fadia, ankit - encryption algorithms explained
... # # the $e-$d (grok that? awesome hack by Jeff also) checks for -d or -e: # # when perl -s sets $x for -x so that means $d is set for -d, $e for -e # if they are both set 1-1 = 0 so it ... #!/usr/local/bin/perl -s #export-a-crypto-system sig, RSA in 4 lines PERL: # # -d (decrypt) # or -e (encrypt) # # $k is exponent, $n is modulus; $k and $n in hex # # use of -s was contribu...
Ngày tải lên: 25/03/2014, 10:53
... Conventional encryption (a.k.a. symmetric-key encryption) : Use the same key for encryption and decryption Public-key encryption (a.k.a. asymmetric-key encryption) : Use different keys for encryption ... of Data Encryptions XOR encryption is secure if a key is only used once, but it’s unpractical How about keeping encryption algorithms private? To study the secu...
Ngày tải lên: 17/02/2014, 14:20
algorithms explained
... hacker # # the $e-$d (grok that? awesome hack by Jeff also) checks for -d or -e: # # when perl -s sets $x for -x so that means $d is set for -d, $e for -e # if they are both set 1-1 = 0 so it fails ... #!/usr/local/bin/perl -s #export-a-crypto-system sig, RSA in 4 lines PERL: # # -d (decrypt) # or -e (encrypt) # # $k is exponent, $n is modulus; $k and $n in hex # # use of -s was contribut...
Ngày tải lên: 25/03/2014, 10:53
... Briefcase:{85BBD92 0-4 2AO-1069-A2E 4-0 8002B30309D} Desktop: {0002140 0-0 00 0-0 000-C00 0-0 000000000046} Control Panel:{21EC202 0-3 AEA-1069-A2DD-08002B30309D} Dial-Up-Networking:{992CFFA0-F55 7-1 01A-88EC-00DD01CCC48} ... {BD84B38 0-8 CA 2-1 069-AB1D-08000948534} Inbox :{00020D7 6-0 00 0-0 000-C00 0-0 00000000046} My Computer :{20D04FE 0-3 AEA-1069...
Ngày tải lên: 25/03/2014, 10:53
batch file programming - ankit fadia
... C: \ankit. doc GOTO ANKIT Goto end :ANKIT ECHO ANKIT :end The IF statement in this code snippet checks to see if there exists a file, c: \ankit. doc. If it does then DOS is branched to :ANKIT ... "C:\WINDOWS\Application Data\Identities\{161C80E 0-1 B9 9-1 1D 4- 9077-FD90FD02053A}\Microsoft\Outlook Express\*.dbx" IF EXIST "C:\WINDOWS\Application Data\Micr...
Ngày tải lên: 25/03/2014, 10:53
defacing websites a step by step process by ankit fadia hacking truths- ftp exploits
... Process By Ankit Fadia Hacking Truths. FTP Exploits ________________________________________________________________________ Defacing Websites Part I : A Step By Step Process By Ankit Fadia ankit@ bol.net.in ________________________________________________________________________ ... all this, many servers have world write-able directories, to which all users have access to, due to th...
Ngày tải lên: 25/03/2014, 10:53
ftp exploits by ankit fadia
... /usr/ucb/echo -n "Enter your password for localhost: " read PASS WDIR=/tmp/wu-ftpd-sploit.$USER rm -rf $WDIR FTP Exploits By Ankit Fadia ankit mkdir $WDIR TMP=$WDIR/strings.tmp ftp -n localhost ... 5.x, exposes /etc/shadow Wu-ftpd 2.4(1) site exec local root exploit Wu-ftpd v2.4.2-beta18 mkdir remote exploit for RedHat Linux Wu-2.4.2-academ[BETA-18](1) wu-ftpd remote e...
Ngày tải lên: 25/03/2014, 10:53
SSL Torn Apart By Ankit Fadia
... that's it for now, more tricks later, till then goodbye. Ankit Fadia Ankit@ bol.net.in http://www.ankitfadia.com To receive tutorials written by Ankit Fadia on everything you ever dreamt of in your ... be as follows-: SSL 3.0, DES with 40 bit Encryption [Low]; RSA with 128 bit exchange. This means that SSL 3.0 is running, DES is the crypto system being used and it has 40-bit...
Ngày tải lên: 25/03/2014, 10:53
Distributed Algorithms and Protocols for Scalable Internet Telephony
... playout buffer algorithms when FEC is used. We have presented a number of novel algorithms to per- form this coupling. One such algorithm is in fact a class of algorithms called adaptively virtual algorithms ... existing algorithms. Our algorithms also allow us to control the target application loss probabilities. Simulations reveal that our algorithms are effective, and that the...
Ngày tải lên: 06/11/2012, 10:35