crypt

Aastra IP Telephone Crypto Failure

The Aastra 6753i IP telephone uses 3DES encrypted payloads in ECB mode to pass configuration files, allowing for modification to the phone's set up.




crypt

Design And Implementation Of A Voice Encryption System For Telephone Networks

This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish.




crypt

Running Encrypted ELF Binaries In Memory

Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project.




crypt

Global TV Unencrypted Analytics

The Global TV Android and iOS applications send potentially sensitive information such as device model and resolution, mobile carrier, days since first use, days since last use, total number of app launches, number of app launches since upgrade, and previous app session length, unencrypted to both first (CNAME to third) and third party sites (Adobe Experience Cloud, ScorecardResearch). Global TV Android versions 2.3.2 and below and iOS versions 4.7.5 and below are affected.




crypt

Citytv Video Unencrypted Analytics

The Citytv Video Android and iOS applications send potentially sensitive information such as device model and resolution, mobile carrier, days since first use, days since last use, total number of app launches, number of app launches since upgrade, and previous app session length, unencrypted to third party sites (Adobe Experience Cloud, ScorecardResearch). Citytv Video Android versions 4.08.0 and below and iOS versions 3.36 and below are affected.




crypt

rcrypt 1.4

rcrypt is a Windows PE binary crypter (a type of packer) that makes use of timelock techniques to cause a delay in execution. This delay can cause analysis to fail on time constrained systems such as on disk scanners. rcrypt can pack exes and dll files. It bypasses KAV and many others. Archive password is 0xrage.com.





crypt

Mandos Encrypted File System Unattended Reboot Utility 1.8.11

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.










crypt

HP Data Protector Encrypted Communication Remote Command Execution

This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2.




crypt

Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS





crypt

CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept

This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA.




crypt

RC4 Simple FILE Encryption / Decryption

Simple script to perform RC4 encryption / decryption.




crypt

XOR File Encryption / Decryption

Script to perform basic XOR file encryption / decryption.













crypt

Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service

Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability.












crypt

OpenSSH Chink Bares Encrypted Data Packets




crypt

Cryptocurrency AML Regulation: 10 January 2020 Regime

As part of the UK Governments’ ongoing programme to implement the European Union’s Fifth Money Laundering Directive (5MLD) in UK law, the FCA will begin supervising Anti Money Laundering and Countering Financing of Terrorism (AML/CFT) co...




crypt

The law for crypto-asset custody

James Burnie throws light on the law for the custody of crypto-assets in this exclusive interview with New Money Review. Click here to read the article > This article was written and published by New Money Review Staff on November 25, 2019....




crypt

Regulation of crypto custody in Germany from January 2020

As part of the implementation of the Amending Directive of the Fourth EU Directive on Money Laundering (Directive (EU)2018/843), the German Federal Government has decided to include crypto assets in the list of financial instruments and to regulate ...




crypt

Overview of new German and French crypto regimes

Part A: Regulation of crypto assets     Germany



crypt

Crypto Tax Update: HMRC Publishes Guidance on the Taxation of Cryptoassets for Businesses

  Summary On 1 November HMRC published its much anticipated guidance on the taxation of cryptoassets for businesses. The guidance sets out HMRC’s view on the taxation of transactions involving cryptoasset exchange tokens (such as Bitcoin)...




crypt

Crypto Tax Update: HMRC publishes updated guidance on the taxation of cryptoassets for individuals – situs of exchange tokens

  What’s new? On 20 December 2019, HMRC published an updated version of its guidance on the taxation of cryptoassets for individuals. The guidance was updated to include a new section in respect of the location (situs) of exchange tokens ...