this point: I need to delete extraneous data from time to time. I just now have a better idea where to find the best low-hanging fruit for deletion.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Update on Spotlight and Disk Space Woes</title>
      <link>https://darthnull.org/spotlight-update/</link>
      <pubDate>Thu, 27 Feb 2025 16:45:00 -0500</pubDate>
      <guid>https://darthnull.org/spotlight-update/</guid>
      <description>&lt;p&gt;My main day-to-day machine is a 2018 Mac Mini. Over the last year, and especially the last 6 months, it&amp;rsquo;s been a struggle to keep adequate space free. About two weeks ago, I&amp;rsquo;d had enough, and went on a deep dive to figure out what was wrong. In my &lt;a href=&#34;https://darthnull.org/disk-space-woes/&#34;&gt;last post&lt;/a&gt;, I described the journey I took to identify the likely problem.&lt;/p&gt;&#xA;&lt;p&gt;Simply identifying a &amp;ldquo;likely&amp;rdquo; culprit wasn&amp;rsquo;t enough, though. I needed to take a methodical approach to testing different settings and recording the results.&lt;/p&gt;</description>
    </item>
    <item>
      <title>macOS Sequoia Disk Space...Vanishing!</title>
      <link>https://darthnull.org/disk-space-woes/</link>
      <pubDate>Wed, 19 Feb 2025 17:36:38 -0500</pubDate>
      <guid>https://darthnull.org/disk-space-woes/</guid>
      <description>&lt;p&gt;My everyday desktop is a 2018 Mac Mini. Last summer, I started noticing that some apps would crash overnight, mostly Ivory (my Mastodon client).&lt;/p&gt;&#xA;&lt;p&gt;I assumed it was a memory thing. My disk space wasn&amp;rsquo;t great, but I had like 5 gigabytes or so free on the 256 gig drive, and wasn&amp;rsquo;t seeing any &amp;ldquo;your disk is full&amp;rdquo; errors. I wasn&amp;rsquo;t getting crazy &amp;ldquo;Your system is out of memory!&amp;rdquo; errors, either, but memory pressure seemed like a good explanation. I tried a few lazy tricks to get some data, try to collect logs, etc., but got nowhere.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Replacing my Synology DS1515&#43;</title>
      <link>https://darthnull.org/synology-upgrade/</link>
      <pubDate>Tue, 28 Jan 2025 17:25:00 -0500</pubDate>
      <guid>https://darthnull.org/synology-upgrade/</guid>
      <description>&lt;p&gt;Nine years ago, I migrated all my local house storage from a massive Dell with Debian and software RAID, onto a tiny little Synology NAS. Well, not exactly tiny, but probably 1/3 of the volume of the Dell. It serves as a file server, Time Machine target, and destination for various rsync and other low-level backup tasks from the rest of the network. At other times, it&amp;rsquo;s run a Plex server, the Channels DVR, and&amp;hellip;I honestly don&amp;rsquo;t remember what else I&amp;rsquo;ve experimented with here. It&amp;rsquo;s a pretty capable little box.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Update on August Ping Storms</title>
      <link>https://darthnull.org/noise-storm-update/</link>
      <pubDate>Tue, 01 Oct 2024 13:44:14 -0400</pubDate>
      <guid>https://darthnull.org/noise-storm-update/</guid>
      <description>&lt;p&gt;A few days ago, I &lt;a href=&#34;https://darthnull.org/noisestorms&#34;&gt;wrote about&lt;/a&gt; what GreyNoise have been calling &amp;ldquo;Noise Storms,&amp;rdquo; extended periods of high-volume ping traffic detected by many of their sensors, coming from&amp;hellip;many different sources. The most intriguing of these were packets with the word &amp;ldquo;LOVE&amp;rdquo; in plaintext in the ping payload, and in my post, I offered a possible explanation of that traffic. At least, at a technical level &amp;ndash; what they&amp;rsquo;re &lt;strong&gt;doing&lt;/strong&gt; with those packets, well, that&amp;rsquo;s a different puzzle.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ping Storms at GreyNoise</title>
      <link>https://darthnull.org/noisestorms/</link>
      <pubDate>Fri, 27 Sep 2024 09:22:42 -0400</pubDate>
      <guid>https://darthnull.org/noisestorms/</guid>
      <description>&lt;p&gt;Earlier this month, I attended BSidesNoVA in Arlington, where the keynote was presented by Andrew Morris of GreyNoise. Using sensors distributed all over the world, GreyNoise collects&amp;hellip;background noise&amp;hellip;on the Internet. Basically, they watch and monitor activity that hits lots of hosts randomly &amp;ndash; network mapping, port scanning, doorknob rattling. If you see someone trying to break into your SSH server, you can check GreyNoise to see if that person (well, their IP, anyway) has been seen doing such things in the past.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Funemployment, and Next Steps</title>
      <link>https://darthnull.org/gap-year/</link>
      <pubDate>Tue, 09 Jul 2024 19:16:26 -0400</pubDate>
      <guid>https://darthnull.org/gap-year/</guid>
      <description>&lt;p&gt;Back in 2018, I was fortunate enough to join a company called Expel. It had a great culture, friendly management with a real desire to do what&amp;rsquo;s right for customers and employees, and a product that seemed to fill a real need &amp;ndash; and to fill it well.&lt;/p&gt;&#xA;&lt;p&gt;Being remote friendly even in 2018, we were ready when the pandemic hit, and it seemed like we made it out the other side unscathed. But then we hit some snags, and in June 2023, I got laid off, along with 10% of my co-workers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Using an Adafruit NeoTrellis Keypad with MQTT</title>
      <link>https://darthnull.org/keypad-hardware/</link>
      <pubDate>Mon, 26 Apr 2021 10:45:00 -0400</pubDate>
      <guid>https://darthnull.org/keypad-hardware/</guid>
      <description>&lt;p&gt;I&amp;rsquo;ve been building a light-up keypad for home automation devices (and Zoom sessions). Last time, I gave an &#xA;&#xA;&lt;a href=&#34;https://darthnull.org/building-a-remote-keypad/&#34; title=&#34;Introduction to a series about a 16-key remote-control MQTT keypad&#34;&gt;overview of the project&lt;/a&gt;. This entry will detail the hardware itself, completing a basic remote-only setup, while the next post adds more advanced features and connects it to a server. You can browse the entire series from the link in the header, or by clicking &lt;a href=&#34;https://darthnull.org/series/remote-keypad&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Building a remote-control home automation keypad</title>
      <link>https://darthnull.org/building-a-remote-keypad/</link>
      <pubDate>Sun, 25 Apr 2021 16:20:00 -0400</pubDate>
      <guid>https://darthnull.org/building-a-remote-keypad/</guid>
      <description>&lt;p&gt;I use Zoom. A lot. Obviously, a whole lot more since we all started working from home. It&amp;rsquo;s not a big deal &amp;ndash; I&amp;rsquo;ve gotten pretty used to it, and it&amp;rsquo;s a good system. So much better than the PictureTel VTCs I occasionally used in the early 90&amp;rsquo;s.&lt;/p&gt;&#xA;&lt;p&gt;What&amp;rsquo;s annoying, though, is when someone asks a question and I&amp;rsquo;m on mute. Suddenly, there&amp;rsquo;s a scramble to figure out which monitor the mouse pointer is on&amp;hellip;jiggle&amp;hellip;jiggle&amp;hellip;JIGGLE! Oh, there it is. Now, where&amp;rsquo;s the window? Over &amp;ndash; no, wrong way. Over here. Hover. Up comes the control bar. Down to the left and click &amp;ndash; shoot, missed. Hover again. Okay, NOW mute is off.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Codenames Board Generator</title>
      <link>https://darthnull.org/codenames-board-generator/</link>
      <pubDate>Thu, 11 Mar 2021 10:35:50 -0500</pubDate>
      <guid>https://darthnull.org/codenames-board-generator/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://boardgamegeek.com/boardgame/178900/codenames&#34;&gt;Codenames&lt;/a&gt; is a word game where players try to collect all of their team&amp;rsquo;s cards from a board, by having their Spymaster give one-word hints which describe one or more cards on the table.  Which cards belong to which team is determined by a random draw of pre-printed game maps, showing which positions belong to Red, which to Blue, and which is the Assassin card (the black card &amp;ndash; revealing this ends the game for both teams).&lt;/p&gt;</description>
    </item>
    <item>
      <title>1Password - Full Trip from Unlock to Encryption</title>
      <link>https://darthnull.org/1pass-roundtrip/</link>
      <pubDate>Mon, 12 Nov 2018 16:20:00 -0500</pubDate>
      <guid>https://darthnull.org/1pass-roundtrip/</guid>
      <description>&lt;p&gt;It occurred to me sometime after I&amp;rsquo;d finished my talk that I should have a single post that pulls all the elements together. So here&amp;rsquo;s a complete walkthrough from Master Password all the way to decrypted Vault Item.&lt;/p&gt;&#xA;&lt;p&gt;&lt;em&gt;If you&amp;rsquo;ve missed the first parts of the series, here&amp;rsquo;s a good &lt;a href=&#34;https://darthnull.org/security/2018/11/09/inside-1password&#34;&gt;starting point&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;general-process&#34;&gt;General Process&lt;/h2&gt;&#xA;&lt;p&gt;First, let&amp;rsquo;s review the overall sequence of events. It&amp;rsquo;s a little complicated at the beginning, depending on which client we&amp;rsquo;re using.&lt;/p&gt;</description>
    </item>
    <item>
      <title>BSidesDE - A deep dive into 1Password Security</title>
      <link>https://darthnull.org/1pass-bsidesde/</link>
      <pubDate>Fri, 09 Nov 2018 07:10:00 -0500</pubDate>
      <guid>https://darthnull.org/1pass-bsidesde/</guid>
      <description>&lt;p&gt;Thanks to BSides Delaware for the chance to go super-geeky about how 1Password works. Here are the slides from my talk, which give a basic introduction to how it all works. See &lt;a href=&#34;https://darthnull.org/series/1password&#34;&gt;this extended series&lt;/a&gt; for super-detailed technical information and examples.&lt;/p&gt;&#xA;&lt;p&gt;Click on the link above to download a copy of the slides.&lt;/p&gt;</description>
    </item>
    <item>
      <title>1Password - Wrapping up with a few quick topics</title>
      <link>https://darthnull.org/1pass-misc/</link>
      <pubDate>Fri, 09 Nov 2018 07:05:00 -0500</pubDate>
      <guid>https://darthnull.org/1pass-misc/</guid>
      <description>&lt;p&gt;Thanks for reading! I hope you&amp;rsquo;ve enjoyed this &lt;a href=&#34;https://darthnull.org/security/2018/11/09/inside-1password&#34;&gt;deep dive&lt;/a&gt; into how 1Password works.&lt;/p&gt;&#xA;&lt;p&gt;We&amp;rsquo;ve covered a lot:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Why I even went down this path&lt;/li&gt;&#xA;&lt;li&gt;Unlocking macOS clients and the 2SKD process&lt;/li&gt;&#xA;&lt;li&gt;Unlocking Windows clients&lt;/li&gt;&#xA;&lt;li&gt;Decrypting data in the cloud-based vault system&lt;/li&gt;&#xA;&lt;li&gt;Unlocking and decrypting local vaults&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;But there&amp;rsquo;s actually quite a bit I haven&amp;rsquo;t touched upon.&lt;/p&gt;&#xA;&lt;h2 id=&#34;password-strength&#34;&gt;Password Strength&lt;/h2&gt;&#xA;&lt;p&gt;One thing I totally skipped over was the strength of the master password. There are actually several different password derivation steps in use by 1Password, all using PBKDF2:&lt;/p&gt;</description>
    </item>
    <item>
      <title>1Password - Local Vaults</title>
      <link>https://darthnull.org/1pass-local-vaults/</link>
      <pubDate>Fri, 09 Nov 2018 07:04:00 -0500</pubDate>
      <guid>https://darthnull.org/1pass-local-vaults/</guid>
      <description>&lt;p&gt;To conclude (for now) this extensive look at 1Password, we&amp;rsquo;ll go back a little to see how local private vaults work. Initially, local vaults were all you had (though they could be synced over Dropbox and other methods). These are &lt;a href=&#34;https://support.1password.com/opvault-design/&#34;&gt;documented separately&lt;/a&gt; from the cloud based &amp;ldquo;Teams&amp;rdquo; system. Now, local vaults are basically being discouraged in favor of the cloud system.&lt;/p&gt;&#xA;&lt;p&gt;But you can still have a mix of local and loud vaults. So it&amp;rsquo;s worth seeing how those affect the way data is stored in 1Password.&lt;/p&gt;</description>
    </item>
    <item>
      <title>1Password - Into the Vaults!</title>
      <link>https://darthnull.org/1pass-vaults/</link>
      <pubDate>Fri, 09 Nov 2018 07:03:00 -0500</pubDate>
      <guid>https://darthnull.org/1pass-vaults/</guid>
      <description>&lt;p&gt;We&amp;rsquo;re back with part three of a close look at how 1Password works. So far we&amp;rsquo;ve seen how the Two-Secret Key Derivation (2SKD) process is used to &lt;a href=&#34;https://darthnull.org/security/2018/11/09/1pass-muking-about/&#34;&gt;unlock macOS clients&lt;/a&gt;, and how the Encrypted Master Key (EMK) &lt;a href=&#34;https://darthnull.org/security/2018/11/09/1pass-emk/&#34;&gt;does the same under Windows&lt;/a&gt;. In both cases, we end up with a decrypted master key, the &amp;ldquo;sym key&amp;rdquo; in the account&amp;rsquo;s first keyset. As I&amp;rsquo;ve said in both prior segments, this key then lets us descend into the vault and decrypt everything else.&lt;/p&gt;</description>
    </item>
    <item>
      <title>1Password - Unlocking Windows Clients</title>
      <link>https://darthnull.org/1pass-emk/</link>
      <pubDate>Fri, 09 Nov 2018 07:02:00 -0500</pubDate>
      <guid>https://darthnull.org/1pass-emk/</guid>
      <description>&lt;p&gt;&lt;em&gt;I’m taking a detailed look at how 1Password works, originally to help examine potential risks when used in a corporate environment, and eventually because I’m just a nerd and love All Things Crypto. (See this page for an introduction and background).&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://darthnull.org/security/2018/11/09/1pass-muking-about/&#34;&gt;Last time&lt;/a&gt;, I explained how the 1Password Two-Secret Key Derivation Process (2SKD) works. Briefly, it takes your email address, master password, and secret key, along with a couple other parameters, and derives a strong Master Unlock Key or MUK.&lt;/p&gt;</description>
    </item>
    <item>
      <title>1Password - MUKing about on the Mac</title>
      <link>https://darthnull.org/1pass-muking-about/</link>
      <pubDate>Fri, 09 Nov 2018 07:01:00 -0500</pubDate>
      <guid>https://darthnull.org/1pass-muking-about/</guid>
      <description>&lt;p&gt;&lt;em&gt;I&amp;rsquo;m taking a detailed look at how 1Password works, originally to help examine potential risks when used in a corporate environment, and eventually because I&amp;rsquo;m just a nerd and love All Things Crypto. (See &lt;a href=&#34;https://darthnull.org/security/2018/11/09/inside-1password/&#34;&gt;this page&lt;/a&gt; for an introduction and background).&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;We&amp;rsquo;ll start out by looking into how you unlock the client on macOS.&lt;/p&gt;&#xA;&lt;h2 id=&#34;introduction----using-1password-on-macos&#34;&gt;Introduction &amp;ndash; Using 1Password on macOS&lt;/h2&gt;&#xA;&lt;p&gt;Let&amp;rsquo;s say you&amp;rsquo;ve been a long-time 1Password user. You have a couple of local vaults that sync over Dropbox between your Mac and iPhone. Then you open a Family account, and share a few vaults with your spouse. And then you join a company that uses 1Password internally, and now you&amp;rsquo;ve suddenly got three accounts &amp;ndash; local, family, and work.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How 1Password Works - Getting under the hood</title>
      <link>https://darthnull.org/inside-1password/</link>
      <pubDate>Fri, 09 Nov 2018 07:00:00 -0500</pubDate>
      <guid>https://darthnull.org/inside-1password/</guid>
      <description>&lt;p&gt;Earlier this year, I embarked on a deep dive into how 1Password works. In particular, I wanted to understand what could happen if an attacker managed to collect a user&amp;rsquo;s Master Password &amp;ndash; how hard would it then be to get all their passwords?&lt;/p&gt;&#xA;&lt;p&gt;As part of this quest, I&amp;rsquo;ve explored the 1Password vault structure, read their security white papers, asked for help from engineers in their support forum, and written multiple tools to Read All The Passwords.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Encrypting for Apple&#39;s Secure Enclave</title>
      <link>https://darthnull.org/secure-enclave-ecies/</link>
      <pubDate>Thu, 31 May 2018 08:30:00 -0400</pubDate>
      <guid>https://darthnull.org/secure-enclave-ecies/</guid>
      <description>&lt;p&gt;Encryption, once you have a safe and well-implemented algorithm, is all about the keys. Lose control of your keys, and it’s “Game over, man!” What if we could put our keys somewhere completely out of reach, where even their owner can’t get to them? Yibikeys and HSMs can provide that security, but they&amp;rsquo;re external devices. However, recent iOS devices and MacBook Pros have something just as good: the Secure Enclave (SE).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Infosec Conference Badge Display</title>
      <link>https://darthnull.org/con-badge-display/</link>
      <pubDate>Tue, 17 Oct 2017 12:17:00 -0400</pubDate>
      <guid>https://darthnull.org/con-badge-display/</guid>
      <description>&lt;p&gt;My first infosec con was the first ShmooCon, in 2005. Then I went to Black Hat and DEFCON. Then ShmooCon again. Then Vegas again. And before long, I had a whole lot of badges cluttering up drawers.&lt;/p&gt;&#xA;&lt;figure class=&#34;small right&#34;&gt;&#xA;  &lt;a href=&#34;https://darthnull.org/media/2017/10/unsafe-display.jpg&#34;&gt;&lt;img src=&#34;https://darthnull.org/media/2017/10/unsafe-display.jpg&#34; title=&#34;&#34;&gt;&lt;/a&gt;&#xA;  &lt;figcaption&gt;&lt;p&gt;Probably a code violation. (Circuit breakers are behind these doors).&lt;/p&gt;&lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;    &#xA;&#xA;&lt;p&gt;In 2010 I won, as part of the ShmooCon crypto contest, a stuffed moose head for the wall (&amp;ldquo;But not a real moose head, that&amp;rsquo;s cruel 🎶&amp;rdquo;). So I started hanging the badges from that, and it followed me from office to office for a while. By the time I moved into a home office, I had far too many badges to hang from the moose and so I moved them to nails on top of my circuit breaker doors. Which is probably a violation of several building and safety codes. So back in May of 2014, I decided to correct the situation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Technology Sucks</title>
      <link>https://darthnull.org/technology-sucks/</link>
      <pubDate>Tue, 12 Sep 2017 07:15:00 -0400</pubDate>
      <guid>https://darthnull.org/technology-sucks/</guid>
      <description>&lt;p&gt;Technology today is flat-out amazing. When I was a kid, walking uphill through the snow to get to school, cordless phones were massive (and amplitude modulated near the broadcast band), and video recorders had wired remotes. If you could quantify it, I&amp;rsquo;d venture that today&amp;rsquo;s capabilities are 3 or 4 orders of magnitude above what we had 30 years ago.&lt;/p&gt;&#xA;&lt;p&gt;And at some point, almost without exception, I&amp;rsquo;ve hated every piece of technology I own.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Eclipse.</title>
      <link>https://darthnull.org/total-eclipse-2017/</link>
      <pubDate>Thu, 24 Aug 2017 23:02:00 -0400</pubDate>
      <guid>https://darthnull.org/total-eclipse-2017/</guid>
      <description>&lt;p&gt;Scene: February, 1979. My fifth grade classroom. A large-for-the-time 17&amp;quot; or so black-and-white TV (the kind with a faint greenish tinge) sits on a cart. Everyone watching a total solar eclipse happening live in the Pacific Northwest. I don&amp;rsquo;t remember the mood in the room, but I suspect it was a mix of breathless, half-bored, and &amp;ldquo;meh.&amp;rdquo; I do remember, very clearly, learning that the next one was in 2017 and thinking how far away that seemed. And yet, resolving to see it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iPhone Secure Enclave Firmware Key Found</title>
      <link>https://darthnull.org/sep-firmware-key/</link>
      <pubDate>Thu, 17 Aug 2017 23:20:00 -0400</pubDate>
      <guid>https://darthnull.org/sep-firmware-key/</guid>
      <description>&lt;p&gt;Earlier today, it was reported that a hacker/researcher called &amp;ldquo;xerub&amp;rdquo; had released the encryption key, and tools to use it, for the firmware that runs the Secure Enclave Processor (SEP) on iPhone 5S. Reporting was&amp;hellip;breathless. Stories suggested that this move was &amp;ldquo;destroying key piece of iOS mobile security,&amp;rdquo; and that we should &amp;ldquo;be on the lookout for Touch ID hacks&amp;rdquo; and &amp;ldquo;password harvesting scams.&amp;rdquo;&lt;/p&gt;&#xA;&lt;p&gt;Is it really that bad? No, not really.&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Website Engine</title>
      <link>https://darthnull.org/new-website-engine/</link>
      <pubDate>Mon, 07 Aug 2017 21:16:00 -0400</pubDate>
      <guid>https://darthnull.org/new-website-engine/</guid>
      <description>&lt;p&gt;A few years back, I moved from a fairly generic Wordpress-based blog to a statically-generated system based on &lt;a href=&#34;https://github.com/marcoarment/secondcrack&#34;&gt;secondcrack&lt;/a&gt;. It was a fairly simple system, that I immediately hacked up to add different post types, lists, and other taxonomy-like things. And I pretty much stole the look and feel of the &lt;a href=&#34;https://marco.org&#34;&gt;primary site secondcrack was built for&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;It worked out pretty well, overall, but I did notice at times that it was a little &lt;em&gt;too&lt;/em&gt; bare-bones. Especially difficult was navigating past a really long post at the top of the page, to get to something shorter and totally different buried beneath it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>New Standing Desk</title>
      <link>https://darthnull.org/new-standing-desk/</link>
      <pubDate>Thu, 03 Aug 2017 14:17:00 -0400</pubDate>
      <guid>https://darthnull.org/new-standing-desk/</guid>
      <description>&lt;p&gt;A few months ago, I set up my computer on a counter-level table in the home theater for a few days, to see what I thought of the idea of a standing desk. I liked it, but definitely didn&amp;rsquo;t want to be standing all the time. I needed something adjustable.&lt;/p&gt;&#xA;&lt;p&gt;Then a couple months later, The Wirecutter posted a &lt;a href=&#34;http://thewirecutter.com/reviews/best-standing-desk/&#34;&gt;review of standing desks&lt;/a&gt;, and their top pick was the Fully Jarvis Bamboo desk. Unfortunately, that was a little too small for the large collection (2 monitors plus the laptop screen, plus various other stuff) I had on my IKEA Gallant corner desk. However, they sell an L-shaped version, the Jarvis J3. And it&amp;rsquo;s available as just the frame, so I can even keep my desktop.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2017 Badge (and more) Contest - Solutions </title>
      <link>https://darthnull.org/shmoocon-2017-solutions/</link>
      <pubDate>Fri, 20 Jan 2017 10:24:36 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-2017-solutions/</guid>
      <description>&lt;h1 id=&#34;shall-we-play-a-game&#34;&gt;Shall We Play A Game?&lt;/h1&gt;&#xA;&lt;p&gt;It&amp;rsquo;s been a long time since I did a big puzzle solution post, and even longer since I played a crypto contest at ShmooCon. That&amp;rsquo;s about to change. :)&lt;/p&gt;&#xA;&lt;p&gt;After winning three years in a row, and running the ShmooCon contest for four years after that, I finally stepped away from the fray in 2016. But I did help out a little, commenting on the puzzles they were putting together and generally offering advice. This year, though, about 2 weeks before ShmooCon started, it dawned on me: I haven&amp;rsquo;t heard a single thing about the contest. I CAN PLAY!&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2017 Badge (and more) Contest - Challenges</title>
      <link>https://darthnull.org/shmoocon-2017-challenges/</link>
      <pubDate>Fri, 20 Jan 2017 10:16:21 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-2017-challenges/</guid>
      <description>&lt;h2 id=&#34;belay-it&#34;&gt;Belay It&lt;/h2&gt;&#xA;&lt;h3 id=&#34;1-total-control&#34;&gt;1: Total Control&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;Look Around&#xA;&#xA;* pictures on con signs outside rooms *&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://darthnull.org/media/2017/01/belay-1_1.jpg&#34; alt=&#34;Sign&#34;&gt;&#xA;&lt;img src=&#34;https://darthnull.org/media/2017/01/belay-1_2.jpg&#34; alt=&#34;Sign&#34;&gt;&#xA;&lt;img src=&#34;https://darthnull.org/media/2017/01/belay-1_3.jpg&#34; alt=&#34;Sign&#34;&gt;&#xA;&lt;img src=&#34;https://darthnull.org/media/2017/01/belay-1_4.jpg&#34; alt=&#34;Sign&#34;&gt;&#xA;&lt;img src=&#34;https://darthnull.org/media/2017/01/belay-1_5.jpg&#34; alt=&#34;Sign&#34;&gt;&#xA;&lt;img src=&#34;https://darthnull.org/media/2017/01/belay-1_6.jpg&#34; alt=&#34;Sign&#34;&gt;&lt;/p&gt;&#xA;&lt;h3 id=&#34;2-pseudo-random&#34;&gt;2: Pseudo-random&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;/oneyamasoon&#xA;&#xA;go to /oneymasoon, see text &amp;quot;Setec Astronomy&amp;quot;.&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;3-stonecutter&#34;&gt;3: Stonecutter&lt;/h3&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://darthnull.org/media/2017/01/belay-3_stonecutter.png&#34; alt=&#34;Code&#34;&gt;&lt;/p&gt;&#xA;&lt;h3 id=&#34;4-scrapple&#34;&gt;4: Scrapple&lt;/h3&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://darthnull.org/media/2017/01/belay-4_scrapple.png&#34; alt=&#34;Code&#34;&gt;&lt;/p&gt;&#xA;&lt;h3 id=&#34;5-who-you-gonna-call&#34;&gt;5: Who you gonna call?&lt;/h3&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://darthnull.org/media/2017/01/belay-5_whoyougonnacall.mp3&#34;&gt;whoyougonnacall.mp3&lt;/a&gt;&lt;/p&gt;&#xA;&lt;h3 id=&#34;6-boring-compound&#34;&gt;6: Boring Compound&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;114.81832.065231.03588140.11610215.9994&#xA;20.179740.07814.00674.00260239.948&#xA;88.9058515.9994238.028911.0079422739.0983&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;7-data-points&#34;&gt;7: (Data, Points)&lt;/h3&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://darthnull.org/media/2017/01/belay-7_1A.jpg&#34; alt=&#34;Chess&#34;&gt; &lt;img src=&#34;https://darthnull.org/media/2017/01/belay-7_1B.jpg&#34; alt=&#34;Chess&#34;&gt; &lt;img src=&#34;https://darthnull.org/media/2017/01/belay-7_1C.jpg&#34; alt=&#34;Chess&#34;&gt; &lt;img src=&#34;https://darthnull.org/media/2017/01/belay-7_2A.jpg&#34; alt=&#34;Chess&#34;&gt; &lt;img src=&#34;https://darthnull.org/media/2017/01/belay-7_2B.jpg&#34; alt=&#34;Chess&#34;&gt;&#xA;&lt;img src=&#34;https://darthnull.org/media/2017/01/belay-7_2C.jpg&#34; alt=&#34;Chess&#34;&gt; &lt;img src=&#34;https://darthnull.org/media/2017/01/belay-7_3A.jpg&#34; alt=&#34;Chess&#34;&gt; &lt;img src=&#34;https://darthnull.org/media/2017/01/belay-7_3B.jpg&#34; alt=&#34;Chess&#34;&gt; &lt;img src=&#34;https://darthnull.org/media/2017/01/belay-7_3C.jpg&#34; alt=&#34;Chess&#34;&gt;&lt;/p&gt;&#xA;&lt;h3 id=&#34;8-screentest&#34;&gt;8: Screentest&lt;/h3&gt;&#xA;&lt;p&gt;(link to &amp;ldquo;loom&amp;rdquo;, which presented this ASCII image:)&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;  /--------------------------------------------------------------------------------&#xA; / ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░&#xA;/  ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░&#xA;|  00000000000000000000000000000000000000000000000000000000000000000000000000000000&#xA;|  11111111111111111111111111111111111111111111111111111111111111111111111111111111&#xA;|  22222222222222222222222222222222222222222222222222222222222222222222222222222222&#xA;|  33333333333333333333333333333333333333333333333333333333333333333333333333333333&#xA;|  44444444444444444444444444444444444444444444444444444444444444444444444444444444&#xA;|  55555555555555555555555555555555555555555555555555555555555555555555555555555555&#xA;|  66666666666666666666666666666666666666666666666666666666666666666666666666666666&#xA;|  77777777777777777777777777777777777777777777777777777777777777777777777777777777&#xA;|  88888888888888888888888888888888888888888888888888888888888888888888888888888888&#xA;|  99999999999999999999999999999999999999999999999999999999999999999999999999999999&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;Also relevant was the result from solving #7:&lt;/p&gt;</description>
    </item>
    <item>
      <title>BSidesROC - A (not so quick) Primer on iOS Encryption</title>
      <link>https://darthnull.org/bsidesroc-ios/</link>
      <pubDate>Sat, 23 Apr 2016 01:35:10 -0400</pubDate>
      <guid>https://darthnull.org/bsidesroc-ios/</guid>
      <description>&lt;p&gt;Thanks so much to BSides Rochester for giving me a chance to talk about iOS encryption. I was happy to see such a good audience with plenty of very good questions. We discussed how the overall iOS encryption system works, how passcodes are used to secure it, and what attacks, limitations, and weaknesses still remain.&lt;/p&gt;&#xA;&lt;p&gt;Click &lt;a href=&#34;https://darthnull.org/media/presentations/2016-BSidesROC-iOSCrypto.pdf&#34;&gt;here&lt;/a&gt; or on the post title to download a copy of the slides.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Poem Codes - WWII Crypto Techniques</title>
      <link>https://darthnull.org/poem-codes/</link>
      <pubDate>Sun, 27 Mar 2016 09:41:02 -0400</pubDate>
      <guid>https://darthnull.org/poem-codes/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;A few years back, after I won my first crypto contest, the contest author, G. Mark Hardy, suggested I read &lt;em&gt;Between Silk and Cyanide&lt;/em&gt;.  Written by Leo Marks, it&amp;rsquo;s a first-person account of the difficulties managing cryptographic communications with field agents in Europe during World War II.&lt;/p&gt;&#xA;&lt;p&gt;Much of the story centered on the &amp;ldquo;poem codes&amp;rdquo; used by the agents, but the technical details were kind of obscure and not clearly explained. So I thought I&amp;rsquo;d do my best to document how I think it worked. This probably isn&amp;rsquo;t the exact method they used, but hopefully it&amp;rsquo;ll be close enough that you can get the general idea, and understand some of the difficulties these agents faced.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Put away the tin-foil: The Apple unlock case is complicated enough</title>
      <link>https://darthnull.org/apple-backdoor/</link>
      <pubDate>Fri, 19 Feb 2016 09:10:20 -0500</pubDate>
      <guid>https://darthnull.org/apple-backdoor/</guid>
      <description>&lt;p&gt;Apple and the FBI are fighting. The {twitter, blog, media}-&amp;lsquo;verses have exploded. And FUD, confusion, and conspiracy theories have been given free reign.&lt;/p&gt;&#xA;&lt;p&gt;Rather than going into deep technical detail, or pontificating over the moral, legal, and ethical issues at hand, I thought it may be useful to discuss some of the more persistent misinformation and misunderstandings I&amp;rsquo;ve seen over the last few days.&lt;/p&gt;&#xA;&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;On February 16, 2016, Apple posted &lt;a href=&#34;https://www.apple.com/customer-letter&#34;&gt;A Message to Our Customers&lt;/a&gt;, a public response to a recent court order, in which the FBI demands that Apple take steps to help them break the passcode on an iPhone 5C used by one of the terrorists in the San Bernardino shooting last year.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Mobile App Authentication using TouchID and Tidas</title>
      <link>https://darthnull.org/tidas-auth/</link>
      <pubDate>Wed, 10 Feb 2016 10:50:19 -0500</pubDate>
      <guid>https://darthnull.org/tidas-auth/</guid>
      <description>&lt;p&gt;Yesterday, the information security company Trail of Bits &lt;a href=&#34;http://blog.trailofbits.com/2016/02/09/tidas-a-new-service-for-building-password-less-apps/&#34;&gt;announced a new service, called Tidas&lt;/a&gt;. The service is intended to make it easy for developers to include a password-free authentication experience in mobile apps on the iOS platform. They&amp;rsquo;ve provided some sample code and a &lt;a href=&#34;https://github.com/tidas/tidas-docs/blob/master/developer-guide-faq.md&#34;&gt;developer Guide / FAQ&lt;/a&gt;, and I&amp;rsquo;ve spent some time looking at it to try and understand how it works. Here are my first impressions.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;NOTE&lt;/strong&gt;: &lt;em&gt;I haven&amp;rsquo;t actually looked at the full protocol running &amp;ldquo;in the wild&amp;rdquo; yet, so it&amp;rsquo;s quite possible I haven&amp;rsquo;t fully grokked the system. Take this with a grain of salt. I&amp;rsquo;ll try to update any egregious misunderstandings, as I become aware of them.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Blizzard of 2016 Time-lapse</title>
      <link>https://darthnull.org/blizzard-of-2016/</link>
      <pubDate>Fri, 22 Jan 2016 02:30:45 -0500</pubDate>
      <guid>https://darthnull.org/blizzard-of-2016/</guid>
      <description>&lt;p&gt;For the last several years, we&amp;rsquo;ve tried to keep a big &amp;ldquo;snow stick&amp;rdquo; out on our deck to capture images of big snowfalls. In particular, the winter of 2009-2010 was exceptional for this, with no fewer than 3 very large storms in our area (including the crazy storm which happened at ShmooCon 2010). That storm dumped nearly 30&amp;quot; over two days at Dulles Airport, just a few miles away from our house.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon - My Hash Is My Passport: Understanding Web and Mobile Authentication</title>
      <link>https://darthnull.org/hashpassport/</link>
      <pubDate>Sun, 17 Jan 2016 01:04:42 -0500</pubDate>
      <guid>https://darthnull.org/hashpassport/</guid>
      <description>&lt;p&gt;I just finished presenting this at ShmooCon, and wanted to get the slides out quickly before it got shoved aside by the next crisis. :) I&amp;rsquo;ll replace this with a blog entry that&amp;rsquo;s actually useful later.&lt;/p&gt;&#xA;&lt;p&gt;The short version is this:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;I do a lot of application testing, for web and iOS / mobile apps&lt;/li&gt;&#xA;&lt;li&gt;Many (most?) of those apps rely on some kind of authentcation to a back-end server&lt;/li&gt;&#xA;&lt;li&gt;How that authentication is handled seems to be generally restricted to a handful of systems&lt;/li&gt;&#xA;&lt;li&gt;It seemed to me that being able to understand how those systems work is important to being able to fully test such applications&lt;/li&gt;&#xA;&lt;li&gt;So this talk explains how the systems work, what&amp;rsquo;s good, and bad, and why&lt;/li&gt;&#xA;&lt;li&gt;There&amp;rsquo;s also a whitepaper (in final draft) that goes into even more detail and has extensive references. I&amp;rsquo;ll post that here as well when it&amp;rsquo;s released.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Here&amp;rsquo;s the abstract from the conference, which says all I just said but in fancier words:&lt;/p&gt;</description>
    </item>
    <item>
      <title>DLP Considered Harmful - A Rant about Reliable Certificate Pinning</title>
      <link>https://darthnull.org/dlp-harmful/</link>
      <pubDate>Tue, 24 Nov 2015 12:34:33 -0500</pubDate>
      <guid>https://darthnull.org/dlp-harmful/</guid>
      <description>&lt;p&gt;[&lt;em&gt;Note&lt;/em&gt;: Yes, I understand the point of DLP. Yes, I&amp;rsquo;m being unrealistically idealistic. I still think this is wrong, and that we do ourselves a disservice to pretend otherwise.]&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-latest-craziness&#34;&gt;The Latest Craziness&lt;/h2&gt;&#xA;&lt;p&gt;It is &lt;a href=&#34;https://darthnull.org/2015/02/20/trust-issues&#34;&gt;happening&lt;/a&gt; &lt;a href=&#34;http://arstechnica.com/security/2015/11/dell-does-superfish-ships-pcs-with-self-signed-root-certificates/&#34;&gt;again&lt;/a&gt;.  A major computer manufacturer (this time, Dell, instead of Lenovo) shipped with a trusted root TLS CA certificate installed on the operating system. Again, the private key was included with the certificate. So now, anyone who wants to perform a man-in-the-middle attack against users of those devices can easily do so.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Thoughts on CyberUL and Infosec Research</title>
      <link>https://darthnull.org/cyberul-research/</link>
      <pubDate>Wed, 29 Jul 2015 11:05:14 -0400</pubDate>
      <guid>https://darthnull.org/cyberul-research/</guid>
      <description>&lt;p&gt;For the past year or so, I&amp;rsquo;ve been thinking about the information security research space. Certainly, with the mega-proliferation of security conferences, research is Getting Done. But is it the right kind of research? And is it of the right quality?&lt;/p&gt;&#xA;&lt;p&gt;This has recently become a hot topic, since .mudge tweeted on June 29:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Goodbye Google ATAP, it was a blast.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;The White House asked if I would kindly create a #CyberUL, so here goes!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Salt as a Service: Interesting approach to hashing passwords</title>
      <link>https://darthnull.org/blind-hash/</link>
      <pubDate>Tue, 21 Apr 2015 10:26:32 -0400</pubDate>
      <guid>https://darthnull.org/blind-hash/</guid>
      <description>&lt;p&gt;A new service was just announced at the RSA conference that takes an interesting approach to hashing passwords. Called &amp;ldquo;Blind Hashing,&amp;rdquo; from &lt;a href=&#34;https://taplink.co&#34;&gt;TapLink&lt;/a&gt;, the technology is fully buzzword-compliant, promising to &amp;ldquo;completely secure your passwords against offline attack.&amp;rdquo;  Pretty grandiose claims, but from I&amp;rsquo;ve been able to see in their patent so far, it seems like it has some promise. With a few caveats.&lt;/p&gt;&#xA;&lt;p&gt;Traditionally, passwords are hashed and stored in place. First we had the the Unix cyrpt() function, which, though it was specifically designed to be &amp;ldquo;slow&amp;rdquo; on systems at the time, is now hopelessly outdated and should be killed with fire at every opportunity. That gave way to unsalted MD5-based hashes (also a candidate for immediate incendiary measures), salted SHA hashes, and today&amp;rsquo;s state of the art functions bcrypt, scrypt, and PBKDF2. The common goal throughout this progression of algorithms has been to make the hashing function expensive, in either CPU time or memory requirements (or both), thus making a brute force attack to guess a user&amp;rsquo;s password prohibitive.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Nails in the Crypt - White Paper</title>
      <link>https://darthnull.org/rainbow-crypt-paper/</link>
      <pubDate>Fri, 06 Mar 2015 10:28:30 -0500</pubDate>
      <guid>https://darthnull.org/rainbow-crypt-paper/</guid>
      <description>&lt;p&gt;A bit of a hack I did in 2010, tweaking some rainbow table tools to work with old-school UNIX password hashes. Includes very rough code samples.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lenovo, CA Certs, and Trust</title>
      <link>https://darthnull.org/trust-issues/</link>
      <pubDate>Fri, 20 Feb 2015 03:27:05 -0500</pubDate>
      <guid>https://darthnull.org/trust-issues/</guid>
      <description>&lt;p&gt;It&amp;rsquo;s been a fun week for information security:&lt;/p&gt;&#xA;&lt;figure class=&#34;medium right&#34;&gt;&#xA;  &lt;a href=&#34;https://darthnull.org/media/2015/02/badweek.png&#34;&gt;&lt;img src=&#34;https://darthnull.org/media/2015/02/badweek.png&#34; title=&#34;&#34;&gt;&lt;/a&gt;&#xA;  &lt;figcaption&gt;&lt;p&gt;@yawnbox - A Bad Week&lt;/p&gt;&lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;    &#xA;&#xA;&lt;p&gt;Arguably one of the more interesting developments (aside from the SIM thing, which I&amp;rsquo;m not even going to touch) was the decision by Lenovo to pwn all of their customers with a TLS Man-In-The-Middle attack. The problem here was two-fold: That Lenovo was deliberately snooping on their customer&amp;rsquo;s traffic (even &amp;ldquo;benignly,&amp;rdquo; as I&amp;rsquo;m sure they&amp;rsquo;re claiming), and &lt;a href=&#34;http://www.csoonline.com/article/2886975/disaster-recovery/lenovo-says-superfish-problems-are-theoretical-but-that-simply-isnt-the-case.html&#34;&gt;that the method used was trivial to put to malicious use.&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon - Knock Knock: A Survey of iOS Authentication Methods</title>
      <link>https://darthnull.org/shmoocon-ios-auth/</link>
      <pubDate>Fri, 23 Jan 2015 08:45:55 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-ios-auth/</guid>
      <description>&lt;h3 id=&#34;introduction&#34;&gt;Introduction&lt;/h3&gt;&#xA;&lt;p&gt;Last Saturday, I gave a talk at ShmooCon detailing the results of a short survey of iOS applications, and the way they handled (and secured) network-based authentication. For a quick summary of my talk, read on. If you&amp;rsquo;d like to follow along with the slides, they can be &lt;a href=&#34;https://darthnull.org/media/presentations/KnockKnock-iOS-AuthSurvey_ShmooCon_2015.pdf&#34;&gt;downloaded here&lt;/a&gt;. If you&amp;rsquo;d like a very detailed white paper explaining everything I said in the talk and more, well, you&amp;rsquo;ll have to wait a little longer. But I&amp;rsquo;m working on it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>DerbyCon 2013 - Apple TV and Raspberry Pi Slides</title>
      <link>https://darthnull.org/appletv-derbycon/</link>
      <pubDate>Tue, 18 Nov 2014 12:30:43 -0500</pubDate>
      <guid>https://darthnull.org/appletv-derbycon/</guid>
      <description>&lt;p&gt;Slides from my DerbyCon 2013 talk about building a car media center on Raspberry Pi, and how to make that appear as a native application on Apple TV.&lt;/p&gt;&#xA;&lt;p&gt;Unfortunately, the method I outlined here was blocked days later by Apple. Current Apple TV development requires specific configuration profiles signed by Apple.&lt;/p&gt;&#xA;&lt;p&gt;See also the &lt;a href=&#34;https://github.com/dschuetz/rpi-atv&#34;&gt;Github&lt;/a&gt; for example code.&lt;/p&gt;&#xA;&lt;p&gt;Slides: &lt;a href=&#34;https://darthnull.org/media/presentations/atv-derbycon-2013.pdf&#34;&gt;Click here&lt;/a&gt;&#xA;Video: &lt;a href=&#34;https://www.youtube.com/watch?v=z5XCNwqNWsw&#34;&gt;Click here&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Bypassing the lockout delay on iOS devices</title>
      <link>https://darthnull.org/ios-lockout-bypass/</link>
      <pubDate>Tue, 18 Nov 2014 04:13:27 -0500</pubDate>
      <guid>https://darthnull.org/ios-lockout-bypass/</guid>
      <description>&lt;p&gt;Apple released iOS 8.1.1 yesterday, and with it, a small flurry of bugs were patched (including, predictably, most (all?) of the bugs used in the Pangu jailbreak). One bug fix in particular caught my eye:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Lock Screen&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Available for:  iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Impact:  An attacker in possession of a device may exceed the maximum number of failed passcode attempts&lt;/p&gt;</description>
    </item>
    <item>
      <title>Why I hate voting.</title>
      <link>https://darthnull.org/why-i-hate-voting/</link>
      <pubDate>Tue, 04 Nov 2014 08:49:00 -0500</pubDate>
      <guid>https://darthnull.org/why-i-hate-voting/</guid>
      <description>&lt;p&gt;I just voted, even though pundits and statisticians have proven fairly definitively that my particular vote won&amp;rsquo;t matter. My district has had a Republican congressman for 30 years and his hand-picked heir is likely to win, and I don&amp;rsquo;t live in one of the 6 states all the news organizations tell me will decide control of the Senate. I voted because it&amp;rsquo;s the right thing to do, and because if I don&amp;rsquo;t vote, I lose the moral right to complain about the idiots in power (and anyone who knows me knows I love to complain.)&lt;/p&gt;</description>
    </item>
    <item>
      <title>What&#39;s the deal with keyless entry car thefts?</title>
      <link>https://darthnull.org/keyless-car-thefts/</link>
      <pubDate>Tue, 28 Oct 2014 10:49:54 -0400</pubDate>
      <guid>https://darthnull.org/keyless-car-thefts/</guid>
      <description>&lt;p&gt;In June of 2013, a &lt;a href=&#34;https://www.youtube.com/watch?v=1f6ZqfZHalE&#34;&gt;few videos started circulating&lt;/a&gt; showing people unlocking cars without authorization. Basically, people walking directly up to a car and just opening it, or walking by cars on the street. One of the &lt;a href=&#34;https://www.youtube.com/watch?v=0wZNSA1Re3Q&#34;&gt;more interesting videos&lt;/a&gt; (watch at about 30 seconds in)  showed a thief walking along the street, grabbing a handle in passing, and stopping short when the car unlocked. (interestingly, all the videos I found this morning showed attackers reaching for the passenger side door, which may just be a coincidence&amp;hellip;)&lt;/p&gt;</description>
    </item>
    <item>
      <title>MCX - a lousy substitute for proven technology</title>
      <link>https://darthnull.org/mcx-fail/</link>
      <pubDate>Mon, 27 Oct 2014 11:00:02 -0400</pubDate>
      <guid>https://darthnull.org/mcx-fail/</guid>
      <description>&lt;p&gt;Lots of discussion the last few days about Rite Aid and CVS (and possibly other merchants) actually &lt;strong&gt;disabling&lt;/strong&gt; existing NFC point of sale functionality simply because they were suddenly getting used (by Apple Pay).&lt;/p&gt;&#xA;&lt;p&gt;NFC payments are nothing new &amp;ndash; Android has supported them for a couple years now (on select phones, though not without some complicated political shenanigans between manufacturers and carriers). Not a lot of places support such contactless payments, though I&amp;rsquo;ve certainly been seeing more and more POS terminals with NFC-looking logos lately. And I&amp;rsquo;ve seen a LOT of new POS terminals going in recently (at Panera and Target, in particular) which definitely support the upcoming EMV (&amp;ldquo;Chip and PIN&amp;rdquo;) cards, and I believe also support NFC.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iPhone SMS forwarding -- cool, but may be risky</title>
      <link>https://darthnull.org/sms-forwarding-risks/</link>
      <pubDate>Fri, 24 Oct 2014 06:02:46 -0400</pubDate>
      <guid>https://darthnull.org/sms-forwarding-risks/</guid>
      <description>&lt;p&gt;The recent release of iOS 8 brought with it several cool new features, especially some which more tightly integrate the iOS world with the OS X desktop world. Some of these are limited by physical proximity (like handing off email drafts among devices), while others are require being on the same local subnet (forwarding phone calls to the desktop).&lt;/p&gt;&#xA;&lt;p&gt;However, one feature apparently Just Works all the time, and that&amp;rsquo;s SMS message forwarding. If you have an iPhone, running iOS 8, then you can send and receive normal text messages (to your &amp;ldquo;Green bubble friends&amp;rdquo;) from your iPad or Yosemite desktop. Even if the phone is the next town over.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Rebutting FUD and privacy issues surrounding Yosemite Spotlight</title>
      <link>https://darthnull.org/spotlight-privacy/</link>
      <pubDate>Tue, 21 Oct 2014 09:37:22 -0400</pubDate>
      <guid>https://darthnull.org/spotlight-privacy/</guid>
      <description>&lt;p&gt;Recent reports (and a slew of tweets) have circulated about the new Spotlight search on OS X Yosemite. &lt;a href=&#34;http://www.imore.com/yosemite-ios-8-spotlight-and-privacy-what-you-need-know&#34;&gt;Rene Ritchie at iMore&lt;/a&gt; explains the concerns, facts, and back-and-forth of the situation pretty well.&lt;/p&gt;&#xA;&lt;p&gt;Especially damning was &lt;a href=&#34;http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/20/apples-mac-computers-can-automatically-collect-your-location-information/&#34;&gt;this lede&lt;/a&gt; from The Washington Post:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Apple has begun automatically collecting the locations of users and the queries they type when searching for files with the newest Mac operating system, a function that has provoked backlash for a company that portrays itself as a leader on privacy.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NoVA Hackers - iOS Cryptography Slides</title>
      <link>https://darthnull.org/nova-ios-slides/</link>
      <pubDate>Tue, 14 Oct 2014 09:40:04 -0400</pubDate>
      <guid>https://darthnull.org/nova-ios-slides/</guid>
      <description>&lt;p&gt;I&amp;rsquo;m lucky to live near a really good information security group, &lt;a href=&#34;http://novahackers.blogspot.com&#34;&gt;NoVA Hackers&lt;/a&gt;. We meet once a month, and usually have 6-10 speakers of all levels, speaking on just about anything they&amp;rsquo;d like.&lt;/p&gt;&#xA;&lt;p&gt;I thought this might be an audience who&amp;rsquo;d be interested in learning how the recent iOS security changes actually worked, and so threw together a quick talk based mostly on my &lt;a href=&#34;http://darthnull.org/2014/10/06/ios-encryption&#34;&gt;blog post&lt;/a&gt; of a week before.&lt;/p&gt;&#xA;&lt;p&gt;It was well received, and I had a lot of really good questions during and after the talk. One question I didn&amp;rsquo;t have the answer for at the time was:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Even more posts about iOS encryption</title>
      <link>https://darthnull.org/more-ios-encryption/</link>
      <pubDate>Wed, 08 Oct 2014 09:18:41 -0400</pubDate>
      <guid>https://darthnull.org/more-ios-encryption/</guid>
      <description>&lt;p&gt;The assertion recently made by Apple that &lt;a href=&#34;https://www.apple.com/privacy/government-information-requests/&#34;&gt;&amp;ldquo;it&amp;rsquo;s not technically feasible&amp;rdquo;&lt;/a&gt; to decrypt phones for law enforcement has really stirred up several pots.&lt;/p&gt;&#xA;&lt;p&gt;Many in law enforcement are upset that Apple is &amp;ldquo;unilaterally&amp;rdquo; removing a key tool in their investigations (whether that tool has ever been truly &amp;ldquo;key&amp;rdquo; is another debate). Some privacy experts hail it as a great step forward. Others say &amp;ldquo;it&amp;rsquo;s about time.&amp;rdquo; And still others debate whether it&amp;rsquo;s quite as absolute a change as Apple&amp;rsquo;s making it sound.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A (not so) quick primer on iOS encryption</title>
      <link>https://darthnull.org/ios-encryption/</link>
      <pubDate>Mon, 06 Oct 2014 10:57:51 -0400</pubDate>
      <guid>https://darthnull.org/ios-encryption/</guid>
      <description>&lt;p&gt;A few weeks ago, Apple published a message &lt;a href=&#34;https://www.apple.com/privacy/&#34;&gt;about Apple&amp;rsquo;s commitment to your privacy&lt;/a&gt;. In the section on Government Information Requests, Apple made the following somewhat startling statement:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;On devices running iOS 8, your personal data such as photos, messages (including attachments), email, contacts, call history, iTunes content, notes, and reminders is placed under the protection of your passcode. Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data. So it&amp;rsquo;s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Beacons being deployed in NYC phone booths</title>
      <link>https://darthnull.org/ibeacons-in-nyc/</link>
      <pubDate>Mon, 06 Oct 2014 01:17:48 -0400</pubDate>
      <guid>https://darthnull.org/ibeacons-in-nyc/</guid>
      <description>&lt;p&gt;A story hit the press this morning about a comapny installing Bluetooth beacons (in the iOS world, known as &amp;ldquo;iBeacons&amp;rdquo;) on phone booths in New York City. The fear is that these could be used to track users and send unwanted advertisments to their phones.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;http://www.forbes.com/sites/kashmirhill/2014/10/06/no-need-to-freak-out-about-beacons/&#34;&gt;This article on Forbes&lt;/a&gt; does a pretty good job of explaining the situation, far better than the lengthy blog post I tried to write this morning (one really long post from me in a day is probably more than enough).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Internet of SCADA, or, why does my HVAC blow?</title>
      <link>https://darthnull.org/diy-scada/</link>
      <pubDate>Fri, 05 Sep 2014 01:21:22 -0400</pubDate>
      <guid>https://darthnull.org/diy-scada/</guid>
      <description>&lt;p&gt;We live in a house that was new-built, so it&amp;rsquo;s got all the modern trimmings. It&amp;rsquo;s also got all the modern cut corners, including an air conditioning system (two, actually) that even 12 years later we&amp;rsquo;re still struggling with. It seems that every year or two something else goes wrong, especially with the combined cooling / heat pump unit that handles the upstairs.&lt;/p&gt;&#xA;&lt;p&gt;I&amp;rsquo;ve been thinking for a while that I should be able to build a temperature monitor to track how the system is running, to detect problems (loss of freon, etc.) early, and maybe even forestall costly repairs. Maybe. So I asked for some Arduino gear for Christmas, and earlier this summer, I finally started playing around with it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Praetorian Crypto Challenge</title>
      <link>https://darthnull.org/praetorian/</link>
      <pubDate>Mon, 25 Aug 2014 09:34:48 -0400</pubDate>
      <guid>https://darthnull.org/praetorian/</guid>
      <description>&lt;p&gt;Last Wednesday, the security company &lt;a href=&#34;http://www.praetorian.com&#34;&gt;Praetorian&lt;/a&gt; released a new set of &lt;a href=&#34;http://www.praetorian.com/challenges/crypto/index.html&#34;&gt;crypto challenges&lt;/a&gt; as a recruitment tool and fun challenge for the community.&lt;/p&gt;&#xA;&lt;p&gt;I sprinted through the first 5 (of 8) levels in less than 24 hours, then got totally stuck on Level 6 for over two days.  Finally, late Saturday night I managed the intuitive leap I was missing, and by early Sunday morning I&amp;rsquo;d finished level 6. Some hours later (after, you know, sleeping) I finished level 7, and level 8 fell in under 15 minutes, making me the first person to solve all 8 levels. (No prizes, but I enjoy the bragging rights, and, well, the pressure makes sure I actually &lt;em&gt;try&lt;/em&gt; to finish them all&amp;hellip;.) Congratulations also to @TheJEversmann for &amp;ldquo;coming in a close second.&amp;rdquo;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Stealing user events from foreground apps on Android</title>
      <link>https://darthnull.org/ui-inference-attacks/</link>
      <pubDate>Fri, 22 Aug 2014 10:14:11 -0400</pubDate>
      <guid>https://darthnull.org/ui-inference-attacks/</guid>
      <description>&lt;p&gt;This is a pretty scary attack, though I haven&amp;rsquo;t had the time to dig into the paper to see how widespread it may be (and my Android background probably isn&amp;rsquo;t deep enough to grasp all the implications). However, the demos are impressive.&lt;/p&gt;&#xA;&lt;p&gt;Briefly, the attackers load an unprivileged application, which requests network access and nothing more. That application then exploits weaknesses in the operating system to collect data on the state of the user interface, from which they are able to actually extract sensitive information.&lt;/p&gt;</description>
    </item>
    <item>
      <title>BSidesLV 2014 Badge Contest</title>
      <link>https://darthnull.org/bslv5-contest/</link>
      <pubDate>Sun, 10 Aug 2014 01:49:30 -0400</pubDate>
      <guid>https://darthnull.org/bslv5-contest/</guid>
      <description>&lt;figure class=&#34;&#34;&gt;&#xA;  &lt;a href=&#34;https://darthnull.org/media/2014/08/bslv5-badge.png&#34;&gt;&lt;img src=&#34;https://darthnull.org/media/2014/08/bslv5-badge.png&#34; title=&#34;&#34;&gt;&lt;/a&gt;&#xA;  &lt;figcaption&gt;&lt;p&gt;BSidesLV 2014 Badge&lt;/p&gt;&lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;    &#xA;&#xA;&lt;p&gt;I was in Las Vegas for another Security Summer Camp, and for the past 5 years a major part of that has been Security BSides, or BSidesLV. I checked in and only barely got a badge, as they had just run out (but while I was standing there looking sad, someone stepped up with an extra&amp;hellip;crisis averted!)&lt;/p&gt;&#xA;&lt;p&gt;It didn&amp;rsquo;t take long for me to notice a faint QR code on the back of the badge, but I didn&amp;rsquo;t bother to read where it led at this point. I hung out for a while, watched an interesting talk on PRNGs, and went back to my room at Black Hat to unwind after a long travel day.&lt;/p&gt;</description>
    </item>
    <item>
      <title>BSidesLV 2014 Badge Contest - Challenges</title>
      <link>https://darthnull.org/bslv5-challenges/</link>
      <pubDate>Sun, 10 Aug 2014 01:44:36 -0400</pubDate>
      <guid>https://darthnull.org/bslv5-challenges/</guid>
      <description>&lt;h2 id=&#34;crack-it&#34;&gt;Crack It&lt;/h2&gt;&#xA;&lt;h3 id=&#34;easy-peasy-10-points&#34;&gt;Easy Peasy (10 points)&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;MD5 7ea04a3b047bc6364839c2dd34eccbb7&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;such-admin-very-weak-20-points&#34;&gt;Such Admin, Very Weak (20 points)&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;admin:$6$DwjR36pA$QskuzZ/K.4gF.mFmP2At3/QOC5I061AScmWzoqtGsyuLoKVx1j4DMY6esuoKjWDBimes9Qy1x4nBC/MTdeOrV/:16287:0:99999:7:::&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;lame-man-30-points&#34;&gt;LAme MAN&amp;hellip;. (30 points)&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;LM F6853114CCD860A7823031F4926E4DEE&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;nyannyan-40-points&#34;&gt;NyanNyan! (40 points)&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;NTLM E6E813370ACB92129BDA449EE25E0FA4&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;dont-eat-that-50-points&#34;&gt;Don&amp;rsquo;t Eat That! (50 points)&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;Crack this admin&#39;s password:01c1fe5112f563e030f6aba0f51be085&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h2 id=&#34;decipher-it&#34;&gt;Decipher It&lt;/h2&gt;&#xA;&lt;h3 id=&#34;not-quite-julius-10-points&#34;&gt;Not Quite, Julius (10 points)&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;GSGHRRGUBUO&#xA;Clue: 0123456789....&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;wopr-with-cheese-20-points&#34;&gt;WOPR With Cheese (20 points)&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;Something seems to be off with the WOPR today. &#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;&lt;img src=&#34;http://darthnull.org/media/2014/08/wopr_time_remaining.png&#34; alt=&#34;WOPR Image&#34;&gt;&lt;/p&gt;&#xA;&lt;h3 id=&#34;knock-three-times-if-youre-there-30-points&#34;&gt;Knock Three Times If You&amp;rsquo;re There (30 points)&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;Uld0V1ExSkZTVlpXUkUwd1RWSlNSQT09&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;under-the-door-40-points&#34;&gt;Under The Door (40 points)&lt;/h3&gt;&#xA;&lt;pre&gt;&lt;code&gt;Discovered this hidden message under my door....&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;&lt;img src=&#34;http://darthnull.org/media/2014/08/bslv-enigma.jpg&#34; alt=&#34;Under the door&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>BSLV 2014 - Breaking PRNGs </title>
      <link>https://darthnull.org/bslv-twister/</link>
      <pubDate>Wed, 06 Aug 2014 12:11:58 -0400</pubDate>
      <guid>https://darthnull.org/bslv-twister/</guid>
      <description>&lt;p&gt;So I&amp;rsquo;m back in Las Vegas for another Hacker Summer Camp. After getting to&#xA;town, checking in at Mandaly, and getting to BSidesLV, I hung out for a while&#xA;and then decided I should check out a talk.&lt;/p&gt;&#xA;&lt;p&gt;I didn&amp;rsquo;t have too much time that I could spend here, as I had to get back to&#xA;BH for some volunteer duties, but I really was curious about the Mersenne&#xA;Twister talk by Moloch and Dan Petro.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Duo Security Bypasses PayPal 2FA for Mobile Apps</title>
      <link>https://darthnull.org/duo-paypal-bypass/</link>
      <pubDate>Wed, 25 Jun 2014 10:52:31 -0400</pubDate>
      <guid>https://darthnull.org/duo-paypal-bypass/</guid>
      <description>&lt;p&gt;A nice writeup and demonstration video from Duo Sec showing some problems with PayPal two-factor authentication.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;We developed a proof-of-concept exploit to leverage this lack of 2FA enforcement, interfacing with the PayPal API directly and effectively mimicking the PayPal mobile app as though it were accessing a non-2FA account. The exploit communicates with two separate PayPal API services — one to authenticate (only with primary credentials), and another to transfer money to a destination account.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Early look at iOS 8 configuration profile changes</title>
      <link>https://darthnull.org/beta-ios8-config/</link>
      <pubDate>Wed, 18 Jun 2014 09:59:58 -0400</pubDate>
      <guid>https://darthnull.org/beta-ios8-config/</guid>
      <description>&lt;blockquote&gt;&#xA;&lt;p&gt;It seems Apple has made the prerelease Configuration Profile Key Reference available to the public. This the technical documentation for much of the iOS and Mac enterprise management capabilities Apple makes available via MDM vendors, Configurator, etc. (The other main document, the MDM Protocol Reference, remains behind the developer site authentication wall.)&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Most of what we think of as &amp;ldquo;part of MDM&amp;rdquo; is really just the configuration settings that MDM can push out. This reference (expanded last year to include OS X) includes all the publicly known settings that can be configured via a profile. These profiles can then be installed on a device via USB, HTTP, or MDM.&lt;/p&gt;</description>
    </item>
    <item>
      <title>More Mobile Malware Melodrama</title>
      <link>https://darthnull.org/svpeng/</link>
      <pubDate>Tue, 17 Jun 2014 01:46:11 -0400</pubDate>
      <guid>https://darthnull.org/svpeng/</guid>
      <description>&lt;p&gt;A few days ago &lt;a href=&#34;http://darthnull.org/2014/06/10/ios-malware&#34;&gt;I commented on&lt;/a&gt; the iOS malware situation. One might sum it up as &amp;ldquo;fanboys smugly assert there is no iOS malware; anti-fanboys smugly point to this list as proof that the fanboys are idiots.&amp;rdquo;&lt;/p&gt;&#xA;&lt;p&gt;Then not three days later, &lt;a href=&#34;http://www.americanbanker.com/issues/179_114/first-major-mobile-banking-security-threat-hits-the-us-1068100-1.html&#34;&gt;American Banker&lt;/a&gt; posted an article about &lt;a href=&#34;http://www.kaspersky.com/about/news/virus/2014/Kaspersky-Lab-detects-mobile-Trojan-Svpeng-Financial-malware-with-ransomware-capabilities-now-targeting-US-users&#34;&gt;Svpeng&lt;/a&gt;, an existing trojan that&amp;rsquo;s been making the rounds in Russia and is now hitting US users.&lt;/p&gt;&#xA;&lt;p&gt;What I found most interesting about that article is this: Not once do they mention the platforms affected by the malware. Hell, even the Kaspersky press release is coy about it, only using the word &amp;ldquo;Android&amp;rdquo; once, and that in their formal name for the trojan (Trojan-Banker.AndroidOS.Svpeng.a). This trojan seems to have been out for almost a year, but now that it&amp;rsquo;s hitting US users, Kaspersky is putting on a full-court press in the&amp;hellip;er&amp;hellip;press&amp;hellip; (I should really steer clear of sports analogies). Predictably, I&amp;rsquo;ve had customers anxiously asking about the trojan, and whether they or their customers should be concerned.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iOS Malware - Still FUDish, not quite a Real Problem (yet)</title>
      <link>https://darthnull.org/ios-malware/</link>
      <pubDate>Tue, 10 Jun 2014 10:30:23 -0400</pubDate>
      <guid>https://darthnull.org/ios-malware/</guid>
      <description>&lt;p&gt;A short blog post is making the rounds on Twitter this morning, aiming to burst the myth that &amp;ldquo;malware for iOS doesn&amp;rsquo;t exist.&amp;rdquo;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;With our FortiGuard Labs reporting that 96.5% of all mobile malware is Android based it would be easy to see why someone might opt for an iPhone. But, users beware. Don’t write off iOS as the secure alternative to Android just yet! Despite, Android malware being nearly an epidemic, or as Tim Cook referenced, “a toxic hellstew”, iOS is not immune.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Memory Pressure, Capacity Limits, and Ubiquitous Computing</title>
      <link>https://darthnull.org/jit-memory-use/</link>
      <pubDate>Mon, 02 Jun 2014 09:51:54 -0400</pubDate>
      <guid>https://darthnull.org/jit-memory-use/</guid>
      <description>&lt;p&gt;One of the things I was most looking forward to with my new iPhone 5S was faster switching between applications. It seemed like my 4S always took 5-10 seconds to toggle between two programs, even simple apps. Jumping from Angry Birds to YouTube (to see what I&amp;rsquo;m doing wrong) and back again was agonizing.&lt;/p&gt;&#xA;&lt;p&gt;Unfortunately, though the 5S is significantly faster, switching has in some ways become worse. The slowest reloads are faster, but I feel like I need full reloads more frequently. I&amp;rsquo;m convinced this is simply due to memory usage. Many applications (especially those with lots of full retina artwork) are taking the device to its RAM limits. No amount of new processor power can mask the fact that there&amp;rsquo;s just not enough memory in the device.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Making Tunnelblick &#43; Google Authenticator Easier to Use</title>
      <link>https://darthnull.org/google-auth-tunnelblick/</link>
      <pubDate>Fri, 30 May 2014 02:29:43 -0400</pubDate>
      <guid>https://darthnull.org/google-auth-tunnelblick/</guid>
      <description>&lt;p&gt;I&amp;rsquo;ve been occasionally using a VPN that requires a Google Authenticator code to connect. I say &amp;ldquo;occasionally&amp;rdquo; because it&amp;rsquo;s a pain to use &amp;ndash; I have to launch Tunnelblick (the VPN client I&amp;rsquo;m using on my Mac), then get the VPN password out of my password manager and paste it in, then open my phone, launch Google Authenticator, and enter the displayed tokencode next to my password.&lt;/p&gt;&#xA;&lt;p&gt;It&amp;rsquo;s not horrible &amp;ndash; but it&amp;rsquo;s awkward enough that I find myself looking for ways to avoid using this particular connection. Then the other day, a co-worker suggested using a script to dump the credentials into the VPN config on the fly and re-launch. And so, my lunchtime project was decided for me.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Apple ID Compromise and Device Lockout</title>
      <link>https://darthnull.org/appleid-lockouts/</link>
      <pubDate>Tue, 27 May 2014 08:41:57 -0400</pubDate>
      <guid>https://darthnull.org/appleid-lockouts/</guid>
      <description>&lt;p&gt;I&amp;rsquo;m seeing quite a few stories this morning (really, it started yesterday afternoon) about iOS users in Australia getting their devices locked out with a $100 ransom message.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;It’s unclear at this point exactly how this is happening, but it seems evident that the affected users are having their Apple IDs hacked. Typically, such hacks involve things like weak passwords falling to brute force attacks by a botnet or falling for a phishing attack. That doesn’t really explain the fact that all the affected users appear to be located in Australia, however. Perhaps the most likely possibility is that an Australian e-mail provider has been hacked, giving hackers the ability to reset the password of weakly-protected Apple IDs associated with those e-mail addresses. Regardless of how it’s happening, though, those Apple IDs are being compromised.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iOS Backups are Still Broken</title>
      <link>https://darthnull.org/ios-backups-broken/</link>
      <pubDate>Mon, 19 May 2014 06:46:55 -0400</pubDate>
      <guid>https://darthnull.org/ios-backups-broken/</guid>
      <description>&lt;p&gt;A quick take on some of the many issues backing up large, complicated iOS configurations to iCloud backup.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Apple needs to make some hefty changes to iCloud. It needs to allow you to backup and take advantage of the full size of your iPad (128GB max) inexpensively. In my case, since most of my data is strung between four cloud services (OneDrive, Dropbox, Google Drive, and iCloud), I didn’t need to back it all up. However, for a while I used iBooks to store my side-loaded ePubs and PDFs. In this case, I had to stop backing it up to iCloud because of space concerns. Loosing all of those in the case of a system failure led me to put my PDFs back on Dropbox and use Goodreader to access them. Being able to keep them all in iCloud (about 50g of data) would be very nice.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How much of your email goes through Google?</title>
      <link>https://darthnull.org/gmail-gets-everything/</link>
      <pubDate>Mon, 12 May 2014 09:05:10 -0400</pubDate>
      <guid>https://darthnull.org/gmail-gets-everything/</guid>
      <description>&lt;p&gt;Nice bit of data (and a link to a script) that shows roughly how much of this person&amp;rsquo;s email ended up on a Google server at some point.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;For almost 15 years, I have run my own email server which I use for all of my non-work correspondence. I do so to keep autonomy, control, and privacy over my email and so that no big company has copies of all of my personal email.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Inadvertent OS X Mail Loading of Images in SPAM </title>
      <link>https://darthnull.org/load-images-bug/</link>
      <pubDate>Thu, 08 May 2014 01:03:44 -0400</pubDate>
      <guid>https://darthnull.org/load-images-bug/</guid>
      <description>&lt;p&gt;I just noticed an interesting bug. I got a SPAM email (which I fortunately get far fewer of today because of &lt;a href=&#34;http://spamhero.com&#34;&gt;SpamHero&lt;/a&gt;). As I usually do when a SPAM leaks through, I forwarded it to SpamHero so they can use it to improve their filters.&lt;/p&gt;&#xA;&lt;p&gt;Less than a minute after forwarding the email, I received another copy of virtually the same SPAM. Dutifully, I forwarded it again, but this time I noticed something strange: Though the Mail application identified the email as SPAM (and thus refused to load embedded images), the email as incorporated into the forwarding message window &lt;em&gt;did&lt;/em&gt; load the images.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dark Reading on the VZ DBIR puzzle</title>
      <link>https://darthnull.org/verizon-breach-report-puzzle-solved/</link>
      <pubDate>Tue, 06 May 2014 10:11:52 -0400</pubDate>
      <guid>https://darthnull.org/verizon-breach-report-puzzle-solved/</guid>
      <description>&lt;p&gt;I haven&amp;rsquo;t yet written up this year&amp;rsquo;s DBIR puzzle, so here&amp;rsquo;s an article at Dark Reading that neatly summarizes it.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Verizon&amp;rsquo;s earlier contests were mainly cryptography challenges with blocks of cipher that contestants had to decrypt. But the contest has evolved over the years from a crypto focus to more of a mind-bending puzzler. &amp;ldquo;It&amp;rsquo;s less about someone being an expert in cryptography as it is for someone who is really good at troubleshooting and solving problems&amp;hellip; and being really good at puzzles,&amp;rdquo; says Mark Spitler, co-author of the Verizon DBIR and the mastermind behind the cover challenge contest.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Referrer considered harmful: Leaking location of obscurely shared docs</title>
      <link>https://darthnull.org/referrer-leak-to-dropbox-docs/</link>
      <pubDate>Tue, 06 May 2014 01:14:57 -0400</pubDate>
      <guid>https://darthnull.org/referrer-leak-to-dropbox-docs/</guid>
      <description>&lt;p&gt;Ha. From the &amp;ldquo;Shoulda seen this one coming&amp;rdquo; department: Sharing a file with another person (via Dropbox, Box, or any other hosting service) may not be as private as you think. Sure, you may have a completely random URL that nobody else will be able to predict. And, sure, you may rightfully trust the people with whom you share the link not to reveal it to anyone else. But if the file you&amp;rsquo;ve shared contains a link to a 3rd party site, watch out!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Apple ID Madness</title>
      <link>https://darthnull.org/apple-id-madness/</link>
      <pubDate>Sun, 04 May 2014 12:58:04 -0400</pubDate>
      <guid>https://darthnull.org/apple-id-madness/</guid>
      <description>&lt;p&gt;One of the reasons I was so excited to get an iPhone a few years back was because of contact management. For years (from 1997 until about 2010) I carried around a Palm Pilot, which had reasonably good tools to synchronize data between the mobile device and my computer. Then I got a &amp;ldquo;modern&amp;rdquo; cell phone, which could do text messaging and everything, and setting up data syncing with that was&amp;hellip;.nearly impossible. But the iPhone, well, most of the time it works just fine.&lt;/p&gt;</description>
    </item>
    <item>
      <title>It&#39;s time to (re)start.</title>
      <link>https://darthnull.org/time-to-restart/</link>
      <pubDate>Fri, 02 May 2014 04:16:18 -0400</pubDate>
      <guid>https://darthnull.org/time-to-restart/</guid>
      <description>&lt;p&gt;Wow, I haven&amp;rsquo;t posted here in nearly a year. For a while last year, I was experimenting with a second blog where I could post quick little blurbs, links to interesting current events, but that never really took hold. I think part of it was it was just too much of a pain to post the little things. Plus, I don&amp;rsquo;t know, somehow I just got busy or somehting last summer.&lt;/p&gt;</description>
    </item>
    <item>
      <title>BSidesROC 2014 - Crypto Puzzle</title>
      <link>https://darthnull.org/bsidesroc14-puzzle/</link>
      <pubDate>Sat, 05 Apr 2014 04:15:00 -0400</pubDate>
      <guid>https://darthnull.org/bsidesroc14-puzzle/</guid>
      <description>&lt;p&gt;Walkthrough of my BSidesROC14 crypto puzzle.&lt;/p&gt;&#xA;&lt;p&gt;Not delivered in person &amp;ndash; slides sent to BSidesROC and Jason (presumably) presented them during closing ceremonies.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sanitize your outputs: Apple ID Password Logfile Disclosure</title>
      <link>https://darthnull.org/appleid-password-disclosure/</link>
      <pubDate>Mon, 10 Mar 2014 03:23:00 -0400</pubDate>
      <guid>https://darthnull.org/appleid-password-disclosure/</guid>
      <description>&lt;p&gt;In recent weeks, there have been &lt;a href=&#34;http://support.apple.com/kb/HT6147&#34;&gt;quite&lt;/a&gt; a &lt;a href=&#34;http://support.apple.com/kb/HT6150&#34;&gt;few&lt;/a&gt; security disclosures for Apple. Some of these have even been pretty significant. Not to pile on, but here&amp;rsquo;s some detail behind &lt;a href=&#34;http://support.apple.com/kb/HT6163&#34;&gt;another security issue&lt;/a&gt; that I stumbled across last fall.&lt;/p&gt;&#xA;&lt;p&gt;Apple had just restricted the availability of the Add Site feature on Apple TVs, and I was trying to determine whether alternate methods existed to enable the feature. If you couldn&amp;rsquo;t install the required configuration profile directly, maybe it&amp;rsquo;d work via MDM? Nope, that didn&amp;rsquo;t work. Wait, what about the Touch Setup feature? That&amp;rsquo;s obviously allowed to make changes to the Apple TV system.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2014-1279 - Password Disclosure via Apple TV Touch Setup</title>
      <link>https://darthnull.org/cve-2014-1279-touchscreen/</link>
      <pubDate>Mon, 10 Mar 2014 01:00:00 -0400</pubDate>
      <guid>https://darthnull.org/cve-2014-1279-touchscreen/</guid>
      <description>&lt;hr&gt;&#xA;&lt;h2 id=&#34;intrepidus-group-security-advisory&#34;&gt;Intrepidus Group Security Advisory&lt;/h2&gt;&#xA;&lt;h4 id=&#34;httpwwwintrepidusgroupcom&#34;&gt;&lt;a href=&#34;http://www.intrepidusgroup.com&#34;&gt;http://www.intrepidusgroup.com&lt;/a&gt;&lt;/h4&gt;&#xA;&lt;hr&gt;&#xA;&lt;pre&gt;&lt;code&gt;Title:              Apple TV Touch Setup Wi-Fi and iTunes Password Disclosure&#xA;Release Date:       10 March 2014&#xA;Discoverer:         David Schuetz &amp;lt;david.schuetz@intrepidusgroup.com&amp;gt;&#xA;Vendor:             Apple&#xA;Vendor Reference:   http://support.apple.com/kb/HT1222&#xA;CVE Reference:      CVE-2014-1279&#xA;Systems Affected:   Apple TV (3rd generation) running ATV 6.0 - 6.0.2 &#xA;Risk:               Medium&#xA;Status:             Published&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h2 id=&#34;timeline&#34;&gt;Timeline&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Discovered:         10 October 2013&lt;/li&gt;&#xA;&lt;li&gt;Reported:           8 November 2013&lt;/li&gt;&#xA;&lt;li&gt;Fixed:              10 March 2014&lt;/li&gt;&#xA;&lt;li&gt;Published:          10 March 2014&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&#xA;&lt;p&gt;The release of Apple TV version 6.0, based on iOS 7.0, introduced a new&#xA;convenience feature for the setup of new Apple TV units, colloquially&#xA;referred to as &amp;ldquo;Touch Setup.&amp;rdquo;&lt;/p&gt;</description>
    </item>
    <item>
      <title>More Fun with Apple TV Hacking (and Manual RSA Signature Validation)</title>
      <link>https://darthnull.org/atv-rsa-sigs/</link>
      <pubDate>Fri, 21 Feb 2014 08:59:00 -0500</pubDate>
      <guid>https://darthnull.org/atv-rsa-sigs/</guid>
      <description>&lt;p&gt;In my &lt;a href=&#34;https://intrepidusgroup.com/insight/2014/02/atv-cert-pinning&#34;&gt;last post&lt;/a&gt;, I showed how the latest Apple TV system checks for an Apple-signed certificate before allowing changes to certain device settings. In particular, this prevents easily enabling the &amp;ldquo;Add Site&amp;rdquo; application, detailed in my 2013 &lt;a href=&#34;https://intrepidusgroup.com/insight/2013/09/rpi-atv&#34;&gt;DerbyCon talk&lt;/a&gt;. However, as I mentioned in the last post, it&amp;rsquo;s possible to load the profile on an Apple TV running 5.2 or 5.3, and then upgrade to 6.0, and retain access to Add Site. The problem then is that the system won&amp;rsquo;t actually permit adding any sites. What gives?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Apple TV Hacking, Counterattacks, and Certificate Pinning</title>
      <link>https://darthnull.org/atv-profile-cert-pinning/</link>
      <pubDate>Tue, 11 Feb 2014 04:03:00 -0500</pubDate>
      <guid>https://darthnull.org/atv-profile-cert-pinning/</guid>
      <description>&lt;p&gt;A few months ago I presented a &lt;a href=&#34;https://intrepidusgroup.com/insight/2013/09/rpi-atv/&#34;&gt;neat hack at DerbyCon&lt;/a&gt; that let you put your own apps on Apple TV.  A few days afterwards, the hack stopped working. It&amp;rsquo;s time I had a follow-up to explain just what happened (and hopefully teach a little about certificate pinning in the process).&lt;/p&gt;&#xA;&lt;p&gt;First, a quick review: The Apple TV OS has a feature called &amp;ldquo;Add Site,&amp;rdquo; through which a developer can add a pointer to a custom application, which will then appear on the Apple TV&amp;rsquo;s home screen. To enable this feature, a special configuration profile needs to be loaded. The fun part of my talk was showing how one could find exactly what&amp;rsquo;s needed to make this profile, through some simple disassembly of the Apple TV binary.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2014 - Crypto Puzzle Slides</title>
      <link>https://darthnull.org/shmoocon-2014-puzzle-slides/</link>
      <pubDate>Sun, 19 Jan 2014 03:00:00 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-2014-puzzle-slides/</guid>
      <description>&lt;p&gt;ShmooCon X Crypto Puzzle Contest - wrap-up slides from closing ceremonies.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Good fun with bad crypto</title>
      <link>https://darthnull.org/good-fun-bad-crypto/</link>
      <pubDate>Wed, 15 Jan 2014 11:04:00 -0500</pubDate>
      <guid>https://darthnull.org/good-fun-bad-crypto/</guid>
      <description>&lt;p&gt;A few months back, one of the consultants here at Intrepidus ran across a strange password hash format:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;OLEOIECBPAFFKGADMDGGLBBEMIGNIPCKOAEFIPCKOLEO&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;He did some digging, and eventually found an application which would not only create the hashes, it would &lt;em&gt;decrypt&lt;/em&gt; them. So it&amp;rsquo;s not even a hash at all, just a really lousy encryption system. Well, not even encryption. Technically, it&amp;rsquo;s an encoding. &amp;ldquo;Citrix CTX1 Encoding&amp;rdquo;, to be exact. &amp;ldquo;How does this work?&amp;rdquo; I wondered. Unfortunately, the person who created the app we downloaded specifically declined to explain the algorithm, so we just moved on.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Raspberry Pi Media Center on AppleTV - No Jailbreak Required</title>
      <link>https://darthnull.org/rpi-on-atv/</link>
      <pubDate>Sun, 29 Sep 2013 04:04:00 -0400</pubDate>
      <guid>https://darthnull.org/rpi-on-atv/</guid>
      <description>&lt;p&gt;A few months ago, I started looking into using a Raspberry Pi (I&amp;rsquo;m gonna call it rPI from now on) as an access point / media server for the car. It started off as a way to let my boys play Minecraft with each other during long car trips&amp;hellip;.and then kind of went a little over the top after that.&lt;/p&gt;&#xA;&lt;figure class=&#34;medium&#34;&gt;&#xA;  &lt;a href=&#34;https://darthnull.org/media/2013/09/orig-rpi-in-car-small.png&#34;&gt;&lt;img src=&#34;https://darthnull.org/media/2013/09/orig-rpi-in-car-small.png&#34; title=&#34;&#34;&gt;&lt;/a&gt;&#xA;  &lt;figcaption&gt;&lt;p&gt;RPI in Car&lt;/p&gt;&lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;    &#xA;&#xA;&lt;p&gt;In June, an interesting AppleTV hack called &lt;a href=&#34;https://github.com/iBaa/PlexConnect/wiki&#34;&gt;PlexConnect&lt;/a&gt; got some press, and I started thinking about trying to get videos from the rPI onto an AppleTV.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iStupid: the indescreet SSID tool</title>
      <link>https://darthnull.org/istupid/</link>
      <pubDate>Wed, 19 Jun 2013 02:03:00 -0400</pubDate>
      <guid>https://darthnull.org/istupid/</guid>
      <description>&lt;p&gt;Sometimes, the names of past Wi-Fi networks your iOS device has used get broadcast to the world as the device tries to find someone to talk to, and this can (possibly) leak information about your favorite home or work networks. So it&amp;rsquo;s a good idea to delete these networks whenever you&amp;rsquo;re done using them. Unfortunately, here&amp;rsquo;s no way to remove Wi-Fi networks from the &amp;ldquo;Preferred Network List&amp;rdquo; (PNL) on iOS, unless you happen to be in range of that network at the time. Then, and only then, do you get the option to &amp;ldquo;Forget this Network.&amp;rdquo;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hijacking accounts using unicode magic</title>
      <link>https://darthnull.org/unicode-account-hijacking/</link>
      <pubDate>Tue, 18 Jun 2013 01:57:00 -0400</pubDate>
      <guid>https://darthnull.org/unicode-account-hijacking/</guid>
      <description>&lt;p&gt;A nice writeup on how canonical forms can cause problems when using extended UNICODE alphabets.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Not so good since the function apparently was not idempotent, but at least it provided insight into why the attack worked. When you registered an account ‘ᴮᴵᴳᴮᴵᴿᴰ’, canonical_username got applied once, and an account with canonical username ‘BIGBIRD’ got registered which was allowed since it did not collide with the existing account with canonical username ‘bigbird’. When resetting the password for ‘ᴮᴵᴳᴮᴵᴿᴰ’ canonical_username was applied once, so the email to send the password reset to got sent to the address associated with the newly created account with canonical username ‘BIGBIRD’. However, when the link was used, canonical_username was once again applied, yielding ‘bigbird’ so that the new password was instead set for the ‘bigbird’ account. We were relying on nodeprep.prepare being idempotent, and it wasn’t.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Apple&#39;s security strategy: make it invisible</title>
      <link>https://darthnull.org/make-security-invisible/</link>
      <pubDate>Fri, 14 Jun 2013 12:18:00 -0400</pubDate>
      <guid>https://darthnull.org/make-security-invisible/</guid>
      <description>&lt;p&gt;Interesting piece from Rich Mogull about Apple and how the user interacts with security.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Apple is famously focused on design and human experience as their top guiding principles. When it comes to security, that focus created a conundrum. Security is all about placing obstacles in the way of attackers, but (despite the claims of security vendors) those same obstacles can get in the way of users, too.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;[&amp;hellip;]&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;While Apple hasn’t said so explicitly, it’s clear that one key principle guides them when it comes to security: The more you impede a user’s ability to do something, the more likely that user is to circumvent security measures.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A chameleon for your streams</title>
      <link>https://darthnull.org/stream-chameleon/</link>
      <pubDate>Thu, 13 Jun 2013 08:21:00 -0400</pubDate>
      <guid>https://darthnull.org/stream-chameleon/</guid>
      <description>&lt;p&gt;This is awesome. A project to encrypt your data, and then reformat it to &amp;ldquo;look like&amp;rdquo; other data, like HTTP. Then deep packet inspection can&amp;rsquo;t recognize that it&amp;rsquo;s something else&amp;hellip;like covert communication sneaking past the eyes of an oppressive regime&amp;hellip;or, well, data being exfiltrated from a compromised corporate network.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;More generally, we&amp;rsquo;re optimistic FTE has long-term potential as a tool to enable users to control how their traffic is classified by passive DPI systems. As one example, over the last month, we&amp;rsquo;ve successfully tunneled Tor through the Great Firewall of China, using FTE to make our traffic &amp;ldquo;look like&amp;rdquo; HTTP.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iOS 7 and Mavericks: New feature roundup from a security perspective – Intrepidus Group - Insight</title>
      <link>https://darthnull.org/ios-mavericks-feature-blurb/</link>
      <pubDate>Tue, 11 Jun 2013 10:47:00 -0400</pubDate>
      <guid>https://darthnull.org/ios-mavericks-feature-blurb/</guid>
      <description>&lt;p&gt;A quick link to a piece I posted on the Intrepidus Group blog. Lots of cool features coming in iOS 7, and many of them will probably have &amp;ldquo;interesting&amp;rdquo; security implications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iOS 7 and Mavericks: New feature roundup from a security perspective</title>
      <link>https://darthnull.org/ios7-mavericks-security-features/</link>
      <pubDate>Tue, 11 Jun 2013 10:46:00 -0400</pubDate>
      <guid>https://darthnull.org/ios7-mavericks-security-features/</guid>
      <description>&lt;p&gt;Yesterday Apple unveiled the latest versions of OS X (code-named Mavericks) and iOS 7, at the annual World Wide Developer Conference (WWDC). The general focus was on end-user features and items of interest to developers, but several items appeared to have an impact on security in one way or another.&lt;/p&gt;&#xA;&lt;p&gt;The beta versions of both operating systems were also released to developers yesterday, but I haven&amp;rsquo;t seen them yet (and once I do, I&amp;rsquo;d probably be bound by NDA to not talk much about them). So before I go that route (hopefully later this week!), I thought it would be useful to quickly review some of the items I found potentially significant. I&amp;rsquo;ll briefly describe the features, then summarize some of the security questions I have at the end. Also, whenever I talk about &amp;ldquo;Early Reports,&amp;rdquo; I&amp;rsquo;m referring to information not specifically announced by Apple, but which have leaked through screenshots and other reports.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Android Security Overview</title>
      <link>https://darthnull.org/android-security-overview/</link>
      <pubDate>Wed, 05 Jun 2013 11:12:00 -0400</pubDate>
      <guid>https://darthnull.org/android-security-overview/</guid>
      <description>&lt;p&gt;I haven&amp;rsquo;t seen this before (being primarily focused on iOS), but this looks like a pretty good parallel to the Apple iOS Security whitepaper published last year.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Skout server leaked nearly-exact location information on users</title>
      <link>https://darthnull.org/skout-location-leakage/</link>
      <pubDate>Fri, 31 May 2013 11:32:00 -0400</pubDate>
      <guid>https://darthnull.org/skout-location-leakage/</guid>
      <description>&lt;p&gt;Another scary privacy find from Aldo Cortesi:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;The Skout mobile application talks to Skout&amp;rsquo;s servers through a simple API.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;What&amp;rsquo;s returned is a blob of XML containing the user&amp;rsquo;s complete profile data. In fact, the profile data is too complete, including some bits of data information that is never actually used by the app. For example, we can see the user&amp;rsquo;s exact date of birth&amp;hellip; but only the user&amp;rsquo;s age in years is actually displayed. Most serious, however, is the high-precision location information that is returned in the homeLocation and location tags.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Auto-updating iOS apps</title>
      <link>https://darthnull.org/auto-updating-ios-apps/</link>
      <pubDate>Wed, 22 May 2013 10:06:00 -0400</pubDate>
      <guid>https://darthnull.org/auto-updating-ios-apps/</guid>
      <description>&lt;p&gt;Sen. McCain asked why we have to &amp;ldquo;keep updating apps&amp;rdquo; all the time:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;McCain does have a point. It&amp;rsquo;s really annoying to pop open the App Store every time there&amp;rsquo;s a new update. We wish iPhones worked more like Android phones in that respect, letting you update apps automatically.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;But is that really a good idea? I know there have been several times in the past year where an upgrade to an app broke things, and needed a subsequent &amp;ldquo;emergency&amp;rdquo; fix from the developer.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Two-factor authentication for Twitter: One account at a time</title>
      <link>https://darthnull.org/twitter-2fa/</link>
      <pubDate>Wed, 22 May 2013 03:41:00 -0400</pubDate>
      <guid>https://darthnull.org/twitter-2fa/</guid>
      <description>&lt;p&gt;Just announced:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;This is a form of two-factor authentication — when you sign in to twitter.com, there’s a second check to make sure it’s really you. After you enroll in login verification, you’ll be asked to enter a six-digit code that we send to your phone via SMS each time you sign in to twitter.com.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;This is great, and has been an increasingly frequent request over the past couple of years. However, there&amp;rsquo;s one drawback: You can only use your phone number with one account.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Google Hangouts and XMPP</title>
      <link>https://darthnull.org/hangouts-and-xmpp/</link>
      <pubDate>Fri, 17 May 2013 09:46:00 -0400</pubDate>
      <guid>https://darthnull.org/hangouts-and-xmpp/</guid>
      <description>&lt;p&gt;The announcement of the improved Google Hangouts the other day worried many of us who use Google Talk (through third-party clients like Adium). Were they completely killing Jabber/XMPP? I tested some this morning, and found that I can chat between Hangouts and Adium. Then I found this article, which explains in a little more detail what&amp;rsquo;s going on:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;There&amp;rsquo;s some bad news that comes with the new Hangout architecture, at least for others who want to have interoperability with Google chat users on the server side via XMPP. Google will not allow server-to-server connections. Chee Chew said that &amp;ldquo;we haven&amp;rsquo;t seen significant uptake&amp;rdquo; in federation with Google Talk via server-to-server connections. The majority of the uptake Google did see was from organizations or individuals looking to bombard Google Talk users with chat spam, Chew said. As a result, server-to-server XMPP has been left out of the consolidated Hangout environment.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Recovering iPhone Restrictions Passcode</title>
      <link>https://darthnull.org/forgotten-restrictions-passcode/</link>
      <pubDate>Thu, 16 May 2013 12:07:00 -0400</pubDate>
      <guid>https://darthnull.org/forgotten-restrictions-passcode/</guid>
      <description>&lt;p&gt;Interesting find.&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Look for the file called com.apple.springboard.plist and open it in Property List Editor.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;The file should have a key titled SBParentalControlsPin and the Value for this item is exactly what we were looking for. Our missing 4 digit Restrictions Passcode.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;To carry off this hack, you need to be using unencrypted backups of the device (otherwise, you won&amp;rsquo;t be able to read the file). Or, naturally, it&amp;rsquo;s very easy if you have a jailbroken device.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Social Share Privacy</title>
      <link>https://darthnull.org/social-share-privacy/</link>
      <pubDate>Thu, 16 May 2013 10:14:00 -0400</pubDate>
      <guid>https://darthnull.org/social-share-privacy/</guid>
      <description>&lt;p&gt;A nice way to take back some control over unintential browser history leakage:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;More and more websites use like-buttons from Facebook, Google+ and Twitter. However, these buttons send information to these social networks even if the user doesn&amp;rsquo;t click them, but even if they are just present on a webpage. This way these networks are able to track which websites users are visiting and are able to build fairly complete browser histories of their users. Because this is neither what a user might expect nor what many website operators that embed like-buttons want, this alternative way of using these social services was developed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How To Safely Store A Password </title>
      <link>https://darthnull.org/use-bcrypt/</link>
      <pubDate>Thu, 16 May 2013 01:42:00 -0400</pubDate>
      <guid>https://darthnull.org/use-bcrypt/</guid>
      <description>&lt;p&gt;This is a few years old, but worth reposting, as the question comes up regularly (like it did a couple minutes ago in my Twitter stream).  The goal, it reminds us, is to pick an algorithm that&amp;rsquo;s &amp;ldquo;slow as hell&amp;rdquo;:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;So we’re talking about 5 or so orders of magnitude. Instead of cracking a password every 40 seconds, I’d be cracking them every 12 years or so.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Note also that scrypt and PBKDF2 are generally recognized as valid substitutes, as the basic logic of this post still applies to those algorithms.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Apple, Forensics, Law Enforcement, and FUD</title>
      <link>https://darthnull.org/apple-forensics-law-enforcement-and-fud/</link>
      <pubDate>Mon, 13 May 2013 10:32:00 -0400</pubDate>
      <guid>https://darthnull.org/apple-forensics-law-enforcement-and-fud/</guid>
      <description>&lt;p&gt;Just like the perennial discussion on location-based services and Apple&amp;rsquo;s ability to track you, the question of accessing an iOS device&amp;rsquo;s data when the device is locked seems to come up every few months. This time around, the discussion was inspired by a CNET article, with the sensational title &lt;a href=&#34;http://www.cnet.com/news/apple-deluged-by-police-demands-to-decrypt-iphones/&#34;&gt;&amp;ldquo;Apple deluged by police demands to decrypt iPhones.&amp;rdquo;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;The article seemed to be built around a single paragraph in a blurry copy of a search warrant affidavit from ATF, which stated that the writer &amp;ldquo;contacted Apple&amp;rdquo; and was told by &amp;ldquo;an employee [&amp;hellip;] who is part of their Apple Litigation Group&amp;rdquo; that Apple &amp;ldquo;has the capabilities to bypass the security software&amp;rdquo; on the iPhone.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iSniff your Wi-Fi and GPS your House</title>
      <link>https://darthnull.org/isniff-your-house/</link>
      <pubDate>Fri, 10 May 2013 09:52:00 -0400</pubDate>
      <guid>https://darthnull.org/isniff-your-house/</guid>
      <description>&lt;p&gt;It&amp;rsquo;s been a while since I thought much about location-based services on iOS systems, in particular their privacy implications. Of course &lt;a href=&#34;https://darthnull.org/2011/04/25/analysis-of-ios-location-data&#34;&gt;Locationgate&lt;/a&gt; happened back in March 2011, when researchers called public attention to a database of location points saved on iPhones. A year later, &lt;a href=&#34;http://arstechnica.com/apple/2012/03/loose-lipped-iphones-top-the-list-of-smartphones-exploited-by-hacker/&#34;&gt;Mark Wuergler reported&lt;/a&gt; on a possible &lt;a href=&#34;http://arstechnica.com/apple/2012/03/anatomy-of-an-iphone-leak/&#34;&gt;information leak&lt;/a&gt; where iOS devices disclosed the MAC addresses (more properly, BSSIDs) of the last few access points they&amp;rsquo;d linked to.&lt;/p&gt;&#xA;&lt;p&gt;These two issues were brought together last summer, at the Black Hat Arsenal, when &lt;a href=&#34;https://twitter.com/hubert3&#34;&gt;Hubert Seiwert (@hubert3)&lt;/a&gt; presented a tool called iSniff GPS. The tool was described in more detail &lt;a href=&#34;http://www.syscan.org/index.php/download/get/01ae5e17eb08ac1d591537177d4fe2b7/SyScan2013_DAY1_SPEAKER06_Hubert_iSniff_GPS-Virtual_Wardriving-Syscan_2013_Slides.zip&#34;&gt;at Syscan in Singapore&lt;/a&gt; just a couple of weeks ago, but finally came to my attention in a tweet Wednesday night pointing me to &lt;a href=&#34;http://www.scmagazine.com.au/News/342593,tool-reveals-apple-user-locations.aspx&#34;&gt;SC Magazine (Australia)&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iSniff your WiFi - Archived Comments</title>
      <link>https://darthnull.org/isniff-comments/</link>
      <pubDate>Fri, 10 May 2013 01:02:00 -0400</pubDate>
      <guid>https://darthnull.org/isniff-comments/</guid>
      <description>&lt;h3 id=&#34;hubert3&#34;&gt;hubert3&lt;/h3&gt;&#xA;&lt;h4 id=&#34;may-10-2013-at-102-pm&#34;&gt;May 10, 2013 at 1:02 pm&lt;/h4&gt;&#xA;&lt;p&gt;Thanks for the writeup.&lt;/p&gt;&#xA;&lt;p&gt;The ARPs which sometimes contain the BSSID information disclosure are actually targeting the MAC address of the DHCP server on a previously joined network. On most home/soho WiFi routers, the DHCP server MAC address is the same as the router&amp;rsquo;s WiFi BSSID (sometimes it&amp;rsquo;s the same except for the last octet).&lt;/p&gt;&#xA;&lt;p&gt;This is often not the case on bigger corporate WiFi networks with multiple APs and separate DHCP servers, so the MAC address picked up may sometimes not be a WiFi BSSID at all and can&amp;rsquo;t be used for geolocation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>DBIR Cover Challenge 2013</title>
      <link>https://darthnull.org/dbir-cover-challenge-2013/</link>
      <pubDate>Mon, 29 Apr 2013 12:46:00 -0400</pubDate>
      <guid>https://darthnull.org/dbir-cover-challenge-2013/</guid>
      <description>&lt;p&gt;It&amp;rsquo;s time for the 2013 edition of the &lt;a href=&#34;http://www.verizonenterprise.com/DBIR/2013&#34;&gt;Verizon Data Breach Investigation Report&lt;/a&gt; Cover Challenge! This year I didn&amp;rsquo;t win&amp;hellip;but only just barely. It also felt like a bit of a different puzzle this year, not quite as much a series of challenges as just a scavenger hunt with only the barest minimum of breadcrumbs scattered to help us follow the path to victory.&lt;/p&gt;&#xA;&lt;p&gt;With that in mind, I&amp;rsquo;ll focus less on the individual puzzle elements, and more on the challenge experience.&lt;/p&gt;</description>
    </item>
    <item>
      <title>2013 DBIR Puzzle - Archived Comments</title>
      <link>https://darthnull.org/dbir-2013-comments/</link>
      <pubDate>Mon, 29 Apr 2013 10:18:00 -0400</pubDate>
      <guid>https://darthnull.org/dbir-2013-comments/</guid>
      <description>&lt;h3 id=&#34;ari-e-b&#34;&gt;Ari E-B&lt;/h3&gt;&#xA;&lt;h4 id=&#34;april-29-2013-at-1018-pm&#34;&gt;April 29, 2013 at 10:18 pm&lt;/h4&gt;&#xA;&lt;p&gt;Some friends and I were also doing the puzzle and made it as far as the book cipher but didn’t recognize what it was. I also followed up on a few more dead end leads you might find interesting:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;The good colonel appears to have a login for a dead website here: &lt;a href=&#34;http://www.bugmenot.com/view/flinside.com&#34;&gt;http://www.bugmenot.com/view/flinside.com&lt;/a&gt; – I don’t know if this was seeded by Verizon or if someone else decided to poison the well. flinside is a domain squatter, so I assumed he had used that password elsewhere (like the godaddy page) and tried using that. I also tried operating under the assumption that flinside was a typo and tried to figure out what else it could have meant.&lt;/li&gt;&#xA;&lt;li&gt;I took the phone number from the cofthem.ca whois info and tried to track that down. Calling the number turned up a VZ employee who apparently worked on the puzzle, and I did spend some time cyber stalking him thinking it was part of the puzzle till I realized I had accidentally drifted across the line from “puzzle” to “real life” and backed off.&lt;/li&gt;&#xA;&lt;li&gt;The address of cofthem.ca is a museum in Quebec. I spent time trying to find anything interesting there too.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Anyway, I enjoyed myself. Thanks for posting the solution so I can see the last step we missed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iOS Configuration Profile Ransomware</title>
      <link>https://darthnull.org/profile-ransomware/</link>
      <pubDate>Thu, 11 Apr 2013 11:40:00 -0400</pubDate>
      <guid>https://darthnull.org/profile-ransomware/</guid>
      <description>&lt;p&gt;A couple of months ago, at ShmooCon 2013, Tim Medin gave a great short talk titled &amp;ldquo;&lt;a href=&#34;http://www.shmoocon.org/2013/videos/Shmoocon%202013%20-%20Apple%20iOS%20Certificate%20Tomfoolery.mp4&#34;&gt;Apple iOS Certificate Tomfoolery&lt;/a&gt;.&amp;rdquo; One of the most interesting ideas I took away from this talk was the idea of ransomware delivered through a configuration profile. Briefly, configuration profiles can be used to control &lt;a href=&#34;http://developer.apple.com/library/ios/#featuredarticles/iPhoneConfigurationProfileRef/Introduction/Introduction.html&#34;&gt;many aspects of an iOS device&amp;rsquo;s configruation&lt;/a&gt;. They can enable features, disable features, and even hide applications from the user.&lt;/p&gt;&#xA;&lt;p&gt;This is the tricky bit: Create a configuration profile that disables Safari, disables installation of applications, even disables iCloud backups, and adds a &amp;ldquo;READ ME&amp;rdquo; web page to the user&amp;rsquo;s home screen. Put a password on the profile, so the user has to enter the password in order to remove it. Now, you just need to convince the user to install the profile, and you can do that simply through email or SMS &lt;a href=&#34;http://phishme.com&#34;&gt;phishing&lt;/a&gt;. Once they install it, half their expected functionality suddenly goes away, and if they tap on the &amp;ldquo;READ ME&amp;rdquo; page, they&amp;rsquo;ll see the instructions as to how to pay ransom to receive the password to remove the profile. Win! (well, not for the user).&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2013 - Crypto Puzzle Slides</title>
      <link>https://darthnull.org/shmoocon-2013-puzzle-slides/</link>
      <pubDate>Sun, 17 Feb 2013 03:15:00 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-2013-puzzle-slides/</guid>
      <description>&lt;p&gt;The closing ceremonies presentation for the 2013 ShmooCon 9 crypto puzzle.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Getting ready for ShmooCon</title>
      <link>https://darthnull.org/shmoocon-blurb/</link>
      <pubDate>Tue, 12 Feb 2013 01:20:00 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-blurb/</guid>
      <description>&lt;p&gt;It&amp;rsquo;s almost time for another &lt;a href=&#34;http://www.shmoocon.org&#34;&gt;ShmooCon&lt;/a&gt;, and as usual, we&amp;rsquo;ll be out in force for the conference. We won&amp;rsquo;t have a booth this year, but we will be milling about, attending talks, and even giving a couple presentations of our own. We might even have a little puzzle to share&amp;hellip;just ask any one of us for details. (David might have a slightly more visible puzzle contest as well, but, well, there were secrecy oaths, threats of retribution, etc., so the less said about that, the better).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Evading evasi0n: iOS 6 Jailbreak Prevention</title>
      <link>https://darthnull.org/evading-evasion/</link>
      <pubDate>Tue, 05 Feb 2013 04:06:00 -0500</pubDate>
      <guid>https://darthnull.org/evading-evasion/</guid>
      <description>&lt;p&gt;The latest iOS jailbreak was released yesterday. Called &amp;ldquo;&lt;a href=&#34;http://evasi0n.com&#34;&gt;evasi0n&lt;/a&gt;&amp;rdquo; it can be used to bypass most all protections in iOS 6.1 on any device that supports it. It&amp;rsquo;s quite cool, and was certainly something I was looking forward to (since much of my work is greatly aided by working on a jailbroken device).&lt;/p&gt;&#xA;&lt;p&gt;However, another part of my work is ensuring that our customers&amp;rsquo; devices are as secure as they can be. And having an available jailbreak kind of weakens those assurances. So it might be useful to find a way to prevent the jailbreak from working.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tracking Down the UDID Source - Archived Comments</title>
      <link>https://darthnull.org/tracking-udid-comments/</link>
      <pubDate>Mon, 10 Sep 2012 12:32:00 -0400</pubDate>
      <guid>https://darthnull.org/tracking-udid-comments/</guid>
      <description>&lt;h3 id=&#34;mek0s&#34;&gt;Mek0s&lt;/h3&gt;&#xA;&lt;h4 id=&#34;september-10-2012-at-1232-pm&#34;&gt;September 10, 2012 at 12:32 pm&lt;/h4&gt;&#xA;&lt;pre&gt;&lt;code&gt;            GJ on this guys&amp;amp;#8217;.  Much respect. &#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;phishme&#34;&gt;PhishMe&lt;/h3&gt;&#xA;&lt;h4 id=&#34;september-10-2012-at-111-pm&#34;&gt;September 10, 2012 at 1:11 pm&lt;/h4&gt;&#xA;&lt;pre&gt;&lt;code&gt;            nice work! &#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;mattjay&#34;&gt;mattjay&lt;/h3&gt;&#xA;&lt;h4 id=&#34;september-10-2012-at-124-pm&#34;&gt;September 10, 2012 at 1:24 pm&lt;/h4&gt;&#xA;&lt;p&gt;Really great to see less echo chamber finger pointing and actual research. Great job!&lt;/p&gt;&#xA;&lt;h3 id=&#34;zcobb&#34;&gt;@zcobb&lt;/h3&gt;&#xA;&lt;h4 id=&#34;september-10-2012-at-214-pm&#34;&gt;September 10, 2012 at 2:14 pm&lt;/h4&gt;&#xA;&lt;pre&gt;&lt;code&gt;            Nice work Mr. Schuetz! I admit that I had started to look for patterns in the names (why do so many Dawn&amp;amp;#8217;s own iOS devices?) but you nailed it. Congrats on some inspired analysis! &#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;ohgoodnesswhat&#34;&gt;ohgoodnesswhat&lt;/h3&gt;&#xA;&lt;h4 id=&#34;september-10-2012-at-303-pm&#34;&gt;September 10, 2012 at 3:03 pm&lt;/h4&gt;&#xA;&lt;pre&gt;&lt;code&gt;            Horsepuckey. &#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;And how much was BlueToad paid to be the alibi?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fidelis Decode This 2012 - Archived Comments</title>
      <link>https://darthnull.org/fidelis-2012-comments/</link>
      <pubDate>Mon, 10 Sep 2012 12:00:00 -0400</pubDate>
      <guid>https://darthnull.org/fidelis-2012-comments/</guid>
      <description>&lt;h3 id=&#34;nate&#34;&gt;Nate&lt;/h3&gt;&#xA;&lt;h4 id=&#34;september-10-2012-at-1043-pm&#34;&gt;September 10, 2012 at 10:43 pm&lt;/h4&gt;&#xA;&lt;p&gt;That must have felt great! Congrats. Great to read how you got there.&lt;/p&gt;&#xA;&lt;h3 id=&#34;alexcohn&#34;&gt;alexcohn&lt;/h3&gt;&#xA;&lt;h4 id=&#34;september-11-2012-at-617-am&#34;&gt;September 11, 2012 at 6:17 am&lt;/h4&gt;&#xA;&lt;p&gt;Actually the Fibonacci sequence is explicit in the drawing: the sizes of squares are:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;1, 1, 2, …&#xA;&lt;/code&gt;&lt;/pre&gt;</description>
    </item>
    <item>
      <title>Tracking Down the UDID Breach Source</title>
      <link>https://darthnull.org/tracking-udid-src/</link>
      <pubDate>Mon, 10 Sep 2012 12:00:00 -0400</pubDate>
      <guid>https://darthnull.org/tracking-udid-src/</guid>
      <description>&lt;p&gt;I&amp;rsquo;d heard about the alleged FBI/Apple UDID leak shortly after arriving at work last Tuesday morning, and immediately downloaded and began reviewing the data. Less than an hour later, I&amp;rsquo;d surmised that comparing apps across multiple devices might help narrow down the source.&lt;/p&gt;&#xA;&lt;p&gt;Several hours later, at 3:00, I saw a tweet from @Jack_Daniel suggesting that people checking their UDIDs in online forms only enter partial numbers . And that made me wonder: &amp;ldquo;How many digits is the minimum people need to enter in order to be guaranteed a unique result?&amp;rdquo; Sort to the rescue:&lt;/p&gt;</description>
    </item>
    <item>
      <title>What the flagnog? The Apple / FBI UDID breach, simplified.</title>
      <link>https://darthnull.org/what-the-flagnog/</link>
      <pubDate>Wed, 05 Sep 2012 12:28:00 -0400</pubDate>
      <guid>https://darthnull.org/what-the-flagnog/</guid>
      <description>&lt;p&gt;Early Tuesday, a file was released detailing the compromise of 1,000,001 records, supposedly from an FBI laptop. Reportedly, these represented only a small portion of a much larger breach &amp;ndash; over 12 million records. It&amp;rsquo;s further claimed that the full breach includes personal information such as mailing addresses and telephone numbers, while the published data was limited to only a few specific fields.&lt;/p&gt;&#xA;&lt;p&gt;That&amp;rsquo;s what we&amp;rsquo;ve been told. But what do we actually know?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Winning the Decode This! puzzle at Black Hat</title>
      <link>https://darthnull.org/2012-decode-this-blurb/</link>
      <pubDate>Fri, 17 Aug 2012 10:44:00 -0400</pubDate>
      <guid>https://darthnull.org/2012-decode-this-blurb/</guid>
      <description>&lt;p&gt;Last year, I had a great time trying to solve the &lt;a href=&#34;http://www.fidelissecurity.com/&#34;&gt;Fidelis Security Systems&amp;rsquo;&lt;/a&gt; Decode This! puzzle at Black Hat. But I wasn&amp;rsquo;t fast enough to win. This year, I resolved to not make the same mistakes. And in the end, it paid off!&lt;/p&gt;&#xA;&lt;p&gt;Much like last year&amp;rsquo;s puzzle, this one involved a block of Unicode text (filled with all kinds of unpronouncable glyphs), and several hints posted on Twitter. I played with the puzzle off and on before I left for the con, but didn&amp;rsquo;t really attack it full-bore until I got onto the plane for Vegas.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fidelis Security Systems&#39; Decode This 2012</title>
      <link>https://darthnull.org/decode-this-2012/</link>
      <pubDate>Fri, 17 Aug 2012 10:28:00 -0400</pubDate>
      <guid>https://darthnull.org/decode-this-2012/</guid>
      <description>&lt;p&gt;Last year, I had a great time trying to solve the &lt;a href=&#34;http://www.fidelissecurity.com&#34;&gt;Fidelis Secuirty&amp;rsquo;s&lt;/a&gt; Decode This! puzzle at Black Hat. But I wasn&amp;rsquo;t fast enough (and I &lt;a href=&#34;https://darthnull.org/2011/08/30/bh11-fidelis-puzzle&#34;&gt;missed a couple of things&lt;/a&gt; that should have been obvious). This year, I resolved to not make the same mistakes. And in the end, it paid off! I was the first to solve, and won a $1000 prize! Read on to see how I did it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>FidSecSys Decode This 2012 Ciphertext and Hints</title>
      <link>https://darthnull.org/fidsecsys-2012-data/</link>
      <pubDate>Fri, 17 Aug 2012 10:28:00 -0400</pubDate>
      <guid>https://darthnull.org/fidsecsys-2012-data/</guid>
      <description>&lt;p&gt;Ciphertext:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;ɳd❤ĢɮjźѨȵ⁑ј✶◾ҌЋųɤ❤™Ɱ٪ɺѨ✵⁑јȶ◾ҌԋųѤդ&#xA;✢ⱮѪźѨеɑŘ6ǾΌЋɳ❤ѤԢ❮❪ɺŨ‵ёјĶþΌȋɳѤѤ&amp;quot;n❪&#xA;ɺѨ✵⁑Xȶ◾Όԋs❤դĢɮjźɨ✵QŘȶþʌԋsŤd&amp;quot;Ѯ❪zѨ5&#xA;⁑Xж◾ʌԋsɤѤĢ❮٪źѨ5❑⁘ĶþʌċųդdТnŪɺŨȵQ⁘ж&#xA;◾ƌԋɳɤɤТŮɪѺhĵQŘ✶Ǿ➌ȋųŤɤ&amp;quot;ɮŪźѨ✵⁑X‶◾ƌЋ&#xA;sɤŤ✢❮ɪźh✵ёXȶǾҌԋɳŤŤТ❮ɪźɨȵ❑ɘ✶þ➌ԋɳѤd&#xA;ԢⱮɪѺŨĵőŘ6ǾʌԋųɤɤĢŮ❪źhȵёX✶þ▌ȋųդѤĢⱮѪ&#xA;ɺh‵ɑX6þΌȋsŤdТɮ❪ɺŨȵ❑јĶ◾ΌԋųդѤТɮ❪ѺѨĵ&#xA;QŘȶþΌȋsŤդ™ⱮŪɺѨȵőXȶ◾ҌԋɳɤѤ™njzhеёXȶ&#xA;þҌȋɳdѤĢŮɪѺѨеёŘ✶ǾʌԋsѤѤԢѮjźŨĵ⁑⁘ĶǾƌЋ&#xA;ɳ❤ɤ™nѪɺѨеQ⁘Ķþ➌ԋɳɤѤТnjѺɨеQ❘‶Ǿ➌ċѳ❤Ť&#xA;ĢⱮjzɨȵ❑XĶ◾Όȋѳ❤dТ❮Ūzhĵ⁑ŘĶǾƌԋѳդդТŮɪ&#xA;zŨ5⁑❘✶Ǿ▌ċųŤѤ•ɮ٪zh5ёXĶ◾ΌԋsŤŤԢɮ❪zѨ5&#xA;ёј✶Ǿ▌ċɳѤɤĢ❮ɪɺѨĵQ⁘жþҌȋѳdd&amp;quot;n٪Ѻhȵ⁑ј‶&#xA;Ǿʌċѳ❤ɤԢnŪzh✵❑ј6þҌԋѳdŤ•❮ɪѺѨ✵ёXĶ◾Ҍԋ&#xA;ɳ❤ɤ&amp;quot;❮ѪѺhеő❘6ǾΌċѳdѤ™nŪѺŨ5⁑⁘✶Ǿ➌ȋѳ❤ɤ&#xA;✢n٪ɺѨ‵⁑јȶþҌċsɤ❤™❮٪Ѻhеёɘ‶ǾҌċѳդŤ™ɮ٪&#xA;źѨе❑❘жǾΌċѳdդԢ❮ѪɺŨ‵ɑј‶◾➌ԋѳɤŤԢɮ❪zѨ✵&#xA;ɑјжþ▌ЋsdѤТ❮ѪźѨеё❘ĶþƌċųѤ❤•n٪ɺhĵɑXȶ&#xA;ǾҌԋѳŤ❤ТŮ٪źɨ✵❑⁘Ķþ➌ЋųdɤĢnjzѨе⁑⁘6◾➌ȋ&#xA;ѳѤdТnŪѺɨе⁑⁘ȶþʌȋųddԢⱮ٪ɺŨ✵ő❘ж◾▌ċɳŤd&#xA;Ģ❮jѺѨ✵ё❘Ķþ▌ċsѤѤ•Ɱ٪zŨ‵őXĶ◾▌ċɳѤɤ&amp;quot;ѮѪ&#xA;źɨе⁑ј6Ǿ➌ȋųŤѤĢⱮɪɺѨеőŘ✶◾ʌċųɤd&amp;quot;Ѯ❪ѺѨ‵&#xA;ɑŘж◾➌ԋsŤŤ&amp;quot;ѮjɺhȵQɘȶþҌԋsɤդ™Ɱ٪źŨ✵őјȶ&#xA;◾ƌԋɳɤdԢnɪɺѨ✵⁑Řж◾➌ԋѳ❤d&amp;quot;ŮŪѺɨĵ⁑Ř‶þ▌ȋ&#xA;ɳɤɤ™nѪѺɨ5⁑❘‶þ▌ȋɳŤdĢ❮ѪzŨ5ɑ❘6Ǿʌċųդɤ&#xA;•❮٪ѺŨ5ɑ⁘6Ǿ▌ԋsѤ❤ТⱮɪɺŨеɑɘ6þ▌ԋѳŤ❤&amp;quot;nj&#xA;źѨȵɑјĶ◾ҌċɳդѤ✢nѪźѨ✵❑⁘ȶǾҌċɳd❤™❮ɪźhȵ&#xA;Qј✶Ǿʌȋɳ❤❤™njѺɨеőјȶ◾ƌċѳѤ❤™❮٪zŨ‵ɑŘȶ&#xA;ǾʌȋsդɤТŮjɺhĵ⁑❘жǾ➌ԋѳdd•ⱮѪɺѨе❑X6ǾΌȋ&#xA;ųդ❤✢ɮŪɺɨ‵őX‶ǾƌȋųŤɤԢɮɪѺhе❑X✶◾ƌЋsդɤ&#xA;•nɪѺŨ‵őX6◾▌ЋsѤդĢn٪źѨȵɑŘж◾ƌȋɳ❤դ•Ů❪&#xA;źѨ‵ёɘ6ǾƌȋɳɤŤ™ѮŪzɨ5ёŘȶ◾▌ȋų❤dТѮŪɺɨĵ&#xA;❑ŘжǾ▌ԋųդ❤ТⱮ٪źѨĵё⁘Ķ◾ƌЋsɤ❤&amp;quot;ⱮjzŨ✵QX‶&#xA;◾ʌЋsdɤ http://goo.gl/E6vX7 ɑŘжþҌċ&#xA;ѳ❤dТnŪɺɨȵ⁑⁘‶◾▌ԋsѤѤ•Ɱ❪Ѻɨ5❑⁘‶◾ʌЋųŤd&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;Hints from twitter:&lt;/p&gt;&#xA;&lt;p&gt;Hint #1: RFC2781 from Planet Bigend&lt;/p&gt;&#xA;&lt;p&gt;Hint #2: Grok the last one&lt;/p&gt;&#xA;&lt;p&gt;Hint #3: It ain&amp;rsquo;t as long as it looks&lt;/p&gt;&#xA;&lt;p&gt;Hint #4: 73 64 64 22&lt;/p&gt;</description>
    </item>
    <item>
      <title>Apple&#39;s iOS Security Overview</title>
      <link>https://darthnull.org/apples-ios-security-overview/</link>
      <pubDate>Wed, 20 Jun 2012 01:18:00 -0400</pubDate>
      <guid>https://darthnull.org/apples-ios-security-overview/</guid>
      <description>&lt;p&gt;In late May, Apple quietly published a document entitled, simply, &lt;a href=&#34;http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf&#34;&gt;iOS Security&lt;/a&gt;. This short whitepaper describes several aspects of security within their iPad, iPhone, and iPod touch ecosystem, providing a high-level introduction to certain features and some fairly deep technical information for others. The stated goal is to help security-minded customers to better understand the core security features present in iOS. It&amp;rsquo;s definitely worth a read, but for now, let&amp;rsquo;s talk about some of the more interesting highlights.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Apple Using Unsalted Hashes Too?</title>
      <link>https://darthnull.org/apple-unsalted-hashes/</link>
      <pubDate>Thu, 07 Jun 2012 02:55:00 -0400</pubDate>
      <guid>https://darthnull.org/apple-unsalted-hashes/</guid>
      <description>&lt;p&gt;As the &lt;a href=&#34;http://blog.phishme.com/2012/06/linkedin-password-leak-what-it-means-for-phishing&#34;&gt;LinkedIn&lt;/a&gt; &lt;a href=&#34;http://www.theverge.com/2012/6/6/3067523/linkedin-password-leak-online&#34;&gt;password&lt;/a&gt; &lt;a href=&#34;http://www.liquidmatrix.org/blog/2012/06/06/linkedin-passwords-leaked-in-breach&#34;&gt;leak&lt;/a&gt; continues to occupy the time and attention of password-crackers, I thought it might be worth mentioning another high-profile site which apparently uses unsalted hashes.&lt;/p&gt;&#xA;&lt;p&gt;Two weeks ago, I discovered that Apple sends an unsalted SHA-256 hash as part of an AppleID authentication process. I was looking at traffic from my iPad using &lt;a href=&#34;http://mitmproxy.org/&#34;&gt;MITM Proxy&lt;/a&gt;, and came across the following interesting packet:&lt;/p&gt;&#xA;&lt;figure class=&#34;large&#34;&gt;&#xA;  &lt;a href=&#34;https://darthnull.org/media/2012/06/Redacted-Apple-Unsalted-Hash.png&#34;&gt;&lt;img src=&#34;https://darthnull.org/media/2012/06/Redacted-Apple-Unsalted-Hash.png&#34; title=&#34;&#34;&gt;&lt;/a&gt;&#xA;  &lt;figcaption&gt;&lt;p&gt;Redacted AppleID Authentication&lt;/p&gt;&lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;    &#xA;&#xA;&lt;p&gt;[Note &amp;ndash; I changed the AppleID and password hash fields, and also blocked out the exact host and URL].&lt;/p&gt;</description>
    </item>
    <item>
      <title>Verizon 2012 DBIR Challenge</title>
      <link>https://darthnull.org/2012-dbir-blurb/</link>
      <pubDate>Wed, 28 Mar 2012 10:30:00 -0400</pubDate>
      <guid>https://darthnull.org/2012-dbir-blurb/</guid>
      <description>&lt;p&gt;Every year, Verizon Business publishes the &lt;a href=&#34;http://securityblog.verizonbusiness.com/2012/03/22/2012-data-breach-investigations-report-released/&#34;&gt;Data Breach Investigations Report&lt;/a&gt; (DBIR). This year&amp;rsquo;s report analyzes of a cross-section of &amp;ldquo;855 incidents, 174 million compromised records&amp;rdquo; that have occurred over the past year. This was actually the eighth year they&amp;rsquo;ve produced the report, and it&amp;rsquo;s well worth the read.&lt;/p&gt;&#xA;&lt;p&gt;For me, it was especially worth the read this year. Every year since 2009, they&amp;rsquo;ve had a little cryptography puzzle embedded in the document. In 2009, it was a &lt;a href=&#34;https://darthnull.org/2011/04/12/2009-dbir-puzzle&#34;&gt;very simple cipher&lt;/a&gt;, hidden as a string of 1s and 0s in the background of the cover. The &lt;a href=&#34;http://www.truedigitalsecurity.com/blog/2010/08/26/solving-verizon-dbir-2010-cover-challenge/&#34;&gt;2010 puzzle&lt;/a&gt; was quite a bit different, and significantly harder. Then, last year, the cover challenge &lt;a href=&#34;http://www.truedigitalsecurity.com/blog/2011/04/28/solving-the-verizon-dbir-2011-cover-challenge-%E2%80%A6-again/&#34;&gt;got much more complicated&lt;/a&gt; (and, I think, quite a bit more interesting).&lt;/p&gt;</description>
    </item>
    <item>
      <title>2012 DBIR Puzzle - Archived Comments</title>
      <link>https://darthnull.org/2012-dbir-comments/</link>
      <pubDate>Wed, 28 Mar 2012 09:28:00 -0400</pubDate>
      <guid>https://darthnull.org/2012-dbir-comments/</guid>
      <description>&lt;h3 id=&#34;g-mark-hardy&#34;&gt;G Mark Hardy&lt;/h3&gt;&#xA;&lt;h4 id=&#34;march-28-2012-at-928-pm&#34;&gt;March 28, 2012 at 9:28 pm&lt;/h4&gt;&#xA;&lt;p&gt;Wow! That’s an impressive puzzle and an even more impressive solution. I always worry about putting this much complexity into a Con badge puzzle or contest, because few have the insight and the perseverence to grind it out to the end. Hey, with DEFCON 20 coming up, maybe we can up the difficulty factor a bit — especially if I can get Jeff to spring for an iPad as a prize! Well done! — G. Mark&lt;/p&gt;</description>
    </item>
    <item>
      <title>2012 Verizon DBIR Cover Challenge</title>
      <link>https://darthnull.org/2012-verizon-dbir-cover-challenge/</link>
      <pubDate>Wed, 28 Mar 2012 08:46:00 -0400</pubDate>
      <guid>https://darthnull.org/2012-verizon-dbir-cover-challenge/</guid>
      <description>&lt;figure class=&#34;right medium&#34;&gt;&#xA;  &lt;a href=&#34;https://darthnull.org/media/2012/03/dbir-cover.png&#34;&gt;&lt;img src=&#34;https://darthnull.org/media/2012/03/dbir-cover.png&#34; title=&#34;&#34;&gt;&lt;/a&gt;&#xA;  &lt;figcaption&gt;&lt;p&gt;DBIR Cover&lt;/p&gt;&lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;    &#xA;&#xA;&lt;p&gt;Every year, the Verizon Business Risk Team publishes a &lt;a href=&#34;http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf&#34;&gt;Data Breach Investigations Report (DBIR)&lt;/a&gt;, analyzing trends and other great statistical information gathered from working hundreds of different, well, data breaches. For the past few years, the report has included a puzzle / challenge / crypto contest. I heard about the &lt;a href=&#34;https://darthnull.org/2011/04/12/2009-dbir-puzzle&#34;&gt;2009 puzzle&lt;/a&gt; too late to play, gave up in disgust trying the 2010 puzzle, and skipped the 2011 puzzle (&amp;lsquo;cause I was actually working another puzzle at the time). This year&amp;rsquo;s report came out a few days ago, and I immediately launched into trying to solve it. It took a few days, but I managed to not only solve the challenge, but I came in first! Of course, as I&amp;rsquo;m prone to do, for every little step I took forward I first took about three giant steps sideways (often repeated in two or three different directions.)&lt;/p&gt;</description>
    </item>
    <item>
      <title>Verizon 2012 DBIR Sources</title>
      <link>https://darthnull.org/verizon-2012-dbir-sources/</link>
      <pubDate>Wed, 28 Mar 2012 08:42:00 -0400</pubDate>
      <guid>https://darthnull.org/verizon-2012-dbir-sources/</guid>
      <description>&lt;p&gt;This puzzle featured a large quantity of information from several locations on the net. It&amp;rsquo;d be impossible to fully replicate the &lt;em&gt;experience&lt;/em&gt; of sifting through all those locations, so I&amp;rsquo;m simply going to copy a representative sampling, along with those items that are necessary to solve the puzzle.&lt;/p&gt;&#xA;&lt;p&gt;I&amp;rsquo;ll separate each &amp;ldquo;stage&amp;rdquo; on this page to help, maybe, make it easier for you to try and focus on each part individually, without jumping ahead to the endgame.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Quick Look at Apple Configurator</title>
      <link>https://darthnull.org/quick-look-at-configurator/</link>
      <pubDate>Fri, 09 Mar 2012 01:08:00 -0500</pubDate>
      <guid>https://darthnull.org/quick-look-at-configurator/</guid>
      <description>&lt;p&gt;Shortly after the iPad event on Wednesday, Apple released the free [Apple Configurator](&lt;a href=&#34;http://itunes.apple.com/us/app/apple-configurator/id434433123?mt=12%22%3EApple&#34;&gt;http://itunes.apple.com/us/app/apple-configurator/id434433123?mt=12&amp;quot;&amp;gt;Apple&lt;/a&gt; Configurator) application. It&amp;rsquo;s billed as a way to &amp;ldquo;set up new devices, and install enterprise apps,&amp;rdquo; but my main interest was in learning how it might interact with &lt;a href=&#34;http://intrepidusgroup.com/insight/category/mobile-device-management&#34;&gt;Mobile Device Management&lt;/a&gt;. So I upgraded my iTunes to 10.6, installed the application, and started poking around.&lt;/p&gt;&#xA;&lt;p&gt;Essentially, Configurator allows you to maintain a fleet of identical iOS devices. With it, you can re-baseline up to 30 devices simultaneously, pre-installing applications and configuration profiles at the same time as wiping it clean and updating the OS version. The application allows you to create configuration profiles directly, or you may import profiles created in the [iPhone Configuration Utility](&lt;a href=&#34;http://www.apple.com/support/iphone/enterprise/%22&#34;&gt;http://www.apple.com/support/iphone/enterprise/&amp;quot;&lt;/a&gt; (IPCU). [Aside &amp;ndash; the IPCU was also updated on Wednesday, and both that and Configurator support some new features, including the ability to disable Siri when the device is locked. Interestingly, Configurator also includes the ability to enable a &amp;ldquo;Siri Profanity Filter&amp;rdquo; and to disable Location Services, neither of which I&amp;rsquo;ve been able to find in the new IPCU.] The Configurator doesn&amp;rsquo;t include the capability to create an MDM enrollment profile, but you can import one from IPCU and it works just fine.&lt;/p&gt;</description>
    </item>
    <item>
      <title>MDM Hacks - Archived Comments</title>
      <link>https://darthnull.org/mdm-comments/</link>
      <pubDate>Mon, 27 Feb 2012 08:33:00 -0500</pubDate>
      <guid>https://darthnull.org/mdm-comments/</guid>
      <description>&lt;h3 id=&#34;alexander&#34;&gt;Alexander&lt;/h3&gt;&#xA;&lt;h4 id=&#34;february-27-2012-at-833-am&#34;&gt;February 27, 2012 at 8:33 am&lt;/h4&gt;&#xA;&lt;p&gt;Hello!&lt;/p&gt;&#xA;&lt;p&gt;My question is not about this topic.&lt;/p&gt;&#xA;&lt;p&gt;I’ve seen in some mdm companies apps function to gps-tracking (&lt;a href=&#34;http://www.amtelnet.com/mdm/lost-device-gps-tracking.php&#34;&gt;http://www.amtelnet.com/mdm/lost-device-gps-tracking.php&lt;/a&gt;, &lt;a href=&#34;http://www.amtelnet.com/mdm/lost-device-gps-track&#34;&gt;http://www.amtelnet.com/mdm/lost-device-gps-track&lt;/a&gt;, &lt;a href=&#34;http://www.amtelnet.com/mdm/lost-device-gps-track)%3E&amp;amp;#8230;&#34;&gt;http://www.amtelnet.com/mdm/lost-device-gps-track)&amp;gt;&amp;amp;#8230;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Is it possible to do with just mdm? Or this tracking made by some kind of ip location service?&lt;/p&gt;&#xA;&lt;h3 id=&#34;david_schuetz&#34;&gt;david_schuetz&lt;/h3&gt;&#xA;&lt;h4 id=&#34;february-27-2012-at-1016-am&#34;&gt;February 27, 2012 at 10:16 am&lt;/h4&gt;&#xA;&lt;p&gt;Apple’s MDM system does not provide geolocation capability. This functionality can be provided by a 3rd party vendor through use of vendor-specific programs on the device, which might be able to periodically poll for position changes and send that information back to a central location, where the MDM console could then display and make use of it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iOS MDM: Preventing Disassociation DOS and Potemkin Devices</title>
      <link>https://darthnull.org/mdm-dos-potemkin/</link>
      <pubDate>Wed, 22 Feb 2012 04:10:00 -0500</pubDate>
      <guid>https://darthnull.org/mdm-dos-potemkin/</guid>
      <description>&lt;p&gt;I was thinking a couple of weeks ago about additional vulnerabilities in iOS Mobile Device Management, and noticed a couple of problems that I had not considered before.&lt;/p&gt;&#xA;&lt;p&gt;It may be possible for a malicious individual, whether an outside attacker or inside troublemaker, to forge fake responses to the MDM server. They could, it seems:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Send the server fake TokenUpdate commands&lt;/li&gt;&#xA;&lt;li&gt;Send the server fake responses to real commands&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;In both cases, the attacker would need to know the UDID of the device they&amp;rsquo;re trying to impersonate.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Verifying a Detached S/MIME Signature in Python</title>
      <link>https://darthnull.org/verifying-a-detatched-smime-signature-in-python/</link>
      <pubDate>Tue, 21 Feb 2012 10:33:00 -0500</pubDate>
      <guid>https://darthnull.org/verifying-a-detatched-smime-signature-in-python/</guid>
      <description>&lt;p&gt;I was recently experimenting some more with my &lt;a href=&#34;https://github.com/intrepidusgroup/imdmtools&#34;&gt;iOS MDM server&lt;/a&gt;, and found that I needed to verify inbound signatures on the messages the clients send to the server. It took some doing, but eventually I found the right way to handle it at the command line.&lt;/p&gt;&#xA;&lt;p&gt;I had to take the signature (in this case, provided as a base-64 string in the HTTP header), decode it, and save it to a file. Then I needed a copy of the public key for the certificate used to sign the message, and finally, I had to copy the text of the message itself to another file. Once all that was done, it was something like this:&lt;/p&gt;</description>
    </item>
    <item>
      <title>BSides Phoenix 2012 Badge Puzzle</title>
      <link>https://darthnull.org/bsides-phoenix-2012-badge-puzzle/</link>
      <pubDate>Sun, 19 Feb 2012 11:44:00 -0500</pubDate>
      <guid>https://darthnull.org/bsides-phoenix-2012-badge-puzzle/</guid>
      <description>&lt;p&gt;Sitting at home yesterday morning, watching cartoons with the kids and checking my Twitter feed, I saw a tweet from Georgia Weidman with a picture of the badge from BSides Phoenix. It looked like an awesome badge, made out of hefty chrome and with an integrated bottle opener. It also had a puzzle on it. There goes the rest of my morning&amp;hellip;.&lt;/p&gt;&#xA;&#xA;&lt;p style=&#34;text-align:center;font-weight:bold;color:red;&#34;&gt;As always, if you’d like to try to solve this yourself, then STOP now, as the rest of this post is full of spoilers. If you’d like to see just the images needed to solve the puzzle, click here: &lt;a href=&#39;https://darthnull.org/2012/02/19/bsidesphx-images&#39;&gt;BSidesPHX 2012 Images&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>BSidesPHX 2012 Images</title>
      <link>https://darthnull.org/bsidesphx-images/</link>
      <pubDate>Sun, 19 Feb 2012 11:44:00 -0500</pubDate>
      <guid>https://darthnull.org/bsidesphx-images/</guid>
      <description>&lt;p&gt;The badge (as tweeted by Georgia Weidman):&#xA;&lt;img src=&#34;https://darthnull.org/media/2012/02/phx-badge.jpg&#34; alt=&#34;Badge&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;And, later, you&amp;rsquo;ll get this image (but don&amp;rsquo;t look too closely at it until you solve the first stage):&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://darthnull.org/media/2012/02/phx-challenge2012.png&#34; alt=&#34;Challenge 2012&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Changes to iOS 5.0 MDM - Archived Comments</title>
      <link>https://darthnull.org/mdm-changes-comments/</link>
      <pubDate>Wed, 15 Feb 2012 07:22:00 -0500</pubDate>
      <guid>https://darthnull.org/mdm-changes-comments/</guid>
      <description>&lt;h3 id=&#34;van&#34;&gt;Van&lt;/h3&gt;&#xA;&lt;h4 id=&#34;february-15-2012-at-722-am&#34;&gt;February 15, 2012 at 7:22 am&lt;/h4&gt;&#xA;&lt;p&gt;Hello.&lt;/p&gt;&#xA;&lt;p&gt;First of all thank you for your work.&lt;/p&gt;&#xA;&lt;p&gt;Now question:&lt;/p&gt;&#xA;&lt;p&gt;I’m trying your sample with regular apple developer program.&lt;/p&gt;&#xA;&lt;p&gt;server - MacOS&lt;/p&gt;&#xA;&lt;p&gt;device - iPhone4 iOS 5.0.1&lt;/p&gt;&#xA;&lt;p&gt;1 - Create new AppID that looks like “com.apple.mgmt.COMPANY.PRODUCT_NAME” (this is not very clear from README).&lt;/p&gt;&#xA;&lt;p&gt;2 - Intall web.py (not easy step but this is general question, not mdm related)&lt;/p&gt;&#xA;&lt;p&gt;3 - Perform other steps from README, server address is ip-address.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2008 Puzzle - Archived Comments</title>
      <link>https://darthnull.org/shmoocon-2008-comments/</link>
      <pubDate>Fri, 10 Feb 2012 12:24:00 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-2008-comments/</guid>
      <description>&lt;h3 id=&#34;g-mark-hardy&#34;&gt;G Mark Hardy&lt;/h3&gt;&#xA;&lt;h4 id=&#34;february-10-2012-at-1224-pm&#34;&gt;February 10, 2012 at 12:24 pm&lt;/h4&gt;&#xA;&lt;p&gt;Very impressive! This is the most complex badge puzzle I’ve seen for a hacker conference. Although it took nearly four years for a solution to be published, Darth is the guy I would have bet on to do it.&lt;/p&gt;&#xA;&lt;p&gt;(Darth — Now you can turn your attention to my business card puzzle — it’s been unsolved for the same length of time :)&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2008 Badge Puzzle</title>
      <link>https://darthnull.org/shmoocon-2008-badge-puzzle/</link>
      <pubDate>Sat, 04 Feb 2012 10:20:00 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-2008-badge-puzzle/</guid>
      <description>&lt;figure class=&#34;medium right&#34;&gt;&#xA;  &lt;a href=&#34;https://darthnull.org/media/2012/02/shmoocon-badge6.png&#34;&gt;&lt;img src=&#34;https://darthnull.org/media/2012/02/shmoocon-badge6.png&#34; title=&#34;&#34;&gt;&lt;/a&gt;&#xA;  &lt;figcaption&gt;&lt;p&gt;Badge 6&lt;/p&gt;&lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;    &#xA;&#xA;&lt;p&gt;I&amp;rsquo;ve been having a great time solving puzzles at security conferences. I think the first significant puzzle I&amp;rsquo;d seen was at ShmooCon 4, in 2008, but I didn&amp;rsquo;t even try to solve that, partially because the bug hadn&amp;rsquo;t yet bitten me, and partially because I didn&amp;rsquo;t have any computer with me at the time.&#xA;So now, four years later, I figured it was time to finally complete this puzzle. They gave a rough outline of the solution at the closing ceremony, but for this puzzle the challenge was less of a mystery than an implementation problem.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2012 Puzzle - Archived Comments</title>
      <link>https://darthnull.org/shmoocon-2012-comments/</link>
      <pubDate>Sat, 04 Feb 2012 06:14:00 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-2012-comments/</guid>
      <description>&lt;h3 id=&#34;gmark-hardy-g_mark&#34;&gt;GMark Hardy (@g_mark)&lt;/h3&gt;&#xA;&lt;h4 id=&#34;february-4-2012-at-614-pm&#34;&gt;February 4, 2012 at 6:14 pm&lt;/h4&gt;&#xA;&lt;p&gt;Another fun puzzle for Shmoocon fans. BTW, I included a more straightforward alternate way of ordering the badges if you couldn’t figure out the date sequence. As Darth said, you can do a frequency analysis or line up the last letter of each row. You could even brute-force all 7! permutations (5,040). But all of those are too much work, if you ask me. Just take the first letter of each badge text block (C – C – E – N – N – O – T), and solve that like a JUMBLE puzzle — only one seven letter word works — CONNECT. Now you’re down from 5,040 permutations to 4. Read column two, and if you get R – E – A – R – S – G – E, for example, you’ve got the C’s reversed (positions 1 and 6) — so swap those badges around and you get G – E – A – R – S – S – E in column two, and you’re onto the next stage with directions in hand. :) Congratulations to Darth for a great puzzle, and looking forward to more.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2012 Badge Puzzle</title>
      <link>https://darthnull.org/shmoocon-2012-badge-puzzle/</link>
      <pubDate>Fri, 03 Feb 2012 11:06:00 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-2012-badge-puzzle/</guid>
      <description>&lt;figure class=&#34;medium right&#34;&gt;&#xA;  &lt;a href=&#34;https://darthnull.org/media/2012/02/shmoocon-speakerbadge.png&#34;&gt;&lt;img src=&#34;https://darthnull.org/media/2012/02/shmoocon-speakerbadge.png&#34; title=&#34;&#34;&gt;&lt;/a&gt;&#xA;  &lt;figcaption&gt;&lt;p&gt;Speaker badge&lt;/p&gt;&lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;    &#xA;&#xA;&lt;p&gt;For three years running, I (or I with a co-worker) have been the first person to solve the ShmooCon Badge puzzle. (I&amp;rsquo;m also, I believe, the only outsider to have solved the 2008 badge puzzle, but that&amp;rsquo;s another post). Seems like it&amp;rsquo;s time for me to stop playing.&lt;/p&gt;&#xA;&lt;p&gt;So I asked Heidi if I could do the puzzle this year, and she agreed. We went back and forth many times over a few weeks, and got a lot of advice and suggested changes from G. Mark Hardy (who&amp;rsquo;d written the last three puzzles). Finally, just a few days before everything had to go to the printers, we put a fork in it and decided the puzzle was &amp;ldquo;done.&amp;rdquo;&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2012 Puzzle Data</title>
      <link>https://darthnull.org/shmoocon-8-ciphertexts/</link>
      <pubDate>Fri, 03 Feb 2012 11:06:00 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-8-ciphertexts/</guid>
      <description>&lt;p&gt;The badge contest for ShmooCon 8 included several components &amp;ndash; seven badges, five auto repair slips, a gear machine, and a short ciphertext.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://darthnull.org/media/2012/02/sc8-badges.png&#34; alt=&#34;All Badges&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://darthnull.org/media/2012/02/sc8-gearmesh.png&#34; alt=&#34;Meshed Gears&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://darthnull.org/media/2012/02/sc8-slips.png&#34; alt=&#34;Repair Slips&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://darthnull.org/media/2012/02/sc8-finalgears.png&#34; alt=&#34;Final Gears&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://darthnull.org/media/2012/02/sc8-hint.png&#34; alt=&#34;Hint&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://darthnull.org/media/2012/02/sc8-fig_3-14.png&#34; alt=&#34;Fig 3.14&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2012 Puzzle Slides</title>
      <link>https://darthnull.org/sc8-closing/</link>
      <pubDate>Fri, 03 Feb 2012 11:06:00 -0500</pubDate>
      <guid>https://darthnull.org/sc8-closing/</guid>
      <description>&lt;p&gt;My slides from closing ceremonies for ShmooCon 8 (January 29, 2012). A walkthrough of the badge puzzle.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Changes to Apple MDM for iOS 5.x</title>
      <link>https://darthnull.org/ios5-mdm-changes/</link>
      <pubDate>Tue, 31 Jan 2012 10:11:00 -0500</pubDate>
      <guid>https://darthnull.org/ios5-mdm-changes/</guid>
      <description>&lt;p&gt;Last Saturday (January 28), I presented an updated talk on Apple&amp;rsquo;s iOS MDM system at &lt;a href=&#34;http://www.shmoocon.org/speakers#inside&#34;&gt;ShmooCon 8&lt;/a&gt;. I had a great time, and really enjoyed all the questions and nice comments I received afterwards. I thought I&amp;rsquo;d mention a couple of the changes that iOS 5 provide.&lt;/p&gt;&#xA;&lt;p&gt;First, the devices support some additional restrictions and controls. These controls should be available in most commercial MDM solutions, and can also be found in the &lt;a href=&#34;http://support.apple.com/kb/DL1465&#34;&gt;iPhone Configuration Utility&lt;/a&gt; (IPCU). Among these new controls are the ability to:&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2012 - Apple MDM Slides</title>
      <link>https://darthnull.org/sc12-inside-mdm-slides/</link>
      <pubDate>Sat, 28 Jan 2012 04:00:00 -0500</pubDate>
      <guid>https://darthnull.org/sc12-inside-mdm-slides/</guid>
      <description>&lt;p&gt;My slides from ShmooCon 8, August 4, 2011.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iOS MDM Command Reference </title>
      <link>https://darthnull.org/mdm-command-reference/</link>
      <pubDate>Thu, 26 Jan 2012 12:00:00 -0500</pubDate>
      <guid>https://darthnull.org/mdm-command-reference/</guid>
      <description>&lt;p&gt;Extract from my iOS MDM paper, detailing just the MDM protocol commands and responses. Updated for iOS 5.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Finding Which Root CAs You Actually Use</title>
      <link>https://darthnull.org/which-roots-youve-used/</link>
      <pubDate>Fri, 02 Sep 2011 10:23:00 -0400</pubDate>
      <guid>https://darthnull.org/which-roots-youve-used/</guid>
      <description>&lt;p&gt;With all the recent talk about fake SSL certs issued by root-level Certificate Authorities at Comodo and DigiNotar and so forth, I thought it&amp;rsquo;d be interesting to run a little experiment. One thing that these compromises have highlighted is the huge number of root certificate authorities in modern operating systems and browsers. But how many of those are actually in use? How many sites that I visit are certified by each of the roots?&lt;/p&gt;</description>
    </item>
    <item>
      <title>BlackHat 2011 Fidelis Puzzle - Archived Comments</title>
      <link>https://darthnull.org/fidelis-2011-comments/</link>
      <pubDate>Tue, 30 Aug 2011 09:35:00 -0400</pubDate>
      <guid>https://darthnull.org/fidelis-2011-comments/</guid>
      <description>&lt;h3 id=&#34;will-irace-spblat&#34;&gt;Will Irace (@spblat)&lt;/h3&gt;&#xA;&lt;h4 id=&#34;august-30-2011-at-935-pm&#34;&gt;August 30, 2011 at 9:35 pm&lt;/h4&gt;&#xA;&lt;p&gt;I am so glad our puzzle grabbed your brain and wouldn’t let go. :-) Thanks for a killer writeup.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Lose $1000 in Vegas Without Even Gambling</title>
      <link>https://darthnull.org/bh11-fidelis-puzzle/</link>
      <pubDate>Tue, 30 Aug 2011 09:04:00 -0400</pubDate>
      <guid>https://darthnull.org/bh11-fidelis-puzzle/</guid>
      <description>&lt;p&gt;On July 15, Fidelis Security Solutions announced that they&amp;rsquo;d be running &lt;a href=&#34;http://www.fidelissecurity.com/node/287&#34;&gt;a crypto puzzle&lt;/a&gt; at Black Hat. And that the prize would be $1000. So, naturally, I was quite interested.  I went to their site, downloaded the puzzle, and set to work:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;^&#xA;¥Ð§µ    &#xA;¶®Æä&#xA;æ©×ä&#xA;÷ĳŒĐ&#xA;ƆķėĲ&#xA;ŦůŶū&#xA;ƂƐƔƆ&#xA;ŦƉƶǴ&#xA;ƆƅƦƬ&#xA;ǆƹɇʃ&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&#xA;&lt;p style=&#34;text-align:center;font-weight:bold;color:red;&#34;&gt;As always, if you’d like to try to solve this yourself, then STOP now, as the rest of this post is full of spoilers. The text above is all that you need to get started, or you can &lt;a href=&#34;https://darthnull.org/2011/08/30/fidelis-bh11-ciphertext&#34;&gt;click here&lt;/a&gt; to see the ciphertext and the hints that were revealed during the conference.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fidelis Security &#34;Decode This&#34; Black Hat Challenge</title>
      <link>https://darthnull.org/fidelis-bh11-ciphertext/</link>
      <pubDate>Tue, 30 Aug 2011 05:02:00 -0400</pubDate>
      <guid>https://darthnull.org/fidelis-bh11-ciphertext/</guid>
      <description>&lt;p&gt;Ciphertext:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;^&#xA;¥Ð§µ    &#xA;¶®Æä&#xA;æ©×ä&#xA;÷ĳŒĐ&#xA;ƆķėĲ&#xA;ŦůŶū&#xA;ƂƐƔƆ&#xA;ŦƉƶǴ&#xA;ƆƅƦƬ&#xA;ǆƹɇʃ&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;Hints (provided every few hours via Twitter):&lt;/p&gt;&#xA;&lt;ol&gt;&#xA;&lt;li&gt;line breaks for clarity, not part of puzzle. neither is ^.&lt;/li&gt;&#xA;&lt;li&gt;the word &amp;ldquo;Fidelis&amp;rdquo; is part of the message&lt;/li&gt;&#xA;&lt;li&gt;get to know xxd&lt;/li&gt;&#xA;&lt;li&gt;&amp;ldquo;yen&amp;rdquo; and &amp;ldquo;mu&amp;rdquo; are the same [used actual chars]&lt;/li&gt;&#xA;&lt;li&gt;There are 20 characters in the message.&lt;/li&gt;&#xA;&lt;li&gt;&amp;lsquo;C2A5&amp;rsquo; =~ /.{3}(.)/&lt;/li&gt;&#xA;&lt;li&gt;Take a nybble out of each sybble. All you need is $1&lt;/li&gt;&#xA;&lt;li&gt;50 75 6E 64&lt;/li&gt;&#xA;&lt;li&gt;[a perl script to decode the ciphertext]&lt;/li&gt;&#xA;&lt;/ol&gt;</description>
    </item>
    <item>
      <title>First Anniversary</title>
      <link>https://darthnull.org/first-anniversary/</link>
      <pubDate>Tue, 23 Aug 2011 08:46:00 -0400</pubDate>
      <guid>https://darthnull.org/first-anniversary/</guid>
      <description>&lt;p&gt;A year ago today, I left the comfortable confines of an 18-year career in big-name Government contracting, and joined a very small security startup called &lt;a href=&#34;http://www.intrepidusgroup.com&#34;&gt;Intrepidus Group&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;It&amp;rsquo;s been an interesting year.&lt;/p&gt;&#xA;&lt;p&gt;One major change &amp;ndash; I&amp;rsquo;ve really stepped up my blogging. I&amp;rsquo;ve posted detailed analysis on issues ranging from the &lt;a href=&#34;http://intrepidusgroup.com/insight/2011/03/risk-posed-by-securid-hack&#34;&gt;RSA breach&lt;/a&gt; (including a &lt;a href=&#34;http://intrepidusgroup.com/insight/2011/03/quantifying-theoretical-rsa-securid-attack&#34;&gt;theoretical attack&lt;/a&gt; on their SecurID tokens) to the question of whether iPhones were &lt;a href=&#34;http://intrepidusgroup.com/insight/2011/04/ios-location-db-privacy&#34;&gt;tracking your location&lt;/a&gt; (I still say &amp;ldquo;no.&amp;rdquo;)&lt;/p&gt;</description>
    </item>
    <item>
      <title>BlackHat 2011 Preview - Archived Comments</title>
      <link>https://darthnull.org/blackhat-2011-comments/</link>
      <pubDate>Sun, 21 Aug 2011 06:49:00 -0400</pubDate>
      <guid>https://darthnull.org/blackhat-2011-comments/</guid>
      <description>&lt;h3 id=&#34;barry&#34;&gt;Barry&lt;/h3&gt;&#xA;&lt;h4 id=&#34;august-21-2012-at-649-pm&#34;&gt;August 21, 2012 at 6:49 pm&lt;/h4&gt;&#xA;&lt;p&gt;David, great presentation. I wasn’t there to see it but have read through your whitepaper. Do you ever get involved with Open Source projects? Would love to speak with you about an open source MDM project that I am working on.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Strengths and Weaknesses in Apple&#39;s MDM System</title>
      <link>https://darthnull.org/apple-mdm-talk/</link>
      <pubDate>Fri, 05 Aug 2011 09:21:00 -0400</pubDate>
      <guid>https://darthnull.org/apple-mdm-talk/</guid>
      <description>&lt;p&gt;Yesterday, for the first time, I headlined a talk at a major security conference. It was quite the experience, and not nearly as nerve-wracking as I might&amp;rsquo;ve expected. Actually, it was pretty easy &amp;ndash; I took the approach that &amp;ldquo;this is some cool stuff I found, let me tell you about it&amp;rdquo; and kept a conversational mindset. Don&amp;rsquo;t know if that&amp;rsquo;s what experienced presenters do, but it worked for me, and I think I pulled it off. Achievement: UNLOCKED.&lt;/p&gt;</description>
    </item>
    <item>
      <title>BlackHat 2011 - Apple MDM Paper</title>
      <link>https://darthnull.org/bh11-inside-mdm-paper/</link>
      <pubDate>Thu, 04 Aug 2011 01:45:00 -0400</pubDate>
      <guid>https://darthnull.org/bh11-inside-mdm-paper/</guid>
      <description>&lt;p&gt;A detailed description of the Apple iOS Mobile Device Management (MDM) protocol. Presented at Black Hat USA on August 4, 2011.&lt;/p&gt;</description>
    </item>
    <item>
      <title>BlackHat 2011 - Apple MDM Slides</title>
      <link>https://darthnull.org/bh11-inside-mdm-slides/</link>
      <pubDate>Thu, 04 Aug 2011 01:45:00 -0400</pubDate>
      <guid>https://darthnull.org/bh11-inside-mdm-slides/</guid>
      <description>&lt;p&gt;My slides from Black Hat USA, August 4, 2011.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CarolinaCon Flag Puzzle - Archived Comments</title>
      <link>https://darthnull.org/carolinacon-flag-comments/</link>
      <pubDate>Thu, 28 Jul 2011 11:27:00 -0400</pubDate>
      <guid>https://darthnull.org/carolinacon-flag-comments/</guid>
      <description>&lt;h3 id=&#34;g-mark&#34;&gt;G. Mark&lt;/h3&gt;&#xA;&lt;h4 id=&#34;july-28-2011-at-1127-am&#34;&gt;July 28, 2011 at 11:27 am&lt;/h4&gt;&#xA;&lt;p&gt;Interesting observation about “shifting” the keys for ciphertexts 2 and 3. That wasn’t necessary if you feed the ciphertext into a Vigenère three times with the three keys. The offset is zero for each, beginning with the start of the message, so that the transition from one key to the other is not dependent upon the ciphertext length. Again, simplify. :)&lt;/p&gt;&#xA;&lt;p&gt;BTW, for the winner of the crypto contest (Joel Kerr), I sent an NSA challenge coin and an official NSA reproduction of a Civil War field cipher wheel that would have been used for encoding/decoding messages during the war. – G. Mark&lt;/p&gt;</description>
    </item>
    <item>
      <title>DEF CON 16 Puzzle - Archived Comments</title>
      <link>https://darthnull.org/dc16-puzzle-comments/</link>
      <pubDate>Thu, 28 Jul 2011 11:18:00 -0400</pubDate>
      <guid>https://darthnull.org/dc16-puzzle-comments/</guid>
      <description>&lt;h3 id=&#34;g-mark&#34;&gt;G. Mark&lt;/h3&gt;&#xA;&lt;h4 id=&#34;july-28-2011-at-1118-am&#34;&gt;July 28, 2011 at 11:18 am&lt;/h4&gt;&#xA;&lt;p&gt;Well done! Congratulations on solving yet another G. Mark crypto puzzle (and thank you for taking the time to make such a detailed write-up.) – G. Mark&lt;/p&gt;</description>
    </item>
    <item>
      <title>Inside Apple&#39;s MDM Black Box -- Black Hat USA 2011</title>
      <link>https://darthnull.org/blackhat-blurb/</link>
      <pubDate>Thu, 28 Jul 2011 09:14:00 -0400</pubDate>
      <guid>https://darthnull.org/blackhat-blurb/</guid>
      <description>&lt;p&gt;Since joining Intrepidus Group, I&amp;rsquo;ve spent a good deal of time helping to assess risk and craft security guidelines for iOS devices in large enterprises. A major factor in securing iStuff in the enterprise relies upon the use of Mobile Device Management technology (MDM).  MDM has been around for a while, especially for some of the older, more corporately-established mobile devices (like BlackBerry or Windows Mobile). Last summer, though, Apple jumped into the arena, adding support for their devices as part of iOS 4.0.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Great Googly Moogly! I&#39;m speaking at Black Hat!</title>
      <link>https://darthnull.org/blackhat-2011-preview/</link>
      <pubDate>Thu, 28 Jul 2011 09:02:00 -0400</pubDate>
      <guid>https://darthnull.org/blackhat-2011-preview/</guid>
      <description>&lt;p&gt;One week from today I&amp;rsquo;ll be presenting a talk at Black Hat. Black Hat! Wow. I&amp;rsquo;m still a little amazed at this turn of events, but am trying not to dwell on it for fear of slipping into a blind panic. :)&lt;/p&gt;&#xA;&lt;p&gt;But I think I&amp;rsquo;m ready. I submitted a nice long white paper a couple of weeks ago, and sent in my presentation yesterday. I&amp;rsquo;m comfortable with the material. I (think) I&amp;rsquo;ll be able to intelligently field questions. I&amp;rsquo;m pretty sure I won&amp;rsquo;t be a complete, blithering idiot on stage. And to settle my nerves, I&amp;rsquo;ve put in an early order for a bottle of Drambuie. Though I think I&amp;rsquo;ll save that for the obligatory post-talk celebration.&lt;/p&gt;</description>
    </item>
    <item>
      <title>DEF CON 16 Punch Card Puzzle</title>
      <link>https://darthnull.org/def-con-16-punch-card-puzzle/</link>
      <pubDate>Wed, 27 Jul 2011 10:15:00 -0400</pubDate>
      <guid>https://darthnull.org/def-con-16-punch-card-puzzle/</guid>
      <description>&lt;p&gt;Back in 2008, at DEF CON 16, G. Mark Hardy presented his second crypto challenge. I didn&amp;rsquo;t go to DC16, so I didn&amp;rsquo;t see the challenge (and even if I had, I wasn&amp;rsquo;t really tracking these at the time). But in 2010, at ShmooCon, he dusted the challenge off and handed it out again, as nobody had solved it yet. I&amp;rsquo;d managed, with a buddy, to solve the ShmooCon badge puzzle that year, and after I got home I started on the DC16 puzzle. It took me a few days, but I managed to beat it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Nails in the Crypt - Archvied Comments</title>
      <link>https://darthnull.org/nails-comments/</link>
      <pubDate>Mon, 23 May 2011 10:40:00 -0400</pubDate>
      <guid>https://darthnull.org/nails-comments/</guid>
      <description>&lt;h3 id=&#34;andy&#34;&gt;Andy&lt;/h3&gt;&#xA;&lt;h4 id=&#34;may-23-2011-at-1040-pm&#34;&gt;May 23, 2011 at 10:40 pm&lt;/h4&gt;&#xA;&lt;p&gt;Why such short chain lengths?  Can’t you decrease the rainbow table size with a linear increase in search time by simply moving from 10,000 entry chains to 100,000 entry chains?  Since chaining is cheap even with an expensive hash, it seems like an obvious win.&lt;/p&gt;&#xA;&lt;h3 id=&#34;david_schuetz&#34;&gt;david_schuetz&lt;/h3&gt;&#xA;&lt;h4 id=&#34;may-24-2011-at-231-pm&#34;&gt;May 24, 2011 at 2:31 pm&lt;/h4&gt;&#xA;&lt;p&gt;I needed something to work with, and in testing, 10,000 seemed workable while 100,000 was pretty slow. Keep in mind that the DES routine is slower than the MD5 (about 9x), so having the chain lengths about 1/10 the size keeps the times similar.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CarolinaCon Flag Puzzle</title>
      <link>https://darthnull.org/carolinacon-flag-puzzle/</link>
      <pubDate>Sun, 08 May 2011 11:04:00 -0400</pubDate>
      <guid>https://darthnull.org/carolinacon-flag-puzzle/</guid>
      <description>&lt;p&gt;About two weeks ago, G. Mark Hardy asked if I was planning to attend CarolinaCon at the end of April. He had a puzzle set to go and was even thinking of using me as a clue.  I replied that I wouldn&amp;rsquo;t be at the con, but would love to see the puzzle. So he sent me a copy.&lt;/p&gt;&#xA;&lt;p&gt;Here is what he sent me, which was printed on the conference badge:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Analysis of iOS Location Data from Multiple Devices</title>
      <link>https://darthnull.org/analysis-of-ios-location-data/</link>
      <pubDate>Mon, 25 Apr 2011 05:21:00 -0400</pubDate>
      <guid>https://darthnull.org/analysis-of-ios-location-data/</guid>
      <description>&lt;p&gt;This &amp;ldquo;Your iPhone Is Tracking Your Every Move!!&amp;rdquo; craziness just won&amp;rsquo;t go away. I&amp;rsquo;ve been kind of disappointed by the lack of very detailed analysis of the data that&amp;rsquo;s actually being collected, so I spent some time collecting information of my own.&lt;/p&gt;&#xA;&lt;p&gt;I have access to four iOS devices running 4.0 or better: my personal iPhone 3GS, a family iPad with 3G subscription, a company-owned iPad (whose 3G has never been activated), and just arrived an iPad 2 that belongs to a client. So I spent some time this weekend trying to better understand what the Core Location daemons are doing.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Is the iOS 4 location tracking privacy issue overblown? </title>
      <link>https://darthnull.org/location-privacy-overblown/</link>
      <pubDate>Wed, 20 Apr 2011 04:20:00 -0400</pubDate>
      <guid>https://darthnull.org/location-privacy-overblown/</guid>
      <description>&lt;p&gt;Earlier today, a &lt;a href=&#34;http://radar.oreilly.com/2011/04/apple-location-tracking.html&#34;&gt;story broke&lt;/a&gt; about a database on the iPhone that appeared to track the user&amp;rsquo;s location. The implication was that anyone could discover where, and when, the device&amp;rsquo;s owner had been.&lt;/p&gt;&#xA;&lt;p&gt;As far as I can see, this is only partially true. I looked at the database on my own phone, and could see places I&amp;rsquo;ve been, including my home and office.  However, contrary to what the current buzz seems to be, it&amp;rsquo;s not a long-term breadcrumb trail of my activities.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The 2009 Verizon Data Breach Investigation Report</title>
      <link>https://darthnull.org/2009-dbir-puzzle/</link>
      <pubDate>Tue, 12 Apr 2011 11:45:00 -0400</pubDate>
      <guid>https://darthnull.org/2009-dbir-puzzle/</guid>
      <description>&lt;p&gt;In 2009, the Verizon Business Risk Team released their first public Data Breach Investigations Report. I saw it reasonably soon after release, and noticed a whole bunch of binary numbers in the background on the cover. &amp;ldquo;Cool,&amp;rdquo; I thought, but I didn&amp;rsquo;t bother trying to decode it. A week or so later, I learned that there&amp;rsquo;d been a contest, and I missed out. :(&lt;/p&gt;&#xA;&lt;p&gt;In 2010, I was ready, and tried to solve the puzzle, but failed. That story comes later.&lt;/p&gt;</description>
    </item>
    <item>
      <title>2009 Verizon DBIR Ciphertext</title>
      <link>https://darthnull.org/2009-dbir-ciphertext/</link>
      <pubDate>Tue, 12 Apr 2011 10:38:00 -0400</pubDate>
      <guid>https://darthnull.org/2009-dbir-ciphertext/</guid>
      <description>&lt;p&gt;Background image on the report cover page:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;01000101010101100100111001010100010110000100100101000111010110010100100101001101010101110101001101001110010001010&#xA;10010000100010101001001010001010100011001001111010101000101100001000010010100110100001101010111010110010100100001&#xA;01001001010001010011010101011101000111010101010101101001000001010000100101011001011001010000110100001001000010010&#xA;00110010100100100010101011001010001100100001001010110010001010100010001001011010001010101011001001101010001100101&#xA;00100100100101000110010011100100011101000110010011100101001001000010010001100100011101010110010010110101001101000&#xA;11001010000010011100100001001010101010001100101101001001010010001110100001101000101010001010100010101010111010000&#xA;01010010110100100001010000010110000100010101000010010101000101101001001010010000110101101001001111010101110100011&#xA;10101010001000010010100110101000101000111010101000100110101001001010000010101100101000100010100000101100101000100&#xA;01010010010010010101001001011001010001010101010001001011010000110100101001010010010100000101100101001000010001010&#xA;10100000101011101001011010101010100111101000001010001010100101101001110010101100101010001010110010110100100100001&#xA;01001101001101010110100100111001010100010101000100100101010110010010010100101101001101010011010101001001011001010&#xA;10011010011100101010101001001010000010100101101000010010100100100101101010001010011010101001101010100010110010100&#xA;00110100011101000011010000110101001001001100010100100101001001001001010010010101001001000101010001100100011101011&#xA;00101010100010010100101010101000010010101010101100001001000010001010101100101010011010001110100110001000101010110&#xA;01010100100101011001001000010010010101100101011000010001000100010101011001010110100100001101001010010010110101011&#xA;00101010001001111010100110100111101001001010110000100101001000101010010000100111101011000010001010101011001001101&#xA;01010111010010100100001001001110010110100100110101010100010010110101011101011010010001010100011001001111010001100&#xA;10000110100111001000010010101110100111001000011010101010101011101001101010110010100011001001001010101010101011001&#xA;00001001001011010101110100111001010000010101110101010001011001010011110100010101011001010100010101010001001001010&#xA;10010010100100101100101010010010000110100110101001110010101100100011001010110010011000101001001010011010000100100&#xA;11100101010001010000010101110101000001000001010011110100001101011010010100000100010101001011010010000100110001000&#xA;11001000011010001010100010101010010010100100101011001010111010101100101010101011001010000100101011001001010010100&#xA;00010101010101011001010000010011110100000101011001010011010100100101001011010100010101000101001110010100110101011&#xA;10101101001000111010010000101101001001011010001000100011101011001010011000100000101000101010001110101011101010000&#xA;01001011010001010101001101000111010000110101100101011010010001100101011001001010010001000100110101000101010100000&#xA;10100010100101101010011010100110100110001001110010101100101001101010110010100000101010101010110010101100101001001&#xA;01011001011001010001010101001001001000010001000101010001010101010101000101100101011001010011010101000101000111010&#xA;00101010101100101011101010010010011010101000101010011010110100100011001001110010100000100111001010010010010100100&#xA;10010100011101000111010101110100000101001010010011100100111001001010010011000100101101001111010001010101000101001&#xA;00001001110010001010101010001010010010100000101010101010001010110010100010001000110010110100101011101000011010110&#xA;10010010110101011001001010010001010101100001001100010011010100001101001011010000110101001101001001010001100101010&#xA;00100001101010100010100110101010101010100010011000100010001010010010100100100110101001001010010110101000101010100&#xA;01001110010010010100111001010000010001110101001001010000010100010101000101011000010100000101010001011010010001000&#xA;10100000100000101001001010011110101010001000011010001010101010101000001010110100100011001000101010101110100010001&#xA;01000101001100010011000101000001011010010100100100100001011000010011000101100001010001010001110101001101001100010&#xA;10010010010100101010001000010010011000101101001010010010010010101001001010110010010010101001101001110010110100100&#xA;10010101011101001100010011010101011001011001010000010100010001010110010011110100100001000110010001010101011001001&#xA;11001000001010010110100101101000111010011110101001001010010010110000101001101011001010001110101100001010000010101&#xA;01010011010101011001000111010000100100111101001101010100100100101001001100010000110101001001000101010001100100001&#xA;10100110101010010010100010101011001011000010101000100110101001001010110010100110101001010010010100101011001001000&#xA;01011000010011100100001001010100010100110101101001001101010101000100101001000101010001100100101101000110010001110&#xA;10010110101010101010010010001100100110001001110010010000101100001010000010010110100001101010111010011000100010101&#xA;01100001001101010010010101100101001100010001110101100101001110010011100101001001010111010000010100101101010011010&#xA;00101010101110101010001001000010100000100101101000111010110100100101101001011010110000100011101000001010110100100&#xA;01010100110001001100010101010101010001000001010110010100001101001001010001010100101101010111010010010101001101001&#xA;00001010101010011100100010001001011010001010100101101010111010000010101001001000111010000100101100101011010010001&#xA;10010001110100101101000101010100000100101101010001010001110101101001011010010100110101001001001001010011010100011&#xA;00100110001000111010010110100000101010010010101000101010101010010010000010100100101001110010100110100111001000111&#xA;01000101010001010101010101001101010001010101100001010010010101100100010101000101010011000101101001011000010101000&#xA;10010010101001101010101010101110101011001011010010010110100111101011001010011000101010001010000010000100100100001&#xA;01101001010111010001010100111101010001010101110100111001011000010011100101000001011000010100000100101101010011010&#xA;10011010110000100101001001000010100000100000101001110010000110101011001000110010100000101001001011001010000010100&#xA;01000101001001001100010100100100111101000101010101110100010101000010010100010100010101010111010010000101101001010&#xA;010010001110100000101 0101000101101001000100 &#xA;010001110101010101000 0110100010101001011010&#xA;01100010001100101100101001000010110100100101001001110010011100101101001001001010010100101001001000111010011100101&#xA;10100101001001010110010000100100111101000011010000010101010101011001010001010101101001000111010010110101000001010&#xA;01101001010010110000100101001001001010000010101001101001101010101100100011001010100010001000101011101000110010110&#xA;00010000100100100101000100010010000101000101011010010001010101100101001011010001000101001001010100010001000101001&#xA;00100100101001111010100000101000001001011010010100101001001010000010010010101001101010011010010110100110101000011&#xA;01011010010010100100011001011010010101000100001001010110010000100100101001010101010001110100010101011001010000010&#xA;10011100100101001001001010001110100101001010100010001000100001101010000010101000101101001000100010001010100111101&#xA;00011101010101010101000100110001011010010100000100010101001011010010000101010001001110010010010100100001010100010&#xA;00111010001110101010101001101010101100100011101000010010011110100110101010010010010100100110001000011010100100100&#xA;010101000110010100110101011101000110010110100100111101000011010100100100111101001000010001010100000101010101&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;Footnote on page 48:&lt;/p&gt;</description>
    </item>
    <item>
      <title>NoVAHackers - Nails in the Crypt slides</title>
      <link>https://darthnull.org/nailsinthecrypt-novaha-slides/</link>
      <pubDate>Mon, 11 Apr 2011 11:00:00 -0400</pubDate>
      <guid>https://darthnull.org/nailsinthecrypt-novaha-slides/</guid>
      <description>&lt;p&gt;Slides for my Nails in the Crypt talk on Rainbow Tables and UNIX Crypt() password hashes. Originally the talk was submitted to ShmooCon, but instead of presenting this talk I was asked to be part of the con&amp;rsquo;s closing panel, so I only spoke briefly about my research and saved the slides for later.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Quantifying the Unknown: Measuring a Theoretical SecurID Attack</title>
      <link>https://darthnull.org/theoretical-securid-attack/</link>
      <pubDate>Tue, 22 Mar 2011 11:03:00 -0400</pubDate>
      <guid>https://darthnull.org/theoretical-securid-attack/</guid>
      <description>&lt;p&gt;It&amp;rsquo;s been a few days since the &lt;a href=&#34;http://www.rsa.com/node.aspx?id=3872&#34;&gt;attack on RSA / SecurID&lt;/a&gt; was made public. Last Friday, I considered &lt;a href=&#34;http://intrepidusgroup.com/insight/2011/03/risk-posed-by-securid-hack/&#34;&gt;potential risks&lt;/a&gt; the compromise may pose to RSA&amp;rsquo;s customers. Since then, the security world has been buzzing with analysis of risks, worst-case scenarios, and second-guessing of the offical RSA press releases.&lt;/p&gt;&#xA;&lt;p&gt;Late yesterday, RSA released additional information via their SecureCare system. However, as this is only available to RSA customers, I haven&amp;rsquo;t been able to directly review it. Rich Mogull, at Securosis, has &lt;a href=&#34;http://securosis.com/blog/rsa-releases-almost-more-information&#34;&gt;posted his take&lt;/a&gt; in an update last night, and includes some very good, specific recommended actions. I&amp;rsquo;d like to take a moment to present some back-of-the-envelope numbers relating to a theoretical attack scenario, especially in light of what (little) was just revealed by RSA.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The RSA/SecurID Compromise: What is my risk?</title>
      <link>https://darthnull.org/securid-compromise-risk/</link>
      <pubDate>Fri, 18 Mar 2011 08:32:00 -0400</pubDate>
      <guid>https://darthnull.org/securid-compromise-risk/</guid>
      <description>&lt;p&gt;So yesterday, RSA, a security division within EMC and the folks responsible for &lt;a href=&#34;http://www.rsa.com/node.aspx?id=1156&#34;&gt;SecurID&lt;/a&gt;, one of the most popular forms of &lt;a href=&#34;http://en.wikipedia.org/wiki/Two-factor_authentication&#34;&gt;two-factor authentication&lt;/a&gt;, announced that &lt;a href=&#34;http://www.rsa.com/node.aspx?id=3872&#34;&gt;they&amp;rsquo;d been hacked&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;figure class=&#34;small right&#34;&gt;&#xA;  &lt;a href=&#34;https://darthnull.org/media/2011/03/SecurID.png&#34;&gt;&lt;img src=&#34;https://darthnull.org/media/2011/03/SecurID.png&#34; title=&#34;&#34;&gt;&lt;/a&gt;&#xA;  &lt;figcaption&gt;&lt;p&gt;&lt;/p&gt;&lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;    &#xA;&#xA;&lt;p&gt;What does this mean? Well, we don&amp;rsquo;t have many details, but the most troubling bit is that apparently the attackers acquired information &amp;ldquo;specifically related to RSA&amp;rsquo;s SecurID two-factor authentication products.&amp;rdquo; In particular, that &lt;strong&gt;&amp;ldquo;this information could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack.&amp;rdquo;&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>RSA/SecurID Compromise - Archived Comments</title>
      <link>https://darthnull.org/rsa-risk-comments/</link>
      <pubDate>Fri, 18 Mar 2011 05:42:00 -0400</pubDate>
      <guid>https://darthnull.org/rsa-risk-comments/</guid>
      <description>&lt;h3 id=&#34;hescalona&#34;&gt;HEscalona&lt;/h3&gt;&#xA;&lt;h4 id=&#34;march-18-2011-at-542-pm&#34;&gt;March 18, 2011 at 5:42 pm&lt;/h4&gt;&#xA;&lt;p&gt;I believe that exist other scenario that is related to attacker get access to the backdoor that RSA put for government access inside the products and algorithms and all the complete system can be in danger.&lt;/p&gt;&#xA;&lt;p&gt;I still thinking that: If RSA accept a success attack (a company that is alive for security) the real impact must be bigger than the actual acceptation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>iOS Overlays - Archived Comments</title>
      <link>https://darthnull.org/ios-overlays-comments/</link>
      <pubDate>Sat, 12 Mar 2011 11:33:00 -0500</pubDate>
      <guid>https://darthnull.org/ios-overlays-comments/</guid>
      <description>&lt;h3 id=&#34;benson&#34;&gt;Benson&lt;/h3&gt;&#xA;&lt;h4 id=&#34;march-12-2011-at-1133-pm&#34;&gt;March 12, 2011 at 11:33 pm&lt;/h4&gt;&#xA;&lt;p&gt;That would totally work, and using Union mounts (&lt;a href=&#34;http://en.wikipedia.org/wiki/UnionFS)&#34;&gt;http://en.wikipedia.org/wiki/UnionFS)&lt;/a&gt;, it would probably take very little time and effort to implement. All you’d have to do is figure out how to union mount an expanding-as-needed file over the top of /users and /apps (or whatever places need to handle changes), and everything would fall into place&lt;/p&gt;</description>
    </item>
    <item>
      <title>VeriFone vs Square - A Draw?</title>
      <link>https://darthnull.org/verifone-vs-square/</link>
      <pubDate>Wed, 09 Mar 2011 01:31:00 -0500</pubDate>
      <guid>https://darthnull.org/verifone-vs-square/</guid>
      <description>&lt;p&gt;There&amp;rsquo;s been a lot of talk this morning about an &lt;a href=&#34;http://www.sq-skim.com/&#34;&gt;open letter from VeriFone&lt;/a&gt; regarding the &lt;a href=&#34;https://squareup.com&#34;&gt;Square&lt;/a&gt; iOS credit card system. They make some pretty heavy accusations about a security hole in the Square system:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;The issue is that Square&amp;rsquo;s hardware is poorly constructed and lacks all ability to encrypt consumers&amp;rsquo; data, creating a window for criminals to turn the device into a skimming machine in a matter of minutes.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;and another straightforward condemnation:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Crazy idea for multi-user iPads</title>
      <link>https://darthnull.org/ios-filesystem-overlays/</link>
      <pubDate>Fri, 25 Feb 2011 11:43:00 -0500</pubDate>
      <guid>https://darthnull.org/ios-filesystem-overlays/</guid>
      <description>&lt;p&gt;While lying on the couch last Friday, trying to decompress after a busy day and expecting an even more hectic weekend, I had a crazy idea for how Apple might implement multiple user accounts on iOS devices like the iPad.&lt;/p&gt;&#xA;&lt;p&gt;File System Overlays.&lt;/p&gt;&#xA;&lt;p&gt;Applications in iOS are all restricted to their own sandbox &amp;ndash; that is, they can only access files and data within their own application bundle, and nothing else. So right off the bat, data&amp;rsquo;s pretty well segregated.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Simple Bypass of Safari Restrictions on iOS</title>
      <link>https://darthnull.org/simple-bypass-of-safari-restrictions-on-ios/</link>
      <pubDate>Tue, 15 Feb 2011 05:04:00 -0500</pubDate>
      <guid>https://darthnull.org/simple-bypass-of-safari-restrictions-on-ios/</guid>
      <description>&lt;p&gt;Okay, so in iOS you can disable things. To protect the user, the device, the organization, from misuse, etc. One of the things you can do is disable Safari, so the end user can&amp;rsquo;t surf to anything bad. (I&amp;rsquo;m being a little snarky &amp;ndash; there are some good cases where you&amp;rsquo;d want to prevent end-user web surfing: Gambling sites. Porn. Chat rooms. Competitors&amp;rsquo; tip sites. Stuff like that). It&amp;rsquo;s very easy, and appears to be very complete.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Bypassing MDM Restrictions for Mobile Safari on iOS 4.2</title>
      <link>https://darthnull.org/bypassing-safari-lockout/</link>
      <pubDate>Tue, 15 Feb 2011 01:53:00 -0500</pubDate>
      <guid>https://darthnull.org/bypassing-safari-lockout/</guid>
      <description>&lt;p&gt;When deploying iOS devices, such as the iPhone or iPad, to a corporate population, the security-minded may ask &amp;ldquo;how can we keep people from using this device for inappropriate web surfing?&amp;rdquo; The easy answer is to use the restrictions available via profiles. This can be readily accomplished through a configuration profile that disallows Safari. The profile is easiest to create using the &lt;a href=&#34;http://support.apple.com/kb/DL851&#34;&gt;iPhone Configuration Utility&lt;/a&gt; (IPCU). It can then be installed on the device via the IPCU directly (usingUSB) or through a Mobile Device Management (MDM) system. Disabling Safari is simple: Just remove the checkbox next to &amp;ldquo;Allow use of Safari&amp;rdquo; and push the configuration to the target devices.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2011 Puzzle - Archived Comments</title>
      <link>https://darthnull.org/shmoocon-2011-comments/</link>
      <pubDate>Wed, 09 Feb 2011 10:38:00 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-2011-comments/</guid>
      <description>&lt;h3 id=&#34;gort&#34;&gt;Gort&lt;/h3&gt;&#xA;&lt;h4 id=&#34;february-9-2011-at-1038-pm&#34;&gt;February 9, 2011 at 10:38 pm&lt;/h4&gt;&#xA;&lt;p&gt;I was wondering when this was going to come out. I had to watch from home when they were going over the solution, but I hope to make it to a future session.&#xA;Good work. Thanks for putting the effort into sharing this.&lt;/p&gt;&#xA;&lt;h3 id=&#34;jolly&#34;&gt;Jolly&lt;/h3&gt;&#xA;&lt;h4 id=&#34;february-9-2011-at-1134-pm&#34;&gt;February 9, 2011 at 11:34 pm&lt;/h4&gt;&#xA;&lt;p&gt;Nicely done! (Even if you do keep managing to beat me in his challenges :P)&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2011 Badge Contest</title>
      <link>https://darthnull.org/shmoocon-2011-badge-contest/</link>
      <pubDate>Wed, 09 Feb 2011 09:39:00 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-2011-badge-contest/</guid>
      <description>&lt;p&gt;Ah, ShmooCon 2011. This time we&amp;rsquo;re in a new building, The Washington Hilton, and a little earlier than usual: the last weekend of January. But aside from that, it&amp;rsquo;s still ShmooCon. And it wouldn&amp;rsquo;t be a ShmooCon without something fun on the badges. For the third year in a row, the puzzle came from the subtle and devious mind of G. Mark Hardy.&lt;/p&gt;&#xA;&lt;p&gt;This time, I was actually helping out at the con. I&amp;rsquo;d been a little concerned about whether I&amp;rsquo;d be able to fairly compete for the puzzle, since I might get exposed to the badges, or programs, or other material, before anyone else is.  Heidi did her best to ensure that I didn&amp;rsquo;t learn anything unfairly &amp;ndash; to the point that the Wednesday before the con, when I was helping with some of the check-in code and at the bag stuffing party, she repeatedly told everyone that &amp;ldquo;David&amp;rsquo;s not allowed to see inside the programs!&amp;rdquo; She&amp;rsquo;s so helpful.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 7 Ciphertexts</title>
      <link>https://darthnull.org/shmoocon-7-ciphertexts/</link>
      <pubDate>Wed, 09 Feb 2011 03:45:00 -0500</pubDate>
      <guid>https://darthnull.org/shmoocon-7-ciphertexts/</guid>
      <description>&lt;p&gt;Badge data. Morse code, two lines per badge.&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;..--- -.-- . ... - . .-. -.. .- -.-- &#xA;...-- - . .-.. . --. .-. .- .--. .... &#xA;&#xA;----- -- --- --. .- -.. .. ... .... ..- &#xA;.---- .- .-. -- .- -.. .. .-.. .-.. --- &#xA;&#xA;....- .... -.-- .--. -. --- - .. ... - &#xA;..... . ..- -.-. .- .-.. -.-- .--. - .. &#xA;&#xA;---.. --- .-. .- -. --. . -.-. .- -... &#xA;----. ... - .. -- ..- .-.. .- - . &#xA;&#xA;-.... -- .. -.-. .-. --- -... .-. . .-- &#xA;--... --- -... .--- . -.-. - .. ...- .&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;Large letters, one per page, from the bottom of twenty pages in the program:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Breaking a 147-Year-Old Message</title>
      <link>https://darthnull.org/civil-war-code/</link>
      <pubDate>Thu, 30 Dec 2010 11:50:00 -0500</pubDate>
      <guid>https://darthnull.org/civil-war-code/</guid>
      <description>&lt;p&gt;Last weekend, the Associated Press published a story about a Confederate Army message that was recently decrypted. It had been written on a small sheet of paper, rolled up tightly and placed in a glass vial with a bullet (probably so it could be sunk into a river in the event of imminent capture).  The vial sat in &lt;a href=&#34;http://www.moc.org&#34;&gt;The Museum of The Confederacy&lt;/a&gt; for years, until it was unrolled early in 2009. The article didn&amp;rsquo;t say when the message was decoded &amp;ndash; presumably it sat untouched for a while and they only just sent it out to the experts (one at the CIA, one at the Navy).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Civil War Code Ciphertext</title>
      <link>https://darthnull.org/civil-war-code-ciphertext/</link>
      <pubDate>Thu, 30 Dec 2010 11:15:00 -0500</pubDate>
      <guid>https://darthnull.org/civil-war-code-ciphertext/</guid>
      <description>&lt;p&gt;Here are three variations of the message I broke in my blog post about the recently-unrolled Civil War Code. First, the ciphertext as best I could transcribe from a high-resolution photograph:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;SEAN WIEUIIUZH DTG CNP LBNXGK OZ BJQB FEQT XZBW JJOA&#xA;TK FHR TPZWK PBW RYSQ VOWPZXQQ OEPH EK WASFKIPW PLVO&#xA;JKZ HMN NVAEUD XYF DWRJ BOYPA SF MLV FYYRDE LVPL&#xA;MFYSIU XY FQEO NPK M OBPC FYXJFHOHT AS ETOV B OCAJOSVQU&#xA;M ZTZV TPIY DAW FQTI WTTJ J DQGOAIA FLWHTXTI QMTR&#xA;SEA LVLFLXFO&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;Now, that same text cleaned up, once I&amp;rsquo;d recovered the key and corrected all the encoding, transcription, and handwriting interpretation errors:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Civil War Ciphers Fall!</title>
      <link>https://darthnull.org/civil-war-blurb/</link>
      <pubDate>Thu, 30 Dec 2010 04:16:00 -0500</pubDate>
      <guid>https://darthnull.org/civil-war-blurb/</guid>
      <description>&lt;p&gt;About a week ago, a story hit the wires about a recently-discovered coded message from the Civil War. It had been sealed in a vial, in &lt;a href=&#34;http://www.moc.org/&#34;&gt;The Museum of The Confederacy&lt;/a&gt;, for years, and was only recently unfolded and decoded. The story was relayed to me with the challenge &amp;ldquo;extract the key,&amp;rdquo; so I did.&lt;/p&gt;&#xA;&lt;p&gt;Actually, it wasn&amp;rsquo;t quite that easy, but upon looking at the photograph of the message, I was quite surprised to see what I understood to be a major error: the writer of the message had left word breaks intact in the ciphertext. This gives me a significant leg up on trying to break the code.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Nails in the Crypt</title>
      <link>https://darthnull.org/nails-in-the-crypt/</link>
      <pubDate>Wed, 22 Dec 2010 11:19:00 -0500</pubDate>
      <guid>https://darthnull.org/nails-in-the-crypt/</guid>
      <description>&lt;p&gt;Some time ago, I started wondering why I couldn&amp;rsquo;t find any Rainbow Tables for old-school Unix crypt(3) passwords. After some research, I learned that the salt was the culprit &amp;ndash; that virtually anyone who&amp;rsquo;d asked about such tables went away chastised, told that the salt made it impossible to generate Rainbow Tables, unless you went through the trouble to create 4096 different tables (one for each salt). And who&amp;rsquo;s going to do that?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Rainbow Tables for Unix DES Crypt(3) Hashes</title>
      <link>https://darthnull.org/crypt3-rainbow-tables/</link>
      <pubDate>Mon, 20 Dec 2010 11:18:00 -0500</pubDate>
      <guid>https://darthnull.org/crypt3-rainbow-tables/</guid>
      <description>&lt;p&gt;Some time ago, I started thinking about the possibility of using &lt;a href=&#34;http://en.wikipedia.org/wiki/Rainbow_tables&#34;&gt;Rainbow Tables&lt;/a&gt; to crack old-school Unix &lt;a href=&#34;http://en.wikipedia.org/wiki/Crypt_(Unix)&#34;&gt;crypt(3)&lt;/a&gt; passwords. Nobody had done this, and the reason most often cited was the presence of the two-character salt at the beginning of the hash.&lt;/p&gt;&#xA;&lt;p&gt;This didn&amp;rsquo;t make a whole lot of sense to me. I mean, 2 characters? Isn&amp;rsquo;t that essentially like taking an 8-character password space and making it a 10-character space? People are already creating 10-character tables for other hash algorithms. Why can&amp;rsquo;t we do this for crypt(3)?&lt;/p&gt;</description>
    </item>
    <item>
      <title>ToorCon 12 Puzzle - Archived Comments</title>
      <link>https://darthnull.org/toorcon12-comments/</link>
      <pubDate>Tue, 07 Dec 2010 05:18:00 -0500</pubDate>
      <guid>https://darthnull.org/toorcon12-comments/</guid>
      <description>&lt;h3 id=&#34;kryptosfan&#34;&gt;kryptosfan&lt;/h3&gt;&#xA;&lt;h4 id=&#34;december-7-2010-at-518-pm&#34;&gt;December 7, 2010 at 5:18 pm&lt;/h4&gt;&#xA;&lt;p&gt;Just out of professional curiosity – would you be willing to try your multi-skip detection program on K3 of Kryptos? My favorite method involves a skip step because it keeps the “?” in the final plaintext whereas the other two traditional methods exclude it to get a solution.&lt;/p&gt;&#xA;&lt;h3 id=&#34;darth-null&#34;&gt;Darth Null&lt;/h3&gt;&#xA;&lt;h4 id=&#34;december-8-2010-at-1111-am&#34;&gt;December 8, 2010 at 11:11 am&lt;/h4&gt;&#xA;&lt;p&gt;Interesting idea, but the reason my approach worked here is that there was a small message hidden within a large amount of noise. My script just separates the signal from the noise. In K3, it’s all signal, no noise. So even though K3 can be solved with a “skip” approach (wasn’t it like every 192nd character?), it’s not the same kind of approach as what we have here.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ToorCon 12 Badge Puzzle Ciphertexts</title>
      <link>https://darthnull.org/toorcon-12-ciphertexts/</link>
      <pubDate>Mon, 06 Dec 2010 10:32:00 -0500</pubDate>
      <guid>https://darthnull.org/toorcon-12-ciphertexts/</guid>
      <description>&lt;p&gt;Here are all the parts you&amp;rsquo;ll need to know to try and complete the puzzle yourself. Included are a picture of the conference badge, some mysterious clocks scattered all throughout the program, a snippet of Morse code that was printed along the edge of the last page of the program, ciphertext from the back of the con T-shirt, and, finally, a page full of ciphertext from the back of the program.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ToorCon 12 Badge Puzzle</title>
      <link>https://darthnull.org/toorcon12/</link>
      <pubDate>Mon, 06 Dec 2010 10:31:00 -0500</pubDate>
      <guid>https://darthnull.org/toorcon12/</guid>
      <description>&lt;p&gt;In the middle of October, G. Mark Hardy emailed to ask if I or my puzzle-busting buddy would be making it to ToorCon, in San Diego, as he had a puzzle on which he was putting the finishing touches. I told him no, but that I&amp;rsquo;d love to play along at home for &amp;ldquo;bragging rights instead of prizes.&amp;rdquo;&lt;/p&gt;&#xA;&lt;p&gt;The weekend of the conference I was actually at a cousin&amp;rsquo;s wedding. So I didn&amp;rsquo;t expect to have much time to play. However, I did bring along some gear, and spent some time Friday night and Saturday afternoon playing with the little information that had leaked out from the Con.&lt;/p&gt;</description>
    </item>
    <item>
      <title>THOTCON Pre-Sale Code Puzzle</title>
      <link>https://darthnull.org/thotcon0x2/</link>
      <pubDate>Mon, 22 Nov 2010 02:55:00 -0500</pubDate>
      <guid>https://darthnull.org/thotcon0x2/</guid>
      <description>&lt;p&gt;THOTCON is an information security conference in Chicago. And they did a puzzle last year, that I solved, and got a really cool Sake decanter as a prize. The guy who did the puzzle, Sak3bomb, did another puzzle for the next THOTCON &amp;ndash; this one for a pre-sale prize in advance of next spring&amp;rsquo;s conference.&lt;/p&gt;&#xA;&lt;p&gt;Problem is, the puzzle came out while I was at the beach. When I was supposed to be resting. At 1:30 in the afternoon, on September 17th. Of course, I didn&amp;rsquo;t see it until about 9:00 in the evening. When I was supposed to be resting.&lt;/p&gt;</description>
    </item>
    <item>
      <title>DEF CON 18 Crypto Challenge</title>
      <link>https://darthnull.org/def-con-18-crypto-challenge/</link>
      <pubDate>Thu, 02 Sep 2010 11:11:00 -0400</pubDate>
      <guid>https://darthnull.org/def-con-18-crypto-challenge/</guid>
      <description>&lt;p&gt;DEF CON 18. July, 2010. Riviera Hotel, Las Vegas. G. Mark Hardy tells us that he&amp;rsquo;s just launched another crypto challenge, and the clues are all on the DEF CON CD. The game, as they say, is afoot.&lt;/p&gt;&#xA;&lt;p&gt;So my buddy Дурак (gypak, Durok) and I start poking around to see what&amp;rsquo;s on the CD.  We&amp;rsquo;re both using netbooks, so we have to wait until later to hook up the CD drive I remembered to bring, then copy the disc to both netbooks. And read through G. Mark&amp;rsquo;s presentation&amp;hellip;&lt;/p&gt;</description>
    </item>
    <item>
      <title>DEF CON 18 Crypto Challenge Ciphertexts</title>
      <link>https://darthnull.org/def-con-18-crypto-challenge-ciphertexts/</link>
      <pubDate>Thu, 02 Sep 2010 11:10:00 -0400</pubDate>
      <guid>https://darthnull.org/def-con-18-crypto-challenge-ciphertexts/</guid>
      <description>&lt;p&gt;This is some of the source material for G. Mark Hardy&amp;rsquo;s DEF CON 18 Crypto Challenge. It&amp;rsquo;s obviously not possible to archive the contest exactly, so I&amp;rsquo;m just going to provide the pertinent ciphertexts and clues here. I&amp;rsquo;ll keep them hidden (blue on blue) so that you can&amp;rsquo;t accidentally see the next stage until you actively highlight the text.&lt;/p&gt;&#xA;&lt;p&gt;Try not to look too far ahead, because even the intervening text may give too much away.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Puzzles and Contests</title>
      <link>https://darthnull.org/puzzles-and-contests/</link>
      <pubDate>Sun, 29 Aug 2010 09:03:00 -0400</pubDate>
      <guid>https://darthnull.org/puzzles-and-contests/</guid>
      <description>&lt;p&gt;I&amp;rsquo;ve always liked puzzles. As kids, we were constantly working on jigsaw puzzles of ever increasing size and complexity. Whenever an article about Mensa appeared in the newspaper, my dad would give me the sample questions from it to figure out. And when I started Geocaching a few years back, that love for puzzles returned stronger than ever.&lt;/p&gt;&#xA;&lt;p&gt;I currently work in the information security industry. The security community has many conferences throughout the year at which people gather to discuss research, reconnect with colleagues from across the country, and occasionally play some games.&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2010 Badge Puzzle Data</title>
      <link>https://darthnull.org/shmoocon-2010-badge-puzzle-data/</link>
      <pubDate>Sun, 29 Aug 2010 08:47:00 -0400</pubDate>
      <guid>https://darthnull.org/shmoocon-2010-badge-puzzle-data/</guid>
      <description>&lt;p&gt;Here&amp;rsquo;s the raw data from the ShmooCon 2010 Badge Contest.&#xA;&#xA;&lt;table border=&#34;1&#34;&gt;&#xA;&lt;tr&gt;&lt;td&gt;268&lt;td&gt;-28.09944 &lt;/td&gt;&lt;td&gt;4995 &lt;/td&gt;&lt;td&gt;140.196944 &lt;/td&gt;&lt;td&gt;attendee badge&lt;/td&gt;&lt;/tr&gt;&#xA;&#xA;&lt;tr&gt;&lt;td&gt;313&lt;td&gt;41.663679 &lt;/td&gt;&lt;td&gt;3698 &lt;/td&gt;&lt;td&gt;-1.011665 &lt;/td&gt;&lt;td&gt;attendee badge&lt;/td&gt;&lt;/tr&gt;&#xA;&#xA;&lt;tr&gt;&lt;td&gt;150&lt;/td&gt;&lt;td&gt;59.158051 &lt;/td&gt;&lt;td&gt;2926 &lt;/td&gt;&lt;td&gt;-2.641389 &lt;/td&gt;&lt;td&gt;attendee badge&lt;/td&gt;&lt;/tr&gt;&#xA;&#xA;&lt;tr&gt;&lt;td&gt;118&lt;/td&gt;&lt;td&gt;-0.413773 &lt;/td&gt;&lt;td&gt;6187 &lt;/td&gt;&lt;td&gt;35.251589 &lt;/td&gt;&lt;td&gt;attendee badge&lt;/td&gt;&lt;/tr&gt;&#xA;&#xA;&lt;tr&gt;&lt;td&gt;0&lt;/td&gt;&lt;td&gt;-4.674342 &lt;/td&gt;&lt;td&gt;0 &lt;/td&gt;&lt;td&gt;55.521839 &lt;/td&gt;&lt;td&gt;security badge&lt;/td&gt;&lt;/tr&gt;&#xA;&#xA;&lt;tr&gt;&lt;td&gt;42&lt;/td&gt;&lt;td&gt;49.971153 &lt;/td&gt;&lt;td&gt;4584 &lt;/td&gt;&lt;td&gt;-94.700518 &lt;/td&gt;&lt;td&gt;speaker badge&lt;/td&gt;&lt;/tr&gt;&#xA;&#xA;&lt;tr&gt;&lt;td&gt;114&lt;/td&gt;&lt;td&gt;17.205642 &lt;/td&gt;&lt;td&gt;5251 &lt;/td&gt;&lt;td&gt;-62.594003 &lt;/td&gt;&lt;td&gt;safety brochure&lt;/td&gt;&lt;/tr&gt;&#xA;&#xA;&lt;tr&gt;&lt;td&gt;345&lt;/td&gt;&lt;td&gt;-22.612239 &lt;/td&gt;&lt;td&gt;3973 &lt;/td&gt;&lt;td&gt;17.080442 &lt;/td&gt;&lt;td&gt;program&lt;/td&gt;&lt;/tr&gt;&#xA;&#xA;&lt;tr&gt;&lt;td&gt;122&lt;/td&gt;&lt;td&gt;29.95925 &lt;/td&gt;&lt;td&gt;1281 &lt;/td&gt;&lt;td&gt;-81.33975 &lt;/td&gt;&lt;td&gt;schedule poster 1&lt;/td&gt;&lt;/tr&gt;&#xA;&#xA;&lt;tr&gt;&lt;td&gt;166&lt;/td&gt;&lt;td&gt;40.137722 &lt;/td&gt;&lt;td&gt;2473 &lt;/td&gt;&lt;td&gt;26.426777 &lt;/td&gt;&lt;td&gt;schedule poster 2&lt;/td&gt;&lt;/tr&gt;&#xA;&#xA;&lt;tr&gt;&lt;td&gt;301&lt;/td&gt;&lt;td&gt;13.266669 &lt;/td&gt;&lt;td&gt;5572 &lt;/td&gt;&lt;td&gt;19.716677 &lt;/td&gt;&lt;td&gt;schedule poster 3&lt;/td&gt;&lt;/tr&gt;&#xA;&lt;/table&gt;&#xA;&#xA;&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2010 Badge Contest</title>
      <link>https://darthnull.org/shmoocon-2010-badge-contest/</link>
      <pubDate>Sun, 29 Aug 2010 08:39:00 -0400</pubDate>
      <guid>https://darthnull.org/shmoocon-2010-badge-contest/</guid>
      <description>&lt;p&gt;Every year, the Shmoo Group runs an information security conference in Washington called ShmooCon. I&amp;rsquo;ve been going every year, and it&amp;rsquo;s both a fantastic con and a great deal. The conference in 2010 was memorable because it coincided with the worst snowstorm Washington&amp;rsquo;s had in decades.  It was also memorable for me as another victory in the badge puzzle contest.&lt;/p&gt;&#xA;&lt;figure class=&#34;medium right&#34;&gt;&#xA;  &lt;a href=&#34;https://darthnull.org/media/2010/08/sc6_badge.jpg&#34;&gt;&lt;img src=&#34;https://darthnull.org/media/2010/08/sc6_badge.jpg&#34; title=&#34;&#34;&gt;&lt;/a&gt;&#xA;  &lt;figcaption&gt;&lt;p&gt;ShmooCon 2010 Badge&lt;/p&gt;&lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;    &#xA;&#xA;&lt;p&gt;Last year, my buddy Дурак (@gypak &amp;ndash; more or less &amp;ldquo;Durak,&amp;rdquo; pronounced &amp;ldquo;doo-rock&amp;rdquo;) and I attacked the badge puzzle in parallel, working more-or-less independently but sharing progress, ideas, problems, etc. After a couple of weeks, he gave up, but I kept on for a few more days and ended up winning the contest (beating the next team by just over an hour). This year, Дурак and I worked as a team from the start, and again, were the first to solve the puzzle, landing us fabulous prizes and numerous bragging rights.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Quahogcon Flag Puzzle - Archived Comments</title>
      <link>https://darthnull.org/quahogcon-comments/</link>
      <pubDate>Tue, 24 Aug 2010 09:45:00 -0400</pubDate>
      <guid>https://darthnull.org/quahogcon-comments/</guid>
      <description>&lt;h3 id=&#34;h3xan01c&#34;&gt;H3xan01c&lt;/h3&gt;&#xA;&lt;h4 id=&#34;august-24-2010-at-945-pm&#34;&gt;August 24, 2010 at 9:45 pm&lt;/h4&gt;&#xA;&lt;p&gt;Finally I have some closure on this and a chance in upcoming contests. I attended Quahogcon. During the initial Friday nights sign in my wife and I went over the contest and she solved the sudoku while we had a drink. She went on her way as we had traveled 9 hrs from north of Toronto and she was in town to shop while I geeked out. I showed a few people I met her solution to side one of the puzzle and it seemed a good chuckle. I admit that after Hacker Jeopardy my beer intake never allowed me to get back to the puzzle. And I also admit that during closing ceremonies I was reluctant to offer up her solution to side one, my mistake and she never lets me forget it. I had attempted to solve it on and off for a few weeks after the con. I have pages of data shifting side 2 based on the side one sudoku resolution. I was fixated I guess on the 1-9 ordering and using that to re-arrange columns and/or rows of the 2nd side. It forced me to study up on many types of cipher so it was still a useful process.&lt;/p&gt;</description>
    </item>
    <item>
      <title>QuahogCon Flag Puzzle</title>
      <link>https://darthnull.org/quahogcon-flag-puzzle/</link>
      <pubDate>Thu, 20 May 2010 02:08:00 -0400</pubDate>
      <guid>https://darthnull.org/quahogcon-flag-puzzle/</guid>
      <description>&lt;p&gt;Shortly after completing the ShmooCon 2010 badge puzzle, G. Mark Hardy told me in that he&amp;rsquo;d be contributing a puzzle for QuahogCon, the last weekend of April. I knew I wouldn&amp;rsquo;t be attending, so I offered to proofread the puzzle before he published it. I never heard back, so a couple days before the con I asked if I could play along at home (provided, of course, it was okay with the conference organizers).&lt;/p&gt;</description>
    </item>
    <item>
      <title>THOTCON 0x1 - Archived Comments</title>
      <link>https://darthnull.org/thotcon-0x01-comments/</link>
      <pubDate>Tue, 11 May 2010 02:03:00 -0400</pubDate>
      <guid>https://darthnull.org/thotcon-0x01-comments/</guid>
      <description>&lt;h3 id=&#34;jeff-jarmoc&#34;&gt;Jeff Jarmoc&lt;/h3&gt;&#xA;&lt;h4 id=&#34;may-11-2010-at-203-pm&#34;&gt;May 11, 2010 at 2:03 pm&lt;/h4&gt;&#xA;&lt;p&gt;Nice write up! Thanks for sharing. I didn’t end up completing the whole thing, but enjoyed the parts I did complete.&lt;/p&gt;&#xA;&lt;p&gt;One thing that could’ve saved you some time; if you run strings or hexdump on ironman.jpg, you’ll see ‘steg hide’ near the beginning. That happens to be the name of a tool that’ll decode the steg in AHH.jpg. :)&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;$ hexdump -C ironman.jpg | head -c 256&#xA;00000000 ff d8 ff e0 00 10 53 74 65 67 00 01 01 01 00 60 |……Steg…..`|&#xA;00000010 00 60 00 00 ff e1 00 16 68 69 64 65 00 00 49 49 |.`……hide..II|&#xA;00000020 2a 00 08 00 00 00 00 00 00 00 00 00 ff db 00 43 |*…………..C|&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;h3 id=&#34;darth-null&#34;&gt;Darth Null&lt;/h3&gt;&#xA;&lt;h4 id=&#34;may-11-2010-at-256-pm&#34;&gt;May 11, 2010 at 2:56 pm&lt;/h4&gt;&#xA;&lt;p&gt;That’s a huge D’Oh! on my part. Sakebomb just told me that offline, and I’ve updated my post. Yeah, seeing that would’ve saved me a LOT of time. :) And, my original post had the wrong tool name given…just misread my notes.&lt;/p&gt;</description>
    </item>
    <item>
      <title>THOTCON 0x1 Puzzle</title>
      <link>https://darthnull.org/thotcon-0x1-puzzle/</link>
      <pubDate>Tue, 11 May 2010 01:14:00 -0400</pubDate>
      <guid>https://darthnull.org/thotcon-0x1-puzzle/</guid>
      <description>&lt;p&gt;So on April 23rd, while I was waiting for the QuahogCon puzzle to post, over in Chicago THOTCON was starting. And a few days later, I saw a tweet from @sak3bomb saying:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;I am sad that no one found any of the links I hid in the #thotcon program. Maybe next year...&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;My immediate response was to ask “There&amp;rsquo;s a puzzle?” He replied that he wanted to give the attendees from the conference a couple more days, then on April 30th, the program was posted to the THOTCON site. I kind of glanced at it, saw a few URLs hidden in the front page ASCII art, and forgot about it (as I had a trip coming up and had to prepare).&lt;/p&gt;</description>
    </item>
    <item>
      <title>ShmooCon 2009 Badge Contest</title>
      <link>https://darthnull.org/shmoocon-2009-badge-contest/</link>
      <pubDate>Tue, 27 Apr 2010 11:15:00 -0400</pubDate>
      <guid>https://darthnull.org/shmoocon-2009-badge-contest/</guid>
      <description>&lt;p&gt;ShmooCon is a great security conference, held early each year in Washington, D.C. They frequently feature a puzzle contest connected to the conference badges. In 2006, the badges were die-cut pieces of metal that could all fit together to create one large badge. Renderman figured that one out. In 2008, they had 16 different plastic badges that looked like punch cards, and somehow or other eventually gave you a PDP-8 program that would decrypt some text and, well, that one was a bit crazy and nobody solved it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Crazy Security Con Weekend!</title>
      <link>https://darthnull.org/crazy-security-con-weekend/</link>
      <pubDate>Fri, 23 Apr 2010 08:00:00 -0400</pubDate>
      <guid>https://darthnull.org/crazy-security-con-weekend/</guid>
      <description>&lt;p&gt;&lt;figure class=&#34;medium right&#34;&gt;&#xA;  &lt;a href=&#34;https://darthnull.org/media/2010/04/khanfu-blog.png&#34;&gt;&lt;img src=&#34;https://darthnull.org/media/2010/04/khanfu-blog.png&#34; title=&#34;&#34;&gt;&lt;/a&gt;&#xA;  &lt;figcaption&gt;&lt;p&gt;&lt;/p&gt;&lt;/figcaption&gt;&#xA;&lt;/figure&gt;&#xA;    &#xA;&#xA;I don&amp;rsquo;t go to a lot of information security cons. I&amp;rsquo;ve been to all the ShmooCons (they&amp;rsquo;re local, after all), and to DEFCON 3 times (plus a couple of BlackHats back when the company was paying for the trip).  So, really, like 2 a year. That was pretty much my world &amp;ndash; and I knew there were a couple others, but didn&amp;rsquo;t really pay much attention.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Belief-vs-Skepticism - Archived Comments</title>
      <link>https://darthnull.org/blind-belief-comments/</link>
      <pubDate>Tue, 20 Apr 2010 03:09:00 -0400</pubDate>
      <guid>https://darthnull.org/blind-belief-comments/</guid>
      <description>&lt;h3 id=&#34;bryan-schuetz&#34;&gt;Bryan Schuetz&lt;/h3&gt;&#xA;&lt;h4 id=&#34;april-20-2010-at-309-pm&#34;&gt;April 20, 2010 at 3:09 pm&lt;/h4&gt;&#xA;&lt;p&gt;“”Would Gizmodo really have it in so bad for the entire community that they’d try to play everyone with an elaborate hoax? That too, seems unlikely.”&amp;quot;&lt;/p&gt;&#xA;&lt;p&gt;Remember though that this is the same site that left the whole community agonizing over a long weekend back in 2006 by claiming they had the details on the new iPhone before it was launched. Come Monday and the big reveal, it just turned out to be a new product from Cisco.&#xA;&lt;a href=&#34;http://gigaom.com/2006/12/17/iphone-is-available-but-not-that-iphone/&#34;&gt;http://gigaom.com/2006/12/17/iphone-is-available-but-not-that-iphone/&lt;/a&gt;&#xA;I don’t think this was a hoax, but I do think they’ve got the all douche nozzle credentials that would be required for such an endeavor.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Blind Belief vs Excessive Skepticism</title>
      <link>https://darthnull.org/blind-belief-vs-excessive-skepticism/</link>
      <pubDate>Tue, 20 Apr 2010 02:11:00 -0400</pubDate>
      <guid>https://darthnull.org/blind-belief-vs-excessive-skepticism/</guid>
      <description>&lt;p&gt;I&amp;rsquo;m going to go out on a limb and say that I&amp;rsquo;m still skeptical about the whole &amp;ldquo;Gizmodo&amp;rsquo;s got a 4th generation iPhone&amp;rdquo; story.  Yes, it looks a lot like it could be real. And they&amp;rsquo;re saying all the right things. But the one thing that I can&amp;rsquo;t get over is this: they&amp;rsquo;re only &lt;em&gt;saying&lt;/em&gt; those things.&lt;/p&gt;&#xA;&lt;p&gt;There&amp;rsquo;s still no real proof. Everything we know about this comes from Gizmodo (other sites with pictures claim to have only received those photos, none of&#xA;them have actually handled the unit).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Half-Baked Idea: Isolate Browser Security Contexts to Limit XSS Attacks</title>
      <link>https://darthnull.org/half-baked-idea-isolate-browser-security-contexts-to-limit-xss-attacks/</link>
      <pubDate>Wed, 14 Apr 2010 04:58:00 -0400</pubDate>
      <guid>https://darthnull.org/half-baked-idea-isolate-browser-security-contexts-to-limit-xss-attacks/</guid>
      <description>&lt;p&gt;So I was reading yesterday about the Cross-Site Scripting [attack against apache.org](&lt;a href=&#34;https://blogs.apache.org/infra/entry/apache_org_04_09_2010&#34;&gt;https://blogs.apache.org/infra/entry/apache_org_04_09_2010&lt;/a&gt;. And it struck me that there might be an easy way to reduce or eliminate a lot of these attacks, using better isolation within the browser.&lt;/p&gt;&#xA;&lt;p&gt;Essentially, my thought boiled down to this: Why, when I load a page in the browser, should that page have access to cookies from another server?&lt;/p&gt;&#xA;&lt;p&gt;&amp;ldquo;But it doesn&amp;rsquo;t,&amp;rdquo; you might say. &amp;ldquo;The same-origin policy on cookies prevents one page from accessing another server&amp;rsquo;s cookies!&amp;rdquo; True. But if the malicious page manages to convince your browser to load a page from the target server, with its own cookie-stealing XSS code injected, then that malicious page, indirectly, has access to those cookies.&lt;/p&gt;</description>
    </item>
    <item>
      <title>It&#39;s Time To Start</title>
      <link>https://darthnull.org/its-time-to-start/</link>
      <pubDate>Wed, 14 Apr 2010 04:56:00 -0400</pubDate>
      <guid>https://darthnull.org/its-time-to-start/</guid>
      <description>&lt;p&gt;I&amp;rsquo;ve got a blog on another site. Sort of. It&amp;rsquo;s never updated. It&amp;rsquo;s been over a year since the last posting, and, frankly, that&amp;rsquo;s embarrassing. However, I&amp;rsquo;m constantly thinking of things that I want to talk about, that won&amp;rsquo;t fit into the limitations of Twitter or Facebook status updates. But because I never post anything, I don&amp;rsquo;t post anything new, &amp;lsquo;cause then I&amp;rsquo;d look like an idiot who never posts anything.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Drafts Archive</title>
      <link>https://darthnull.org/drafts/archives/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://darthnull.org/drafts/archives/</guid>
      <description></description>
    </item>
    <item>
      <title>InfoSec Archive</title>
      <link>https://darthnull.org/building/archives/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://darthnull.org/building/archives/</guid>
      <description></description>
    </item>
    <item>
      <title>InfoSec Archive</title>
      <link>https://darthnull.org/security/archives/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://darthnull.org/security/archives/</guid>
      <description></description>
    </item>
    <item>
      <title>misscellany Archive</title>
      <link>https://darthnull.org/misc/archives/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://darthnull.org/misc/archives/</guid>
      <description></description>
    </item>
    <item>
      <title>Puzzles and Fun Archive</title>
      <link>https://darthnull.org/fun/archives/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://darthnull.org/fun/archives/</guid>
      <description></description>
    </item>
    <item>
      <title>Site Archives</title>
      <link>https://darthnull.org/archives/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://darthnull.org/archives/</guid>
      <description></description>
    </item>
    <item>
      <title>Talks and Presentations</title>
      <link>https://darthnull.org/talk-history/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://darthnull.org/talk-history/</guid>
      <description>&lt;p&gt;A quick list of the talks and presentations I&amp;rsquo;ve given, and papers or other publications I&amp;rsquo;ve contributed to.&lt;/p&gt;&#xA;&lt;h3 id=&#34;2011&#34;&gt;2011&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;ShmooCon: Closing panel - Past, Present, and Future of &amp;ldquo;Something you know”&lt;/li&gt;&#xA;&lt;li&gt;NovaHackers: Nails in the Crypt&lt;/li&gt;&#xA;&lt;li&gt;Black Hat USA: Inside Apple&amp;rsquo;s MDM&lt;/li&gt;&#xA;&lt;li&gt;NovaHackers: The ShmooCon Ticket System&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;2012&#34;&gt;2012&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;ShmooCon, University of Wisconsin Lockdown: Inside Apple&amp;rsquo;s MDM (updated)&lt;/li&gt;&#xA;&lt;li&gt;IntrepidCon: Solving the Verizon DBIR Puzzle&lt;/li&gt;&#xA;&lt;li&gt;DerbyCon: Slow Down, Cowpoke - When enthusiasm outpaces common sense (importance of a methodical approach to Infosec testing)&lt;/li&gt;&#xA;&lt;li&gt;TV appearance: NBC News interview - Solving the Apple / “FBI” UDID data breach (Today Show, September 11, 2012).&lt;/li&gt;&#xA;&lt;li&gt;NovaHackers: Apple UDID Breach&lt;/li&gt;&#xA;&lt;li&gt;Private seminar: Apple UDID Breach&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;2013&#34;&gt;2013&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;ShmooCon, Source Boston, University of Michigan SUMIT_13, seminar at Federal Government customer: Protecting sensitive information on iOS devices&lt;/li&gt;&#xA;&lt;li&gt;DerbyCon: Raspberry Pi, Media Centers, and AppleTV&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;2015&#34;&gt;2015&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;ShmooCon: Knock Knock: A Survey of iOS Authentication Methods (also presented in 2015 at OWASP DC and OWASP NoVA)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;2016&#34;&gt;2016&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;ShmooCon: My Hash Is My Passport: Understanding Web and Mobile Authentication&lt;/li&gt;&#xA;&lt;li&gt;BSides Rochester and University of Connecticut TakeDownCon: A (not so quick) Primer on iOS Encryption&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;2018&#34;&gt;2018&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;NovaHackers, BSides Delaware: 1Password Internals&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;2019&#34;&gt;2019&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Staying Secure At Home (Internal Expel talk)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;2020&#34;&gt;2020&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Introduction to Cryptography (Internal Expel talk)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;papers-publications-and-training&#34;&gt;Papers, Publications, and Training&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Nails in the Crypt - Proof of concept demonstration of rainbow tables with salted UNIX crypt(3) password hashes&lt;/li&gt;&#xA;&lt;li&gt;Co-author and initial co-presenter of SANS class &amp;ldquo;Secure Mobile Applications Development: iOS App Security”&lt;/li&gt;&#xA;&lt;li&gt;Author and instructor of iOS half of 3-day application security testing course for private customer&lt;/li&gt;&#xA;&lt;li&gt;Author of mobile platform security comparison chapter of NCC Group &amp;ldquo;End-to-End Mobile Security&amp;rdquo; whitepaper, released at Mobile World Congress 2013&lt;/li&gt;&#xA;&lt;li&gt;Released research server for iOS Mobile Device Management&lt;/li&gt;&#xA;&lt;li&gt;Released test and demonstration software for directly accessing 1Password vaults, with detailed blog post series to support talk and software&lt;/li&gt;&#xA;&lt;li&gt;CVE-2014-1279: Disclosure of AppleID and Wi-Fi Passwords During Apple TV Touch Setup&lt;/li&gt;&#xA;&lt;/ul&gt;</description>
    </item>
  </channel>
</rss>
