#md5

Douglas J Hunleyhunleyd@fosstodon.org
2025-04-18
Peter B.p3ter
2025-03-27

@joshuatj
regarding mismatch:
Have you tried "vbindiff" so get an idea of size and positions of bad bytes?

(apt install vbindiff)
cjmweb.net/vbindiff/

Erik C. Thauvinethauvin
2025-02-04
DamonHDDamonHD
2025-01-20

@algernon @wolf480pl I haven't looked at your implementation yet, but I'm tempted to build into my static sites a version of what I think you may be doing with an -URL-hash-driven maze in a few lines of config, which any dodgy request such as for a PHP file flings the visitor into. Won't care about the UA or anything else much, though could return 503s/429s randomly for fun.

2025-01-19

Fodcha Is Coming Back, Raising A Wave of Ransom DDoS

Background On April 13, 2022, 360Netlab first disclosed the Fodcha botnet. After our article was published, Fodcha suffered a crackdown from the relevant authorities, and its authors quickly responded by leaving "Netlab pls leave me alone I surrender" in an updated sample.No surprise, Fodcha's authors didn't really stop updating after the fraudulent surrender, and soon a new version was released. In the new version, the authors of Fodcha redesigned the communication protocol and started […]

whalers.ir/blog/fodcha-is-comi

Adam Jacobs 🇺🇦statsguy@mas.to
2025-01-11
2024-11-29

Китайская криптография. Анализ проприетарного протокола MMTLS из WeChat

Изображение из документации протокола MMTLS Академическая исследовательская группа Citizen Lab из университета Торонто провела первый публичный анализ протокола шифрования MMTLS на предмет безопасности и конфиденциальности. Это основной протокол приложения WeChat , которым пользуется более 1,2 млрд человек ( 34% мобильного трафика в Китае в 2018 году). Как выяснилось, MMTLS представляет собой модифицированную версию TLS 1.3, причём многие изменения, внесённые разработчиками, привели к появлению слабых мест. Более того, в дополнение к MMTLS используется ешё менее безопасный, тоже проприетарный протокол, содержащий множество уязвимостей, в том числе детерминированные векторы инициализации в AES-GCM и отсутствие прямой секретности. Ниже он упоминается под названием Business-layer encryption.

habr.com/ru/companies/globalsi

#TLS #MMTLS #WeChat #DH #AESGCM #AESCBC #MD5 #HKDF #шифрование #векторы_инициализации

2024-11-26

#MD5 Team line up
-4 taken + 3 x FT
Havertz ➡️ Gyokeres
Yamal ➡️ Raphinha 🧢 Day1
Molina➡️ Giménez
Kobel ➡️ Somner

Good luck all! 🍀
#UCLfantasy
#Bluesky

UCL MD5 Rocky Start team line up
2011-12-18

#X509Cert Fingerprint:DCB4EEA828A7722F9E0D182D31A906AA #MD5 ; Subject Alt. Name: . #WebID

2011-12-17

#X509Cert Fingerprint:6EC19CA703B60B5B07D9EDFB5AEBAC87 #MD5 ; Subject Alt. Name: . #WebID

2011-12-13

#X509Cert Fingerprint:13:E2:61:4E:67:FA:3E:96:DA:AA:B9:E6:FD:E2:48:0C #MD5 ; Subject Alternative Name: . #WebID

2011-11-29

#X509Cert Fingerprint:6E:C2:1C:29:A3:1E:67:8E:BB:73:D1:96:BF:96:B4:05 #MD5 ; Subject Alternative Name: . #WebID

2011-11-21

#X509Cert Fingerprint:4D:1F:D2:4C:96:84:2F:43:D1:30:0B:DE:19:4B:4A:54 #MD5 ; Subject Alternative Name: . #WebID

2011-11-25

#X509Cert Fingerprint:2C:FA:C3:45:A1:19:15:68:0C:4C:79:1C:62:C3:E0:7C #MD5 ; Subject Alternative Name: . #WebID

2024-10-27

Trying something new with #GitHub and posting my spam #UCE #UBE and suspect / #malicious #emails and their associated attachments. Putting everything in a #mastodon post was problematic with space limitations, and was hard to find/organize/search.

Providing the redacted headers and URLs to the malware sandboxes used:

github.com/obrientg/Analysis/b

Received two (2) of the same samples, with different file names & hashes but the same detection of JS/Phish.AAL
Both were sent to the email address I use for threat intel & incident response collaboration efforts.
Email SRC on both was Google Cloud (#GCP) with an #openproxy, abuse reporting submitted.

#MD5 5cf33dd39d6db60423ac89fd63e5f500
#SHA1 863c95b7e7ff0bb8299cbae93dfaed12cc619332
#SHA256 c4e40b137e43c89261ee89a34db843477a8c994a21a92c98c7b15193face8c35

#MD5 8a9af78b0a4cdade6df9f71e7e5b1362
#SHA1 b03fdf0891adacc1995fdd1e2f043343c20a45e5
#SHA256 317aaea9d9ef39c9b85b9ce6e0f68ec83a06b2f3298aded981b19063b2f44737

#malware #incidentResponse #malwareAnalysis
#InfoSec #informationSecurity #cybersecurity #cyberz #cyber #cybercrime
#phish #phishing
#threatIntel #IoC #threatIntelligence #cyberthreatintelligence #CTI

2024-10-26

Need to convert a #wordlist to #hash? Meet #hashgen, the blazingly fast hash generator. Currently supports 18+ modes such as #md5, #sha, #ntlm, #crc, #base64 encode/decode, and converting $HEX[] to #plaintext.
Cross-compilable for Linux, Windows and Mac.
forum.hashpwn.net/post/89

#hashpwn #hashcracking #hashcat #hex

backup taking a while for md0 - need to remember to image the boot part too - guymager verifies both source and the image which is nice, leaves you a txt note so you can be sure backup is solid #crc checks #md5 #sha-1 #sha-256

Kevin Karhan :verified:kkarhan@infosec.space
2024-08-30

@x_cli @soatok +9001%

The obly use cases for #MD5 & #SHA1 is to enshure like successful transmission and completeness, NOT to prevent against being sent a malicious / tampered file...

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst