Digital Operatives
  • Home
  • Blog
  • Careers
  • Contact
  • Products
  • Research
  • Services
Select Page

Exploiting Password Weaknesses in Physical Security

by digitaloperatives | Jan 31, 2014 | Research

Digital spin locks like the Kaba Mas X-09 and X-10 are very common for high security applications like vault doors. US General Services Administration approval means that they are nearly ubiquitous in securing government filing cabinets that contain documents that are...

PHDays CTF Quals 2014 Write-up: "turututu"

by digitaloperatives | Jan 30, 2014 | Capture the Flag

We are given a file, “task.exe,” and told that “smthg wrong with this env.”  Running `file` tells us that this is not an EXE at all: it is an x86_64 ELF.  We try to run it and quickly determine it expects a certain command-line...

PHDays CTF Quals 2014 Write-up: "miXer"

by digitaloperatives | Jan 29, 2014 | Capture the Flag

The description of the task is that the program has been stuck “in a blender.”  Upon opening the program in IDA Pro, it is clear the bytes have been modified, since there are nonsensical instructions and a large block of undecipherable bytes. It is...

PHDays CTF Quals 2014 Write-up Collection

by digitaloperatives | Jan 28, 2014 | Capture the Flag

If you know of a link we have missed, please let us know in the comments and we will add it shortly.  Thanks! Metal Gear Felix http://tasteless.se/2014/01/phd-ctf-quals-2014-rbox-and-metal-gear-felix-writeup/ mp3 me...

Security for Lawfirms: Protecting Your Clients' Secrets

by digitaloperatives | Jan 24, 2014 | Services

Data security is paramount for any business, especially those entrusted with the intellectual property of others.  Today’s cyber threats are only growing more sophisticated, and keeping your business secure is correspondingly ever more complex. ...
« Older Entries

Recent Posts

  • Bug Bounty: An Economic Disadvantage for Researchers?
  • The 10 Humorous But Immutable Laws of Cloud Security
  • Defeating Cisco’s Machine Learning Based Malware Traffic Detection Algorithm
  • The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords
  • Idea Machine – Part 1: Automated Reconnaissance For Penetration Testing

Archives

  • July 2023
  • October 2018
  • September 2018
  • May 2018
  • September 2017
  • August 2017
  • July 2017
  • April 2015
  • February 2015
  • September 2014
  • February 2014
  • January 2014
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • December 2012
  • November 2012
  • October 2012

Categories

  • Capture the Flag
  • Products
  • Research
  • Security News
  • Services
  • Uncategorized