Remove Architecture Remove Authentication Remove Construction Remove Linux
article thumbnail

Technology Short Take #25

Scott Lowe

I came across this post on CloudFoundry’s User Account and Authentication Service (the UAA). This is an awesome overview of the OpenStack Folsom architecture , courtesy of Ken Pepple. Only a true geek would be interested in this, but here’s some information on running OpenBSD in KVM on Linux.

Storage 92
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

Knudsen: Normally I would use virtual machines for this, I go install Linux and install the other stuff and work away at the command line until I got to where I wanted it to be. This is how malware, for example, is analyzed; if the virtual machine gets infected and crashes, the physical machine isn’t impacted.