Encrypt Linux partition using LUKS

Hi everybody. Today I will explain you how to use LUKS to encrypt a disk partition. LUKS stands for Linux Unified Key Setup that means that you can forget to mount as such LUKS partition on a Windows operating system. LUKS uses cryptsetup user-space tool to configure dmcrypt, a kernel-space module that made all cryptography stuffs. Because LUKS… Continue reading

[HowTo] Disallow global anonymous bind in OpenLDAP 2.4+

Hello everybody, In this post I will explain the simplest method to disable global anonymous binding using cn=config. This method can be easily adapted for a static configuration using slapd.conf. I am not an OpenLDAP expert but in my previous [HowTo] about OpenLDAP 2.4+, the default configuration allow anonymous binding… Continue reading

[News] iDict, the Bruteforcer of iCloud account

Hello, everybody ! Hacker’s world starts new year with a cool gift from an hacker named “Pr0x13″ with the tool iDict which permits to bruteforce iCloud account. This tool is available to download on GitHub. This tool uses an exploit a security flaw of Apple iCloud security infrastructure to bypass restrictions… Continue reading

[News] Bash ShellShock issue – bigger threat than Heartbleed ?

A newly discovered security issue in the widely used Linux software, Bash. Some cyber experts have said that this vulnerability may be a bigger threat than famous Heartbleed flaw surfaced in April 14. For those who don’t know, Bash is the software used to control the command prompt on many… Continue reading

[News] Hacker Shows How to Break Into Military Communications

Speaking at the Black Hat cyber security conference, the analyst Ruben Santamarta of IOActive presented a paper showing that communications devices from Harris, Hughes, Cobham, Thuraya, JRC, and Iridium are all highly vulnerable to attack. Soldiers on the front lines use satellite communications systems, called SATCOMS to call in back up,… Continue reading