Author Archives: Peter Hannay

Hooray for Reading: Hacking the Kindle

As promised here are the slides & the sample code for the kindle ssh thingy. Update: The magical key required to identify to amazon can be found at: /var/local/java/prefs/cookies/Cookie__x-fsn_WITH_DOMAIN__amazon.com.cookie No more browser trickery required 🙂 slides modified corkscrew.c current jailbreak … Continue reading

Posted in security, tutorial | 1 Comment

Paper: “Using Traffic Analysis to Identify Tor Usage – A Proposed Study”

Title: Using Traffic Analysis to Identify Tor Usage – A Proposed Study Authors: John Barker, Peter Hannay, Christopher Bolan Abstract Traditional attacks against anonymous routing systems aim to uncover the identities of those involved, however, a more likely goal of … Continue reading

Posted in paper, security | Leave a comment

Paper: “The 2010 IDN Homograph Attack Mitigation Survey”

Title: The 2010 IDN Homograph Attack Mitigation Survey Authors: Peter Hannay, Christopher Bolan Abstract The advent of internationalised domains has introduced a new threat with the non-english character sets allowing visual mimicry of common domain names. Whilst this phenomenon remains … Continue reading

Posted in paper, security | Leave a comment

Paper: “Geotagging where Cyberspace comes to your Place”

Title: Geotagging where Cyberspace comes to your Place Authors: Craig Valli, Peter Hannay Abstract The combination of GPS services and information technology is increasing with the use of geotagging now occurring as a default action in many commodity based devices … Continue reading

Posted in paper, security | Leave a comment

Paper: “Satellite Navigation Forensics Techniques – Research In Progress”

Title: Satellite Navigation Forensics Techniques – Research In Progress Authors: Peter Hannay Abstract Satellite navigation systems are becoming increasingly common for automotive use within the civilian population. This increase in use is of interest to forensic investigators as satellite navigation … Continue reading

Posted in forensics, gps, paper | Leave a comment

Paper: “The 2009 Personal Firewall Robustness Evaluation”

Title: The 2009 Personal Firewall Robustness Evaluation Authors: Ken Pydayya, Peter Hannay, Patryk Szewczyk Abstract The evolution of the internet as a platform for commerce, banking, general information and personal communications has resulted in a situation where many individuals who … Continue reading

Posted in paper, security | Leave a comment

Paper: “An Assessment of Internationalised Domain Name Homograph Attack Mitigation Implementations”

Title: An Assessment of Internationalised Domain Name Homograph Attack Mitigation Implementations Authors: Peter Hannay, Christopher Bolan Abstract With the advent of internationalised domains the threat posed by non-english character sets has eventuated. Whilst this phenomenon remains well known in the … Continue reading

Posted in paper, security | Leave a comment

Paper: “Freegate: A Defence against the Pending Censorship of Australia?”

Title: Freegate: A Defence against the Pending Censorship of Australia? Authors: Christopher Bolan, Peter Hannay Abstract The commencement of a trial of Internet Service Provider (ISP) level content filtering as a precursor to nation wide mandatory content filters in Australia … Continue reading

Posted in paper, security | Leave a comment

Paper: “Firewire Forensics in Modern Operating Systems”

Title: Firewire Forensics in Modern Operating Systems Authors: Peter Hannay, Andrew Woodward Abstract This research looked at whether the FireWire direct memory access function tool would work with three modern Windows operating systems. The tool requires local access to the … Continue reading

Posted in Uncategorized | Leave a comment

Paper: “Fun & Games: an Introduction to Console Forensics”

Title: Fun & Games: an Introduction to Console Forensics Authors: Peter Hannay Abstract The scope of functionality provided by video game consoles has been consistently expanding to encompass features that were once limited to general purpose personal computers. This expansion … Continue reading

Posted in forensics, paper | Leave a comment