If you are a security profesional (or an IT profesional) probably you -like us- are constantly writing shell scripts, so that you can automate certain tasks in your linux (or unix) environment. We don’t usually use shell scripting to write complex applications (although some shell scripts become quite…
Book: Mobile communications Hacking and Security – SECOND EDITION
May 29, 2014
Back in november 2011 we published our first book about mobile communications security… After more than a thousand units sold, we are proud to announce that the second edition of the boook is available. During this two and a half years, like other researchers, we have maintained our activity…
Some time ago we learned that a subset of the attacks that were possible for 2G mobile communications using a fake base station were also possible in 3G, particularly: IMSI Catching: or how to know whether an IMSI is active in the range of the attacker’s base station Geo-location…
Using easy-rsa certificates for authentication within IPsec in standalone Windows systems
January 7, 2014
Abstract In this article and the white paper that accompanies it, we describe how to use easy-rsa, the free and open source certification authority software based on OpenSSL, to generate digital certificates that can be used to mutually authenticate IPsec connections between standalone Windows systems. First we describe the…
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.