Penetration Testing mailing list archives
Re: Re: Determining the encryption used
From: cwright () bdosyd com au
Date: 12 May 2006 22:26:10 -0000
Hello, To throw in my 5 cents (2cents being abolished in AU) There are a couple classes to consider. First is the obvious. If there are headers and footers that allow analysis than these are covered early. Next if we look at classes where there are no headers etc to see directly what it is, there is a level of analysis required. First is the data chunked? Does it conform to set blocks. Is it streamed? Is there any surrounding stream information that can help? Inferential Statistics and a good program for data mining will help. but this would be another 300-800 pages to post. Grab a book; Differential Cryptanalysis of the Data Encryption Standard by Eli Biham, Adi Shamir or as an intro to the subject; Cryptanalysis by Helen F. Gaines In reality this is not a question that can easily be answered. It needs to be fleshed out. Where was the data obtained. In a file and extracted, from a stream? What supporting information is there? How was it created? How was it found? What permissions does it have?....... Regards, Craig ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Re: Determining the encryption used, (continued)
- Re: Determining the encryption used Tonnerre Lombard (May 12)
- Re: Determining the encryption used Tim (May 12)
- Re: Determining the encryption used Phoebe Tunstall (May 12)
- Re: Determining the encryption used Peter Kosinar (May 13)
- Re: Determining the encryption used Tim (May 13)
- Re: Determining the encryption used Tim (May 12)
- Re: Determining the encryption used Tonnerre Lombard (May 12)
- RE: Determining the encryption used Sahir Hidayatullah (May 12)
- Re: Determining the encryption used thomas springer (May 12)
- Re: Determining the encryption used Dotzero (May 12)
- Re: Determining the encryption used iccs-abr (May 12)
- RE: Determining the encryption used Bob Bell (rtbell) (May 12)
- Re: Re: Determining the encryption used cwright (May 12)