<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/~files/feed.xsl"?>
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" xmlns:feedpress="https://feed.press/xmlns" version="2.0">
  <channel>
    <feedpress:locale>en</feedpress:locale>
    <feedpress:newsletterId>thierryzoller</feedpress:newsletterId>
    <atom:link rel="via" href="http://blog.zoller.lu/feeds/posts/default?alt=rss"/>
    <atom:link rel="self" href="http://feedpress.me/thierryzoller"/>
    <atom:link rel="hub" href="http://feedpress.superfeedr.com/"/>
    <atom:id>tag:blogger.com,1999:blog-3832621951001364942</atom:id>
    <lastBuildDate>Sun, 16 Jun 2019 12:41:51 +0000</lastBuildDate>
    <category>Advisory</category>
    <category>Rants from Thierry</category>
    <category>Tool</category>
    <category>Vulnerabilties</category>
    <category>Misc</category>
    <category>0day</category>
    <category>How-to</category>
    <category>Interesting Reads</category>
    <category>BTcrack</category>
    <category>Bluetooth</category>
    <category>Omron 3S4YR-MVFW Card reader</category>
    <category>Whitepaper</category>
    <category>About</category>
    <category>Lectures</category>
    <category>sslaudit</category>
    <category>Hardware hacking</category>
    <category>Vulnerability disclosure Policy</category>
    <category>sslscan</category>
    <category>tls scan</category>
    <category>zero day</category>
    <title>Musings on  Information Security</title>
    <description>_Where facts are few, experts are many</description>
    <link>http://blog.zoller.lu/</link>
    <managingEditor>noreply@blogger.com (Thierry Zoller)</managingEditor>
    <generator>Blogger</generator>
    <openSearch:totalResults>166</openSearch:totalResults>
    <openSearch:startIndex>1</openSearch:startIndex>
    <openSearch:itemsPerPage>25</openSearch:itemsPerPage>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-8661950861256834912</guid>
      <pubDate>Sun, 01 Oct 2017 11:58:00 +0000</pubDate>
      <atom:updated>2017-10-01T20:48:48.072+02:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">sslaudit</category>
      <category domain="http://www.blogger.com/atom/ns#">sslscan</category>
      <category domain="http://www.blogger.com/atom/ns#">tls scan</category>
      <category domain="http://www.blogger.com/atom/ns#">Tool</category>
      <title>TLS/SSL Audit - updated release</title>
      <description><![CDATA[<div><div style="text-align: justify;"><b>TLS/SSL Audit 09 release</b><br />Getting my hands on code again feels good. I updated TLS/SSL Audit to version 0.9. I improved the custom rudimentary core TLS engine, it remains independent of any open-source or commercial TLS Stack (like openssl) and hence allows it to support any cipher-suite or protocol.<br /><br… <a href="http://blog.zoller.lu/2017/10/update-to-tlsssl-audit-tlsssl-scanner.html">Read more →</a>]]></description>
      <link>http://blog.zoller.lu/2017/10/update-to-tlsssl-audit-tlsssl-scanner.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-xxMMPLE3rvk/WdDYMTgN9VI/AAAAAAAAAjQ/T0GppBpphRInJIG8yyie7OCAWMVXL8ksACLcBGAs/s72-c/ssl_audit.png" height="72" width="72"/>
      <georss:featurename>Luxemburg</georss:featurename>
      <georss:point>49.815273 6.1295830000000251</georss:point>
      <georss:box>49.1595375 4.838689500000025 50.471008499999996 7.4204765000000252</georss:box>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-6291877876688983305</guid>
      <pubDate>Sat, 20 Jul 2013 16:08:00 +0000</pubDate>
      <atom:updated>2017-05-07T14:33:58.424+02:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Rants from Thierry</category>
      <title>A prime example at bad Threat Modeling  (Or ignoring it) - Yahoo! Email Wishlist</title>
      <description><![CDATA[<br><h3 style="text-align: justify;">Yahoo! - &quot;Wish list&quot;</h3><div style="text-align: justify;"><a href="http://3.bp.blogspot.com/-TkPyvjodUd0/Ueq01PFtOAI/AAAAAAAAAcE/DnbrId77-3g/s1600/mw-630-computer-identity-theft-istock.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="103" src="https://3.bp.blogspot.com/-TkPyvjodUd0/Ueq01PFtOAI/AAAAAAAAAcE/DnbrId77-3g/s200/mw-630-computer-identity-theft-istock.jpg" width="200"></a>Yahoo! announced that <b>it will open up email accounts that are inactive since over a year for registration</b> <a href="https://wishlist.yahoo.com/">to anyone that applies.</a> Yahoo! is explaining this as a service to give everyone the chance to an Yahoo ID of their choice.</div><div style="text-align: justify;"><br></div><div style="text-align: justify;">As a lot of organisations and in particular web … <a href="http://blog.zoller.lu/2013/07/an-prime-example-at-bad-thread-modeling.html">Read more →</a></div>]]></description>
      <link>http://blog.zoller.lu/2013/07/an-prime-example-at-bad-thread-modeling.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-TkPyvjodUd0/Ueq01PFtOAI/AAAAAAAAAcE/DnbrId77-3g/s72-c/mw-630-computer-identity-theft-istock.jpg" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-8547154996188882360</guid>
      <pubDate>Tue, 25 Jun 2013 20:26:00 +0000</pubDate>
      <atom:updated>2013-07-20T18:26:45.669+02:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Tool</category>
      <title>Updated "Harden SSL/TLS" - Tweak and Harden Windows TLS SSL settings</title>
      <description><![CDATA[<br>I uploaded a new version of &quot;Harden SSL/TLS&quot;<br><h3>Changes</h3><ul><li>Added Windows 8 support</li><li>Added Windows Server 2012 support</li><li>Resolved an issue around P521 additions</li></ul><h3>About Harden SSL/TLS </h3><div style="text-align: justify;">Harden SSL/TLS” allows to configure and harden the SSL/TLS settings of Windows System, ranging from Windows XP to Windows 8 and from … <a href="http://blog.zoller.lu/2013/06/updated-harden-ssltls-tweak-and-harden.html">Read more →</a></div>]]></description>
      <link>http://blog.zoller.lu/2013/06/updated-harden-ssltls-tweak-and-harden.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-BipwOMlPvZM/Ucn03-pz-SI/AAAAAAAAAbY/PvuXAehpQck/s72-c/ssl+tls+harden+windows.PNG" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-2778492877113350546</guid>
      <pubDate>Sat, 23 Mar 2013 14:56:00 +0000</pubDate>
      <atom:updated>2013-03-23T16:35:44.914+01:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Interesting Reads</category>
      <title>Interesting Reads - Week 12 / 2013</title>
      <description><![CDATA[<h3>Interesting Reads - Week 12 / 2013</h3><ul><li><a href="http://scrammed.blogspot.de/2013/03/binary-instrumentation-for-exploit_10.html"><span style="font-family: inherit;">Binary Instrumentation for Exploit Analysis Purposes (part 1)</span></a></li><li><span style="font-family: inherit;"><a href="http://scrammed.blogspot.de/2013/03/binary-instrumentation-for-exploit.html">Binary Instrumentation for Exploit Analysis Purposes (part 2)</a><br />Using the PIN instrumentalisation framework to analyse exploits</span></li><li><span style="color: #333333; font-family: inherit;"><span style="line-height: 18px; white-space: pre-wrap;"><a href="http://bit.ly/YjABUv">Randomly failed! Weaknesses in Java Pseudo Random Number Generators (PRNGs)</a></span></span></li><li><span style="color: #333333;"><span style="line-height: 18px; white-space: pre-wrap;"><a href="http://j.mp/Y42bTi">FBI… <a href="http://blog.zoller.lu/2013/03/interesting-reads-week-12-2013.html">Read more →</a></a></span></span></li></ul>]]></description>
      <link>http://blog.zoller.lu/2013/03/interesting-reads-week-12-2013.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-2583740852924155355</guid>
      <pubDate>Sun, 03 Mar 2013 20:32:00 +0000</pubDate>
      <atom:updated>2013-03-23T16:04:48.518+01:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">sslaudit</category>
      <category domain="http://www.blogger.com/atom/ns#">Tool</category>
      <title>SSL Audit v.08 released</title>
      <description><![CDATA[<div><a href="http://4.bp.blogspot.com/-ZKY0EELd6_w/UTOyAnrRv3I/AAAAAAAAAao/juIrrJl0zHE/s1600/sslaudit.PNG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="128" src="http://4.bp.blogspot.com/-ZKY0EELd6_w/UTOyAnrRv3I/AAAAAAAAAao/juIrrJl0zHE/s200/sslaudit.PNG" width="200" /></a><br /><div style="text-align: justify;">I have updated my little TLS/SSL Scanner called "SSL Audit" to version 0.8. I tweaked it slightly but the tool is still based on it's own rudimentary SSL Engine and hence is not limited by the number of ciphersuites and protocols available to OpenSSL or NSS.</div></div><div style="text-align: justify;"><br /></div><div style="text-align: justify;">By the way I am still a little bit proud… <a href="http://blog.zoller.lu/2013/03/tool-ssl-audit-v08-release.html">Read more →</a></div>]]></description>
      <link>http://blog.zoller.lu/2013/03/tool-ssl-audit-v08-release.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-ZKY0EELd6_w/UTOyAnrRv3I/AAAAAAAAAao/juIrrJl0zHE/s72-c/sslaudit.PNG" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-3993368163968645222</guid>
      <pubDate>Mon, 19 Nov 2012 21:22:00 +0000</pubDate>
      <atom:updated>2012-11-19T23:00:20.953+01:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Interesting Reads</category>
      <category domain="http://www.blogger.com/atom/ns#">Misc</category>
      <category domain="http://www.blogger.com/atom/ns#">Whitepaper</category>
      <title>OWASP BeNeLux 2012 - Invitation</title>
      <description><![CDATA[<br /><div style="text-align: justify;"></div><div style="text-align: justify;">I would like to invite you to this years OWASP BeNeLux Event, I won't give a talk this year but I happily invite you as part of OWASP BeNeLux Program Committee: </div><div style="text-align: justify;"><br /></div><h3>Quick Facts</h3><ul><li>Date : <b>29-30 Novembre&nbsp;</b></li><li>Location: Leuven (Belgium)</li><li>Price : Free</li><li>Places : Limited (First registered, First serve) </li><li>Register <a href="https://owaspbenelux2012.eventbrite.com/" target="_blank">here </a></li><li><a href="https://www.owasp.org/index.php/BeNeLux_OWASP_Day_2012#Conferenceday"… <a href="http://blog.zoller.lu/2012/11/owasp-benelux-2012-invitation.html">Read more →</a></a></li></ul>]]></description>
      <link>http://blog.zoller.lu/2012/11/owasp-benelux-2012-invitation.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-ETUpnrWCvsU/UKqq7zPkpGI/AAAAAAAAAZg/YF86oQAFeg4/s72-c/owasp_benelux.JPG" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-7456078532208424237</guid>
      <pubDate>Sun, 05 Aug 2012 17:40:00 +0000</pubDate>
      <atom:updated>2012-08-07T23:30:42.775+02:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Interesting Reads</category>
      <category domain="http://www.blogger.com/atom/ns#">Misc</category>
      <title>Mistakes made in Incident Response</title>
      <description><![CDATA[<b>[ Updated : Added  &quot;10 Common Mistakes of Incident Responders&quot; at the bottom]</b><br><br><div style="text-align: justify;">The following post will brake one major rule I adhere to  when blogging, a post shall have not more than 10% of content that is not authored by myself. The content of this post resonated so well with me however that I d… <a href="http://blog.zoller.lu/2012/08/mistakes-made-in-incident-response.html">Read more →</a></div>]]></description>
      <link>http://blog.zoller.lu/2012/08/mistakes-made-in-incident-response.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-bt_wmMCFUYI/UB6vKYLUQZI/AAAAAAAAAXM/ryt728K1NRc/s72-c/bd623fa766512fdf6b57db66f522b741.jpg" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-4184453865683855618</guid>
      <pubDate>Sat, 04 Aug 2012 14:44:00 +0000</pubDate>
      <atom:updated>2012-08-07T23:34:14.473+02:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Advisory</category>
      <category domain="http://www.blogger.com/atom/ns#">Vulnerabilties</category>
      <title>What you need to know about the vulnerabilities in MSCHAPv2</title>
      <description><![CDATA[<a href="http://2.bp.blogspot.com/-HsxzgDDFsys/UB01zVM_H8I/AAAAAAAAAW4/oblA2ZDbRLw/s1600/eaps.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="http://2.bp.blogspot.com/-HsxzgDDFsys/UB01zVM_H8I/AAAAAAAAAW4/oblA2ZDbRLw/s200/eaps.jpg" width="150"></a><br>A post within the &quot;straight to the meat&quot; category :<br><br>There was a talk at Defcon 20 entitled &quot;<a href="https://www.cloudcracker.com/blog/2012/07/29/cracking-ms-chap-v2/" target="_blank">Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2</a>&quot;, by Moxie and David Hulton - the talk announced the implementation of a tool that <b>reduced the security of <a href="http://www.ietf.org/rfc/rfc2759.txt" target="_blank">MS-CHAPv2</a> to the strength of a <i>single</i>    DES… <a href="http://blog.zoller.lu/2012/08/what-you-need-to-know-about.html">Read more →</a></b>]]></description>
      <link>http://blog.zoller.lu/2012/08/what-you-need-to-know-about.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-HsxzgDDFsys/UB01zVM_H8I/AAAAAAAAAW4/oblA2ZDbRLw/s72-c/eaps.jpg" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-1858116292674118071</guid>
      <pubDate>Mon, 02 Jul 2012 20:15:00 +0000</pubDate>
      <atom:updated>2012-08-07T23:34:24.787+02:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">BTcrack</category>
      <category domain="http://www.blogger.com/atom/ns#">Tool</category>
      <title>BTcrack OSS 1.01 - Updated release</title>
      <description><![CDATA[<br><br>I updated BTCrack Open Source Edition (BTCrack OSS) to version 1.01 by patching 2 bugs that were reported by <a href="http://ossmann.blogspot.de/" target="_blank">Michael Ossmann</a> and Carl Dunhamm. <br><h3>          Description</h3><div style="text-align: justify;"><a href="http://4.bp.blogspot.com/-7zwNKMZIYaM/SZHu2yH-lpI/AAAAAAAAACY/39L6QELMd-U/s1600/btcrack_splash.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="127" src="http://4.bp.blogspot.com/-7zwNKMZIYaM/SZHu2yH-lpI/AAAAAAAAACY/39L6QELMd-U/s200/btcrack_splash.png" width="200"></a>The  primary goal of BTcrack is to crack/recover the PIN and reconstruct the link-key from a previously captured Bluetooth pairing … <a href="http://blog.zoller.lu/2012/07/btcrack-101-updated-release.html">Read more →</a></div>]]></description>
      <link>http://blog.zoller.lu/2012/07/btcrack-101-updated-release.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-7zwNKMZIYaM/SZHu2yH-lpI/AAAAAAAAACY/39L6QELMd-U/s72-c/btcrack_splash.png" height="72" width="72"/>
      <thr:total>0</thr:total>
      <georss:featurename>Luxembourg</georss:featurename>
      <georss:point>49.815273 6.129583</georss:point>
      <georss:box>49.487429 5.4978690000000006 50.143117 6.761297</georss:box>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-6833318658221322963</guid>
      <pubDate>Sun, 24 Jun 2012 12:45:00 +0000</pubDate>
      <atom:updated>2012-06-24T14:46:52.182+02:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Interesting Reads</category>
      <title>Recommended Reads - Week 25 / 2012</title>
      <description><![CDATA[<br /><h3>  Publications</h3><ul><li><a href="http://cryptanalysis.eu/blog/2012/04/06/ron-was-wrong-whit-is-right-weak-keys-in-the-internet/" target="_blank">In a blink of an eye - there goes your AES Key</a> <b><span style="background-color: yellow;"></span></b><br />Advances in extracting keying material from Hardware (FPGA)<b><span style="background-color: yellow;"></span></b></li><li><a href="http://www.youtube.com/watch?v=v1R_5wVbdz4&amp;feature=youtu.be" target="_blank">Visualising Botnets</a></li><li><a href="http://resources.infosecinstitute.com/slaac-attack/" target="_blank">Why allowing active ipv6 stacks on your network is a bad idea (but we don't route ipv6)</a></li><li><a href="http://blog.cryptographyengineering.com/2012/06/bad-couple-of-years-for-cryptographic.html" target="_blank">A bad couple of years for the cryptographic token industry</a> - <b style="background-color: yellow;">must read</b><br… <a href="http://blog.zoller.lu/2012/06/recommended-reads-week-25-2012.html">Read more →</a></li></ul>]]></description>
      <link>http://blog.zoller.lu/2012/06/recommended-reads-week-25-2012.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-8561174980972942296</guid>
      <pubDate>Sun, 10 Jun 2012 18:48:00 +0000</pubDate>
      <atom:updated>2012-06-10T20:48:30.521+02:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Interesting Reads</category>
      <title>Recommended Reads - Week 23</title>
      <description><![CDATA[<h3>  </h3><h3>  Tools / Techniques</h3><ul><li><a href="http://computer-forensics.sans.org/blog/2012/05/29/extract-flash-from-malicious-office-documents" target="_blank">How to Extract Flash Objects From Malicious MS Office Documents</a></li><li><a href="http://www.gremwell.com/burp_plugin_for_scanning_gwt_and_json" target="_blank">Burp plugin for scanning GWT and JSON HTTP requests</a></li><li><a href="https://sites.google.com/site/0x7674/home/sqlite3injectioncheatsheet" target="_blank">SQLite3 Injection Cheat Sheet</a></li><li><a href="http://theitgeekchronicles.files.wordpress.com/2012/05/scapyguide1.pdf" target="_blank">Unoffical Guide to scapy</a><br />Scapy is immensely powerfull as a seperate tool or as instrumented within your scripts. This guide is a good… <a href="http://blog.zoller.lu/2012/06/recommeded-reads-week-23.html">Read more →</a></li></ul>]]></description>
      <link>http://blog.zoller.lu/2012/06/recommeded-reads-week-23.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-6176658019190767483</guid>
      <pubDate>Sat, 09 Jun 2012 13:00:00 +0000</pubDate>
      <atom:updated>2012-06-13T23:13:17.273+02:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">How-to</category>
      <title>Storing password securely - hashses, salts and bit stretching put into context</title>
      <description><![CDATA[<br><div style="text-align: justify;"><h3>       Introduction</h3>Due to the latest row of <a href="http://in.reuters.com/article/2012/06/09/us-linkedin-breach-idINBRE85800Z20120609" target="_blank">high profile websites being compromised</a> and parts of the password hashes being published here&#39;s a quick crash course on storing passwords &quot;securely&quot;, for those that want a quick heads up. In this case I&#39;d define securely as &quot;Offering a suitable time… <a href="http://blog.zoller.lu/2012/06/storing-password-securely-hashses-salts.html">Read more →</a></div>]]></description>
      <link>http://blog.zoller.lu/2012/06/storing-password-securely-hashses-salts.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-1093407873155397680</guid>
      <pubDate>Sat, 02 Jun 2012 12:50:00 +0000</pubDate>
      <atom:updated>2012-06-02T15:44:51.266+02:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Interesting Reads</category>
      <title>Interesting Reads of the Week - Week 22</title>
      <description><![CDATA[<span style="font-size: large;">My Reads</span><br /><ul><li><a href="http://www.schneier.com/blog/archives/2012/06/the_vulnerabili.html?nc=18#comment-775268" target="_blank">The Vulnerabilities Market and the Future of Security</a><br />Bruce Schneier comments on the evolution of the Vulnerability Market and it's implications, the essay is surprisingly good supplement to the <a href="http://blog.zoller.lu/2011/10/attacker-classes-and-pyramid-version-1.html" target="_blank">presentation I gave</a> at OWASP on the Matter.</li><li><a href="http://taosecurity.blogspot.de/2012/05/sec-guidance-is-really-big-deal.html" target="_blank">SEC Guidance is a Really Big Deal</a><br /><span style="color: black;">New SEC guidance on… <a href="http://blog.zoller.lu/2012/06/interesting-reads-of-week-week-22.html">Read more →</a></span></li></ul>]]></description>
      <link>http://blog.zoller.lu/2012/06/interesting-reads-of-week-week-22.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-8848427690374817996</guid>
      <pubDate>Thu, 17 May 2012 11:23:00 +0000</pubDate>
      <atom:updated>2012-05-17T13:27:12.624+02:00</atom:updated>
      <title>Updates and Notable comments :</title>
      <description><![CDATA[<br /><b>Updated Posts :</b><br /><ul style="text-align: justify;"><li>The Post "<a href="http://blog.zoller.lu/2011/10/attacker-classes-and-pyramid-version-1.html" target="_blank">Attacker Classes and Pyramid</a> " has been updated to the third iteration. The post was updated in terms of coherency but I also added my OWASP BENELUX presentation entitled "<b>The Rise of the Vulnerability Markets - History, Impacts and Mitigations</b>". The presentation underlines… <a href="http://blog.zoller.lu/2012/05/updated-posts-and-notable-updates.html">Read more →</a></li></ul>]]></description>
      <link>http://blog.zoller.lu/2012/05/updated-posts-and-notable-updates.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-bgX5PhXBxoA/T7Tej5fEJcI/AAAAAAAAAWY/eJlFlwHHEas/s72-c/exploit.png" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-5536191032653560194</guid>
      <pubDate>Sat, 05 May 2012 13:47:00 +0000</pubDate>
      <atom:updated>2012-11-05T12:55:17.505+01:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Misc</category>
      <title>PCI Compliance, Security in isolated System and Parking Tellers (2nd)</title>
      <description><![CDATA[<div style="text-align: justify;"></div><div style="text-align: justify;">Following up on my blog post a few months ago entitled &quot;<a href="http://blog.zoller.lu/2011/12/pci-compliance-security-in-isolated.html">PCI compliance, Security in isolated systems and Parking Tellers Part 1</a>&quot; - I took a brief look the other day at another Ticket issued by a Parking Teller in Luxembourg.<br><br><b>Updated :</b><br><ul><li>Clarified some of the explanations</li><li>Masked Luhn number</li></ul></div><div style="text-align: justify;"><br></div><a href="http://blog.zoller.lu/2012/05/pci-compliance-security-in-isolated.html#more">Read more »</a>]]></description>
      <link>http://blog.zoller.lu/2012/05/pci-compliance-security-in-isolated.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-5AGJ8RxwEhA/T6ggXIHdS8I/AAAAAAAAAVw/OwZaXV_R1ak/s72-c/cc_masked.png" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-3537530159258704742</guid>
      <pubDate>Sat, 24 Mar 2012 13:51:00 +0000</pubDate>
      <atom:updated>2012-06-02T22:24:31.166+02:00</atom:updated>
      <title>CVSS - Common Vulnerability Scoring System - a critique [ Part1 ]</title>
      <description><![CDATA[<div style="text-align: right;"><div style="text-align: justify;"><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">Ever since I started my career in information security I was both interested and intrigued by metrics applied to vulnerabilities (or metrics in general for that matter). CVSS is certainly not new and I had to make the choice whether to use it or not in the past and I always wanted to share some is… <a href="http://blog.zoller.lu/2012/03/cvss-common-vulnerability-scoring.html">Read more →</a></div></div></div>]]></description>
      <link>http://blog.zoller.lu/2012/03/cvss-common-vulnerability-scoring.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-ff9MRpYgixI/T23ApSPJv1I/AAAAAAAAATE/ATdlKcLYAzE/s72-c/CVSS-model-temp.jpg" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-7314969346455474057</guid>
      <pubDate>Tue, 27 Dec 2011 15:02:00 +0000</pubDate>
      <atom:updated>2012-06-02T23:14:20.798+02:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Tool</category>
      <title>"SSL Audit" - Updated release (SSL/TLS Scanner)</title>
      <description><![CDATA[<br><b>Preamble :</b><br><div style="text-align: justify;"><a href="http://1.bp.blogspot.com/-wEtM9J9q31E/Tvnc7CWv6oI/AAAAAAAAASc/VToPKwObotY/s1600/sslaudit_screenshot.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="122" src="http://1.bp.blogspot.com/-wEtM9J9q31E/Tvnc7CWv6oI/AAAAAAAAASc/VToPKwObotY/s200/sslaudit_screenshot.png" width="200"></a>During my research on <a href="http://blog.zoller.lu/2011/09/tlsssl-hardening-and-compatibility.html" target="_blank">TLS/SSL Compatibility across different Operation Systems and Browsers</a> I created supporting tools for myself and later decided to release them for the public. <br><br>&quot;SSL Audit&quot; remotely scans web servers for SSL  support - unlike other tools it is not limited to ciphers… <a href="http://blog.zoller.lu/2011/12/ssl-audit-updated-released-ssltls.html">Read more →</a></div>]]></description>
      <link>http://blog.zoller.lu/2011/12/ssl-audit-updated-released-ssltls.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-wEtM9J9q31E/Tvnc7CWv6oI/AAAAAAAAASc/VToPKwObotY/s72-c/sslaudit_screenshot.png" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-2463497595311468403</guid>
      <pubDate>Fri, 23 Dec 2011 12:19:00 +0000</pubDate>
      <atom:updated>2011-12-23T14:00:00.431+01:00</atom:updated>
      <category domain="http://www.blogger.com/atom/ns#">Whitepaper</category>
      <title>Final - SSL/TLS renegotiation explained (CVE-2009-3555)</title>
      <description><![CDATA[<br />Final release for my paper explaining the different attack vectors and impacts for (CVE-2009-3555) "TLS / SSL renegotiation vulnerability".<br /><ul><li>Added comments and corrections by <a href="http://msmvps.com/blogs/alunj/default.aspx">Alun Jones</a> (Who I hereby thank for his time)</li><li>Changed FTPS description</li><li>Better PDF output</li></ul><div style="text-align: justify;">I profit from the update to stress… <a href="http://blog.zoller.lu/2011/12/final-ssltls-renegotiation-explained.html">Read more →</a></div>]]></description>
      <link>http://blog.zoller.lu/2011/12/final-ssltls-renegotiation-explained.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-6481594316151050236</guid>
      <pubDate>Tue, 06 Dec 2011 19:13:00 +0000</pubDate>
      <atom:updated>2013-03-16T13:47:23.646+01:00</atom:updated>
      <title>PCI compliance, Security in isolated systems and Parking Tellers (Part1)</title>
      <description><![CDATA[<br><div style="text-align: justify;">A colleague of mine spotted the below while doing expenses - The photograph below shows two separate receipts from two parking buildings that are not far away from each other in central Luxembourg (est. 1km). Both were paid by credit card / debit card.</div><br><b>Update:</b>  <a href="http://www.schneier.com/blog/archives/2011/12/multiple_protoc.html" target="_blank">Bruce Schneier thoughts on this matter</a><br><br><a href="http://blog.zoller.lu/2011/12/pci-compliance-security-in-isolated.html#more">Read more »</a>]]></description>
      <link>http://blog.zoller.lu/2011/12/pci-compliance-security-in-isolated.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-hshVF4Ayhig/Tt5pUM829eI/AAAAAAAAASI/6QSN2hfFI1U/s72-c/quittung.png" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-1150969640359588852</guid>
      <pubDate>Tue, 01 Nov 2011 12:57:00 +0000</pubDate>
      <atom:updated>2011-11-01T14:47:52.139+01:00</atom:updated>
      <title>Blog cleanup</title>
      <description><![CDATA[<br />As some regulars might have noticed I restructed this blog a bit trying to get rid of some clutter. At the same time I updated a few specific pages I wanted to point out :<br /><ul><li><a href="http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html">Vulnerability Coordination Policy</a> ( More backround on the "why" )</li><li><a href="http://blog.zoller.lu/2009/03/profile.html">About Me</a> (For those interested I added a bit of backround on… <a href="http://blog.zoller.lu/2011/11/blog-cleanup_01.html">Read more →</a></li></ul>]]></description>
      <link>http://blog.zoller.lu/2011/11/blog-cleanup_01.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-8294795631782082724</guid>
      <pubDate>Wed, 26 Oct 2011 18:41:00 +0000</pubDate>
      <atom:updated>2011-10-26T21:13:45.861+02:00</atom:updated>
      <title>THC SSL DoS - vs - Per Design</title>
      <description><![CDATA[<br />Since this is a rather old topic with both sides having valid points I will keep this post short and sweet. I have had no time to measure of investigate in depth and I don't think I will find any.<br /><br />Both have understandable view points, so let's have a look.<br /><span style="font-size: large;"><br /></span><br /><span style="font-size: large;">Secure renegotiation makes it easier -… <a href="http://blog.zoller.lu/2011/10/thc-ssl-dos-vs-per-design.html">Read more →</a></span>]]></description>
      <link>http://blog.zoller.lu/2011/10/thc-ssl-dos-vs-per-design.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-5621727569677144142</guid>
      <pubDate>Tue, 18 Oct 2011 18:20:00 +0000</pubDate>
      <atom:updated>2012-05-17T13:12:13.336+02:00</atom:updated>
      <title>Attacker Classes and Pyramid (Version 3)</title>
      <description><![CDATA[<br /><i>This is a living blog post I will update whenever I have time and new ideas.</i><br /><br /><span style="font-size: large;">TOC</span> <br /><ul><li>Introduction</li><li>Updates</li><li>Attacker Classes</li><li>Attacker Pyramid</li><li>Q&amp;A</li></ul><span style="font-size: large;">Introduction</span><br />The other day I was brainstorming further on the attacker classes I came up with last year (to be modeled into an Security Assurance Model) when I… <a href="http://blog.zoller.lu/2011/10/attacker-classes-and-pyramid-version-1.html">Read more →</a>]]></description>
      <link>http://blog.zoller.lu/2011/10/attacker-classes-and-pyramid-version-1.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-nfFCb7SQkyE/T7TaBKdsgHI/AAAAAAAAAV8/ZISLX3VtE1Q/s72-c/attacker_pyramid_attacker_class.png" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-7096697410885773442</guid>
      <pubDate>Mon, 26 Sep 2011 14:18:00 +0000</pubDate>
      <atom:updated>2011-10-01T21:01:34.749+02:00</atom:updated>
      <title>The BEAST summary - TLS, CBC, Countermeasures (Update 4)</title>
      <description><![CDATA[<div style="text-align: justify;"><i>Lots of good information floating on the internet on the <a href="http://phiral.net/Beast-SSL.rar">Proof of Concept (dubbed 'BEAST)</a> against TLS 1.0 by Juliano Rizzo and Thai Duong at the <a href="http://www.ekoparty.org/">Ekoparty</a>. </i></div><div style="text-align: justify;"><br /></div><div style="text-align: justify;"><b>This blog post will be continuously updated as new items and possible mitigation emerge.</b><i><b>&nbsp;</b></i><br /><i><b>&nbsp;</b><a href="http://feeds.feedburner.com/ThierryZoller">Subscribe to the RSS</a> feed in case you are interested… <a href="http://blog.zoller.lu/2011/09/beast-summary-tls-cbc-countermeasures.html">Read more →</a></i></div>]]></description>
      <link>http://blog.zoller.lu/2011/09/beast-summary-tls-cbc-countermeasures.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-DKzv733c-xU/ToCBwDmahUI/AAAAAAAAAQA/hzyW_XDU97E/s72-c/aaaaa2.png" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-4293378804439286873</guid>
      <pubDate>Tue, 20 Sep 2011 15:21:00 +0000</pubDate>
      <atom:updated>2011-09-25T17:33:20.260+02:00</atom:updated>
      <title>TLS/SSL hardening and compatibility Report 2011</title>
      <description><![CDATA[<div style="text-align: right;"><div style="text-align: left;"><i>This is a cross post from the <a href="http://blog.g-sec.lu/">G-SEC blog</a></i><br /><br />My professional and private commitments made it difficult to maintain a healthy blogging style, I am trying to get back to some blogging on a more regular basis.</div><div style="text-align: left;"><br /></div><div style="text-align: left;"><b>Quick Update:</b></div><div style="text-align: left;"></div><ul><li style="text-align: left;">G-SEC does&nbsp;<b>no longer operate on a commercial basis</b>, for those that want to join the… <a href="http://blog.zoller.lu/2011/09/tlsssl-hardening-and-compatibility.html">Read more →</a></li></ul></div>]]></description>
      <link>http://blog.zoller.lu/2011/09/tlsssl-hardening-and-compatibility.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-WRP9DFtnDyw/Tn9JsHDiAvI/AAAAAAAAAPk/knGPXb1xO2k/s72-c/aaaaa2.png" height="72" width="72"/>
      <thr:total>0</thr:total>
    </item>
    <item>
      <guid isPermaLink="false">tag:blogger.com,1999:blog-3832621951001364942.post-231612040921714654</guid>
      <pubDate>Tue, 23 Aug 2011 18:47:00 +0000</pubDate>
      <atom:updated>2011-09-24T17:24:05.164+02:00</atom:updated>
      <title>What did PHP crypt() and Alzheimer have in common ?</title>
      <description><![CDATA[<div style="font-family: inherit; text-align: right;"><div style="text-align: left;"><span class="Apple-style-span">I stumbled across this weird PHP bug in the crypt() implementation (version&nbsp;<span class="Apple-style-span" style="background-color: white;">5.3.7RC5) [1]</span></span><span class="Apple-style-span" style="background-color: white;"><br />The bug reporter states that :</span><br /><blockquote><span class="Apple-style-span" style="white-space: pre-wrap;">"If crypt() is executed with MD5 salts, the return value consists of the salt only.</span><span class="Apple-style-span" style="font-size: large; white-space: pre-wrap;">" </span></blockquote><span class="Apple-style-span" style="white-space: pre-wrap;"><span class="Apple-style-span">In other words the call :</span></span><br /><blockquote><span class="Apple-style-span" style="background-color: yellow; white-space: pre-wrap;">printf("MD5: %s\n", crypt('password', '$1$U7AjYB.O$'));</span></blockquote><br /><span class="Apple-style-span" style="background-color: white;">results in &nbsp;&nbsp;</span><br /><blockquote><span class="Apple-style-span" style="background-color: yellow; white-space:… <a href="http://blog.zoller.lu/2011/08/what-does-php-crypt-and-alzheimer-had.html">Read more →</a></span></blockquote></div></div>]]></description>
      <link>http://blog.zoller.lu/2011/08/what-does-php-crypt-and-alzheimer-had.html</link>
      <author>noreply@blogger.com (Thierry Zoller)</author>
      <thr:total>0</thr:total>
    </item>
  </channel>
</rss>
