I hereby claim:
- I am cerebralmischief on github.
- I am cerebralmischief (https://keybase.io/cerebralmischief) on keybase.
- I have a public key ASCUavhszWDKWUCbZI9k1dwk0zXePCpvnx9wkA5JgnJ7two
To claim this, I am signing this object:
| RDP Eavesdropping and Hijacking | |
| ******************************* | |
| I spent some time this evening looking at ways to eavesdrop and hijack RDP sessions. Here is a gist of (semi) interesting findings | |
| that is not very new... | |
| =========== | |
| Inspiration | |
| =========== | |
| As you may already know... |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <stdint.h> | |
| #ifdef _MSC_VER | |
| #include <intrin.h> /* for rdtscp and clflush */ | |
| #pragma optimize("gt",on) | |
| #else | |
| #include <x86intrin.h> /* for rdtscp and clflush */ | |
| #endif |
I hereby claim:
To claim this, I am signing this object:
| import java.io.FileDescriptor; | |
| import java.io.FileOutputStream; | |
| import java.io.IOException; | |
| import java.io.OutputStream; | |
| import java.io.PrintStream; | |
| public class HelloWorld{ | |
| private static HelloWorld instance; | |
| public static void main(String[] args){ | |
| instantiateHelloWorldMainClassAndRun(); |
| from twisted.internet import reactor, defer, endpoints, task, stdio | |
| from twisted.conch.client import default, options, direct | |
| from twisted.conch.error import ConchError | |
| from twisted.conch.ssh import session, forwarding, channel | |
| from twisted.conch.ssh import connection, common | |
| from twisted.python import log, usage | |
| import signal | |
| import tty | |
| import struct | |
| import fcntl |
| # Silk Road 2.0, What Could Possibly Go Wrong? | |
| There are a number of risks with the reopened Silk Road. Rather than explore them | |
| in depth, I'll look at some of the more serious security issues facing them. | |
| [Ed: Since I began writing this in early December, at least some of what I | |
| predicted has come to pass. Three of the moderators from the original Silk Road | |
| have now been arrested.] | |
| ## Plenty of Possible Problems |
| -----BEGIN PGP SIGNED MESSAGE----- | |
| Hash: SHA512 | |
| Undercover communication | |
| It should be obvious by now, that the only way to communicate | |
| stealthily and securely is to avoid raising suspicion to the | |
| level at which the authorities might consider it worthwhile | |
| to put you under active surveillance (e.g., park a van with | |
| TEMPEST equipment by your apartment). |