Overview of multiplatform password managers

The news about LastPass hack broke recently. If the user had strong password, the password is not brute-forcable. However dictionary passwords along with passwords that are guessable with mutation and Markov chains can be broken up to length of 12 characters on one GPU even though LastPass’s key derivation function (KDF) using 100000 iterations. This means that if the attacker can crack user’s simple password, the attacker can download the encrypted blob containing passwords from LastPass and use the cracked password to decrypt them. The weakest link here is the password strength.

Botnet from compromised routers

In the next release of Turris OS, we would like to give our users the possibility to play a more active part in detection of network attacks. The first of the new functions is SSH honeypot which lures the attacker into a virtual environment where we can then observe his activity. This method will be more thoroughly described in a separate blog post planned for the near future. The second addition is less ambitious, but much simpler and still very useful. It is stripped down version of a honeypot which we internally call a “minipot”. In contrast to the normal honeypot which lets any attacker in with any password, our minipot just pretends that there is the possibility of logging in, and collects the supplied user names and passwords.

What does The Honeynet Project do and what is our connection to it

The Honeynet Project is a nonprofit organization established by Lance Spitzner, which brings together researchers and programmers from around the world. It is engaged in investigating attacks, their monitoring and the development of open-source tools in the field of information security.

Successful termination of the exercise Cyber Europe 2014

The CSIRT.CZ team has since summer of the year 2013 actively participated in the preparation and later also in the realization of the so far biggest European cybernetic exercise Cyber Europe 2014 which was already for the third time organized by the European Network and Information Security Agency – ENISA.

My African mission: CZ.NIC pairs delight as well as help Ethiopia

In the last year, CZ.NIC prepared for children pairs which include 32 themes connected with computers. While pictures are in every pair the same, their names are at one card in Czech and at the other in English. After the experience when these pairs were of use e.g. within the frame of a leisure-time club of English organized by the House of Youth and Children of Prague 9, I took the purely English variant to the Ethiopian school Halaba where I, as volunteer, teach children to work with computer within the frame of project supported by the Czech development agency.

pexes_03

Kleptography – a renovated method of how to get to your data is on the increase

We would considerably enjoy it if the cryptography crises limited themselves to one per day. We know, however, that it is only a wishful thinking.

Unintentional exfiltration of keys

The Chinese manufacturer of electronics Lenovo went in his greed so far that he not only pre-installs the display of advertisement on newly installed notegooks but the installed adware of third parties called Superfish even injects javascript into the code of the page being browsed; the goal is to analyze the page and to target the advertisement better. While doing this it does not limit itself only on non-coded HTTP connection.