BLOG

Shell script «libraries»

19 diciembre 2014

  If you are a security profesional (or an IT profesional) probably you -like us- are constantly writing shell scripts, so that you can automate certain tasks in your linux (or unix) environment. We don’t usually use shell scripting to write complex applications (although some shell scripts become quite…

Book: Mobile communications Hacking and Security – SECOND EDITION

29 mayo 2014

Back in november 2011 we published our first book about mobile communications security… After more than a thousand units sold, we are proud to announce that the second edition of the boook is available. During this two and a half years, like other researchers, we have maintained our activity…

3G Attacks at RootedCON 2014

26 marzo 2014

Some time ago we learned that a subset of the attacks that were possible for 2G mobile communications using a fake base station were also possible in 3G, particularly: IMSI Catching: or how to know whether an IMSI is active in the range of the attacker’s base station Geo-location…

Using easy-rsa certificates for authentication within IPsec in standalone Windows systems

7 enero 2014

Abstract In this article and the white paper that accompanies it, we describe how to use easy-rsa, the free and open source certification authority software based on OpenSSL, to generate digital certificates that can be used to mutually authenticate IPsec connections between standalone Windows systems. First we describe the problem…