Cryptographic attacks

Replay attack

A replay attack (also known as a repeat attack or playback attack) is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a spoofing attack by IP packet substitution. This is one of the lower-tier versions of a man-in-the-middle attack. Replay attacks are usually passive in nature. Another way of describing such an attack is:"an attack on a security protocol using a replay of messages from a different context into the intended (or original and expected) context, thereby fooling the honest participant(s) into thinking they have successfully completed the protocol run." (Wikipedia).

Replay attack
Video thumbnail

Is A DOS Attack A Weapon? | Idea Channel | PBS Digital Studios

Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateidea Here's an idea: a DOS attack is a weapon. Denial of Service (DOS) or Distributed Denial of Service (DDOS) attacks take down servers by distracting them with meaningles

From playlist Newest Episodes

Video thumbnail

Tutorial: GeoHTTP Remote Buffer Overflow and DoS

A real example of a Buffer Overflow/Denial of Service attack! My favorite video: http://www.youtube.com/watch?v=z00kuZIVXlU Visit http://binslashshell.wordpress.com and join our forum community!!! This is a video showing what a Buffer Overflow Aattck can do to a Web Server. For th

From playlist Denial of Service attacks

Video thumbnail

A-Ha - Take On Me (Vocals Half-Step Out of Key)

My Social Medias, yo (ง ͠° ͟ل͜ ͡°)ง ➤ https://linktr.ee/

From playlist Songs to Torture Undergrads

Video thumbnail

Underwater dry ice bombs - high-speed video

Blowing up some dry ice bombs at a pool party. Look out for the drone soaking explosion at the end!

From playlist High-speed video

Video thumbnail

Sound Effect III

This is a video response to RootBerry Sound Effect Contest. I saw a man who could play music like that. I'm not that good, though. Anyway, forgive me for that. ;~)

From playlist Other...

Video thumbnail

The World Wars: Hitler Turns On Stalin (S1, E2) | History

In this scene, Hitler invades Russia despite his agreement with Stalin. Subscribe for more The World Wars: http://histv.co/SubscribeHistoryYT Check out exclusive The World Wars videos and full episodes: http://www.history.com/shows/the-world-wars #WorldWars Check out our Facebook games

From playlist War & Battle | History

Video thumbnail

DEFCON 18: WPA Too 2/3

Speaker: Md Sohail Ahmad WPA2 is the most robust security configuration available today for WiFi networks. It is widely used to secure enterprise WLANs. Interestingly, it is also being used to secure guest, municipal and public WiFi networks. In this paper, we present a new vulnerabilit

From playlist DEFCON 18-2

Video thumbnail

Black Hat USA 2010: SprayPAL: How Capturing and Replaying Attack Traffic Can Save Your IDS 1/2

Speakers: Patrick Engebretson, Kyle Cronin & Dr. Josh Pauli Testing Intrusion Detection Systems (IDS) to ensure the most malicious attacks are detected is a cornerstone of these systems, but there is no standardized method to execute these tests. Running live exploitations is not always a

From playlist BH USA 2010 - TURBO

Video thumbnail

DEFCON 18: WPA Too 2/4

Clip 2/4 Speaker: Md Sohail Ahmad Manager R&D, AirTight Networks WPA2 is the most robust security configuration available today for WiFi networks. It is widely used to secure enterprise WLANs. Interestingly, it is also being used to secure guest, municipal and public WiFi networks. In

From playlist DEFCON 18-1

Video thumbnail

Source Boston 2010: ZigBee Hacking and the Kinetic World 4/6

Clip 4/6 Speaker: Josh Wright. InGuardians, Inc. ZigBee has been established as a low-power wireless protocol, boasting features that make it attractive for smart grid technology. Combined with the Smart Energy Profile, ZigBee is quickly becoming a staple technology in the home area netwo

From playlist SOURCE Boston 2010

Video thumbnail

Real-time Demolition physics - Extended version

This is the extended version of the video for extended fun. This is my own implementation for shattering physics, mainly inspired by the persons below. Thanks go out to: scorpion81 - ideas TomWalks - ideas darczol - first person template http://kostackstudio.de

From playlist Real-Time / Dicing Destruction

Video thumbnail

I Hacked Into My Own Car

The first 100 people to go to https://blinkist.com/stevemould will get unlimited access for 1 week to try it out. You'll also get 25% off if you want full membership. Gaining unauthorised entry to someone else's car is illegal. Jamming is illegal in the UK. It might be illegal where you l

From playlist Best of

Video thumbnail

Black Hat USA 2010: Understanding the Windows SMB NTLM Weak Nonce Vulnerability 2/5

Speakers: Hernan Ochoa, Agustin Azubel In February 2010, we found a vulnerability in the SMB NTLM Windows Authentication mechanism that have been present in Windows systems for at least 14 years (from Windows NT 4 to Windows Server 2008). You probably haven't heard about this vulnerabilit

From playlist BH USA 2010 - OS WARS

Video thumbnail

OWASP AppSecUSA 2012: Reverse Engineering Secure HTTP API's With an SSL Proxy

Speakers: Alejandro Caceres and Mark Haase The proliferation of mobile devices has led to increased emphasis on native applications, such as Objective-C applications written for iOS or Java applications written for Android. Nonetheless, these native client applications frequently use HTTP

From playlist OWASP AppSecUSA 2012

Video thumbnail

DEFCON 18: How Hackers Won the Zombie Apocalypse 2/3

Speaker: Dennis Brown In April, 2010, a zombie outbreak occurred in Providence, Rhode Island. These were not traditional zombies however; They were controlled by an electronic device that allowed for wireless attacks against the living around them. Fortunately, the living had their own

From playlist DEFCON 18-1

Video thumbnail

DEFCON 20: SQL ReInjector - Automated Exfiltrated Data Identification

Speakers: JASON A. NOVAK ASSISTANT DIRECTOR, DIGITAL FORENSICS; STROZ FRIEDBERG, LLC ANDREA (DREA) LONDON DIGITAL FORENSIC EXAMINER; STROZ FRIEDBERG, LLC In 2011, SQL injections became front page news as ever more high profile companies were victims of automated SQL injection attacks. Res

From playlist DEFCON 20

Video thumbnail

GORUCO 2015: Bryan Reinero: Event sourcing

@blimpyacht Event Sourcing is powerful way to think about domain objects and transaction processing. Rather than persisting an object in it's current state, event sourcing instead writes an immutable log of deltas (domain events) to the database. from this set of events, an object's state

From playlist GORUCO 2015

Video thumbnail

Motorcycle Crash Attack

First the motorcycles are riding together, but then the farmer's motorcycle turns left

From playlist Stop Motion

Related pages

Encryption | Timestamping (computing) | Plaintext | Shared secret | Hash function | Man-in-the-middle attack | Pre-play attack | Pseudorandomness | Kerberos (protocol) | Cryptographic nonce | Message authentication code | Salt (cryptography) | Adversary (cryptography) | Key (cryptography)