Zen One

Web Name: Zen One

WebSite: http://blog.zenone.org

ID:229279

Keywords:

Zen,One,

Description:

keywords:
description:
Zen One

Blog of Steve Zenone, Security Guy

Monday, February 26, 2018 Pwned PasswordsOn February 22, 2018, Troy Hunt released the V2 update to Pwned Passwords.

Pwned Passwords is a service that checks to see if any of your passwords have been leaked in any third-party security breaches. Troy also provided a new API that allows you to lookup a password by using its hash. That means you don't have to send over the password that you want to check.

I created a short Python script that performs the check against the API. It'll hash your password on your local system and check the hash for you against api.pwnedpasswords.com.

The code repository can be found on github.

As an example, here I'm checking for `password` as the password. In this example, Over 3 million accounts have been found from third-party breaches using the weak password of `password`.


No comments: Monday, February 6, 2012 Retrieving a Stolen iPhone in Under 72 HoursImage via streamingmedia.com
Within 53 hours I was able to get a stolen iPhone safely into police custody. Here's a rough timeline of the steps I went took to get the phone back to the rightful owner:


Saturday, 2/4/2012 @ 8:45 AM -- iPhone was "lost" (i.e., stolen).
Called stolen iPhone and it rang four times before going to voicemail, suggesting that it was powered on and had reception. Used the "Find iPhone" app to locate the phone using the Apple ID credentials of the stolen iPhone,but it was unable locate the phone.Using the "Find iPhone" app, sent lock code to stolen iPhone to ensure that it was locked and required an unlock code to access the phone.Using the "Find iPhone" app, sent messages with sound to the stolen iPhone stating that the phone was lost and to call ###-###-#### (my Google Voice number). No response.Shortly thereafter the iPhone was powered down by the "someone" who had possession of the phone.I had the owner of the stolen iPhone change passwords to accounts accessed by the iPhone (e.g., Gmail, Dropbox, etc).Setup the email account used as the Apple ID of the stolen iPhone to forward a copy of all mail from "noreply@me.com" to an account I setup at Boxcar. The reason for doing this was to have push notifications sent to my phone moments after the stolen iPhone would be powered on and receive the commands that I sent from the "Find iPhone" app.There's a Boxcar iOS app that I installed on the device that I was doing the tracking from.Opted not to report the phone as stolen with ATT yet since I wanted to be able to continue tracking the phone.Also opted not to remotely wipe the iPhone via the "Find iPhone" app for the same reason.The "Erase all data on iPhone after 10 failed passcode attempts" option was turned off on the iPhone. This was a good thing since it prevented the stolen iPhone from being wiped by 10 failed passcode entries and becoming un-trackable.
Sunday, 2/5/2012 @ 10:00 AM -- the iPhone was powered on by "someone" and the location of the phone was identified.
I received a push notification from Boxcar showing that an email from noreply@me.com was received. That meant that the stolen iPhone was powered on and was now locatable.Used both the "Find iPhone" and "Find Friends" iPhone apps by Apple to track the location of the phone.Another option was logging into iCloud with the Apple ID and password associated with the stolen iPhone ... which I did.Location of the phone tracked to a residential address.Used Google maps and street view to look at the house.Identified the owner of the house using PropertyShark.Gathered information about the owner using Intelius.Again, sent messages with sound to the stolen iPhone stating that the phone was lost and to call ###-###-#### (my Google Voice number). No response.The phone was powered down by the "someone" who had possession of the phone roughly five minutes after it was powered on.Checked ATT for any unauthorized calls. There were no unauthorized calls.A police report was submitted online to the police department where the phone was stolen.The police department where the phone was currently located (different city than where the phone was stolen) would not accept a report directly since the theft occurred in a different city.
Monday, 2/6/2012 @ 10:46 AM -- the iPhone was powered on and left on.
Using both the "Find iPhone" and "Find Friends" apps, the GPS location of the stolen iPhone was the same address as the address that was identified on Sunday.A police report was submitted online to the police department. The location of theft was intentionally left vague, implying that the theft occurred in the city where the phone was currently being tracked to. The police department was willing to accept the incident report.
Monday, 2/6/2012 @ 1:04 PM -- Called the records and dispatch departments of the PD from the city where the stolen iPhone was currently located.
Gave the incident report tracking number to dispatch.After a lengthy conversation, dispatch agreed to send an officer to the house and that the officer would call me back if I needed to cause the stolen iPhone to make a sound.
Monday, 2/6/2012 @ 1:36 PM -- Received a call from the responding officer.
The police officer stated that he went to the residential address.The officer stated that the owners of the house were at the residence.The police officer gained possession of the phone.The police officerasked me for the unlock code and some contact data that was on the phone to verify ownership.The officer relayed the convoluted story that the individual who had stolen the iPhone told him.We agreed to check the phone into the police department's chain-of-custody and the stolen iPhone will be picked up by the rightful owner soon.Called the police department from where the phone was stolen, stated that the iPhone was retrieved by another police department, and the case was closed.... and that's a happy ending.

Apple has more information about locating a lost or stolen iPhone here.

Related articlesNYPD meets FMI: Cop nabs iPhone thief in NYC (tuaw.com)Home invasion suspects caught with iPhone's help (tuaw.com)Find my iPhone/iPad2 in iCloud (phobe2phile.wordpress.com)7 comments: Tuesday, January 17, 2012 Koobface AnalysisToday Facebook announced that it will share the data it has collected about the group of people behind the Koobface virus. Facebook didn't provide any details about the"Koobface gang". However, in a separate blog post independent researchers Jan Drömer and Dirk Kollberg of SophosLabs did provide details of their analysis. I found the SophosLabs article a very interesting read in that it details thepainstakinglyslow processinvestigatorsmust endure to piece security incidents together and that given enough time and resources "cybercrimes" can be solved.

"Up until now, Drömer and Kollberg's research has been a closely-guarded secret, known only to a select few in the computer security community and shared with various law enforcement agencies around the globe" ... "At the police's request we have kept the information confidential, but last week news began to leak onto the internet about Anton 'Krotreal' Korotchenko - meaning the cat was well and truly out of the bag." --Graham Cluley,Sophos analyst
Link to Analysis:http://nakedsecurity.sophos.com/koobface/
Related articlesTwitter worms (ggl): Web Gang Operating in the Open - New York Times (nytimes.com)No comments: Monday, December 19, 2011 DHS Cybersecurity Strategy and New California eCrime UnitImage by Getty Images via @daylifeA couple of interesting items within the information security world...

I. The Department of Homeland Security has released a new cybersecurity strategy document with a two-pronged approach:
Protecting critical infrastructure todayBuilding a more secure cybersecurity ecosystem for the futureDownload the Blueprint for a Secure Cyber Future document (PDF).

II. California Attorney General Kamala D. Harris has announced the creation of a new eCrime Unit to investigate and prosecute technology crime.

"The primary mission of the eCrime Unit is to investigate and prosecute multi-jurisdictional criminal organizations, networks, and groups that perpetrate identity theft crimes, use an electronic device or network to facilitate a crime, or commit a crime targeting an electronic device, network or intellectual property." READ MORE

Related articlesBlueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise(bespacific.com)DHS Releases Blueprint for Cybersecurity(govsellingsolutions.com)California targets cybercrime, identity theft (sfgate.com)State attorney general launches eCrime Unit (sfgate.com)California unveils new unit to fight cybercrime (news.cnet.com)California Creates Special Unit to Fight Computer Crimes (bits.blogs.nytimes.com)California Forms Cyber Crime Unit (informationweek.com)No comments: Wednesday, December 14, 2011 America the VulnerableImage by formalfallacy @ Dublin (Victor) via Flickr
During my commute to and from work I recently began listening to the audiobook, "America the Vulnerable: New Technology and the Next Threat to National Security" by Joel Brenner, narrated by Lloyd James. The audiobook was downloaded from Audible.com.

Im currently half-way through the unabridged audio and am enjoying it. The book is an eye-opening reminder of what many of us within the InfoSec industry are already aware of as we analyze security events on a daily basis. American national security, our economy, physical and energy infrastructure, financial system and our own privacy are at risk and that if security isn't built into our systems, our systems won't be secure. From what Ive listened to so far, Brenner does a good job of laying out the cyber-threat facing the United States.

I hope to finish the audiobook by the end of this week as Im interested in hearing what Brenner has to prescribe as a solution to the problem. Though I have yet to finish the audiobook,I recommend it as a must read for anyone interested or with career in cybersecurity.

Related articlesNormative Cyber Security (bloginfosec.com)America the Vulnerable (csmonitor.com)No comments: Monday, December 12, 2011 New Reader Poll - CISSP ExamImage via WikipediaI just posted a reader poll that's now viewable on the right-hand column of this blog.I want to get opinions from those of you that have your CISSP certification. There are two questions in the poll:

If you are a CISSP, did your employer at the time encourage you to take the CISSP exam? (Yes/No)If you are a CISSP, did your employer pay for you to take the CISSP exam, or did you? (Employer paid/you paid)
The poll can also be accesseddirectlyfrom here.

As for the value of a CISSP vs. other certifications ... that's for yet another posting.
No comments: Friday, December 9, 2011 Free Security Awareness Training - Part 5 of 5Image via WikipediaToday's post concludes the series of five posts whereby I wanted to give you links to 25 security awareness courses and videos that are publicly available.

I strongly believe that security awareness training is an essential component to good security. Throwing money and technology at the security problem might be worthwhile in the early stages of maturity of anoriginzatzion'sinformation security program. However, the problem with this approach is that there are diminishing returns; more technology becomes less and less effective at improving security. Something needs to improve beyond installing and patching technology on a daily basis, forever running around attempting to deal with securityincidentsand emerging threats and doing work simply for work's sake. The human dimension is a critical part of this, and security awareness training helps sharpen this humancomponent; the HumanOS.
Analytical Investigative Tools(Multijurisdictional Counterdrug Task Force Training)
What Every Law Enforcement Officer Should Know About DNA Evidence Investigators and Evidence Technicians(DNA Initiative)Food Security Training(US Food and Drug Administration)Explosives, Booby Traps and Bomb Threat Management(Multijurisdictional Counterdrug Task Force Training)HAZMAT Transportation Security Awareness Training(Dangerous Goods International)
Related articlesFree Security Awareness Training - Part 1 of 5 (zenone.org)Free Security Awareness Training - Part 2 of 5 (zenone.org)Free Security Awareness Training - Part 3 of 5(zenone.org)Free Security Awareness Training - Part 4 of 5(zenone.org)No comments: Older PostsHomeSubscribe to:Posts (Atom)AboutSteve Zenone
My name is Steve Zenone and I like security. You can email me at $(echo 2p574q45.bcnld@pbz | tr a-z@. n-za-m.@)Search This BlogPopular PostsPCI Compliance - Disable SSLv2 and Weak CiphersAccording to section 4.1 of the the Payment Card Industry Data Security Standard ( PCI-DSS ) v1.2, merchants handling credit card data are ...Retrieving a Stolen iPhone in Under 72 Hours Image via streamingmedia.com Within 53 hours I was able to get a stolen iPhone safely into police custody. Heres a rough timeline o...Sync Oracle Calendar to Google Calendar + iCal + iPhoneIve been searching for a reliable method to automate the synchronization of events from Oracle Calendar (formerly CorporateTime) to m...Blog Archive 2018(1) February(1)Pwned Passwords 2012(2) February(1) January(1) 2011(15) December(9) November(6) 2009(9) May(4) March(1) February(2) January(2) 2008(18) October(1) August(1) July(4) June(3) May(4) March(1) February(2) January(2) 2007(3) December(3) 2006(1) February(1)
Awesome Inc. theme. Powered by Blogger.

TAGS:Zen One 

<<< Thank you for your visit >>>

Websites to related :
Kent.ac.uk - www.kent.ac.uk Webs

  keywords:
description:
ip-address.comHomeMy IPSpeedtestSitemapProxy CheckerProxy ListVerify Email AddressTrace Email AddressIP to Zip CodeIP Address D

nike543.com

  keywords:
description:
Skip to content

Journal of Hematology Oncology P

  keywords:
description:

Inspired By This | Wedding Blog,

  keywords:
description:Inspired By This is a lifestyle site dedicated to bringing you everyday inspiration for your wedding, home, entertaining, family

IMAGE Sandy Hill Community News

  keywords:
description:
Skip to content IMAGE Sandy Hill Community Ne

Pharmapproach.com - Unifying for

  keywords:
description:Pharmapproach.com is an online platform developed to serve as a source of materials, resources, reviews and downloads including

Soft One

  keywords:comprensión, lectura, lektor kids, lektor executive, lektor smart, comprender, leer rápido, comprender mejor, comprendiendo, aplicación de

Go Pro Costa Rica - Go Pro Costa

  keywords:
description:
About Go Pro Meet the Team FAQs Course CalendarCourses Divemaster co

Home | Language Science | UCI So

  keywords:
description:
University of California, Irvine UNDERGRAD GRAD ALUMNI

Images biztha: Biztha and ekuruv

  keywords:images.biztha.com, images.biztha.com review, ramil holland, tamil business connections, thirumurugan com net, lavahospital, www.biztha.com
de

ads

Hot Websites