Practical Security


App, Data, Cloud and IoT Security

Analyzing a stripped binary

If you are dealing with a binary that has been cleaned off all the function names and debug information, and in gdb disass wants a defined function, use x/i address

How to use key file instead of a passphrase for Luks

How to use key file instead of a passphrase Add a file and remove passphrase, which usually is in the slot 0. First see what slots you have cryptsetup luksOpen /dev/sdx1 blah cryptsetup luksDump sudo chmod 0700 /root/.keyfiles sudo chmod 0400 /root/.keyfiles/luks_backups cryptsetup luksAddKey /dev/sda1 –key-file=/root/.keyfiles/luks_keyfile.bin dont need to put... [Read More]

An effective way to fight portscans

Introduce long delays on commonly scanned ports that you do not use, like FTP 23. This way a system on the other end is stuck waiting, hoping that you will open a connection, and wastes its resources