Category Archives: security

Paper: “Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms”

Title: Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms Authors: Peter Hannay, Clinton Carpene, Craig Valli, Andrew Woodward, Mike Johnstone Abstract The ActiveSync protocol’s implementation on some embedded devices leaves clients vulnerable to unauthorised remote policy enforcement.This paper discusses … Continue reading

Posted in paper, security | Leave a comment

Paper: “Eavesdropping on the Smart Grid”

Title: Eavesdropping on the Smart Grid Authors: Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, Chris Holme Abstract An in-situ deployment of smart grid technology, from meters through to access points and wider grid connectivity, was … Continue reading

Posted in paper, security | Leave a comment

Paper: GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering

Title: GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering Authors: Peter Hannay, Greg Baatard Abstract The current social media landscape has resulted in a situation where people are encouraged to share a greater amount of information … Continue reading

Posted in gps, paper, security | Leave a comment

Paper: “The 2011 IDN Homograph Attack Mitigation Survey”

Title: The 2011 IDN Homograph Attack Mitigation Survey Authors: Peter Hannay, Greg Baatard Abstract The advent of internationalized domain names (IDNs) has introduced a new threat, with the non-English character sets allowing for visual mimicry of domain names. Whilst this … Continue reading

Posted in paper, security | Leave a comment

Paper: “Using traffic analysis to identify The Second Generation Onion Router”

Title: Using traffic analysis to identify The Second Generation Onion Router Authors: John Barker, Peter Hannay, Patryk Szewczyk Abstract Anonymous networks provide security for users by obfuscating messages with encryption and hiding communications amongst cover traffic provided by other network … Continue reading

Posted in paper, security | Leave a comment

Paper: “GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering”

Title: GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering Authors: Peter Hannay, Greg Baatard Abstract The current social media landscape has resulted in a situation where people are encouraged to share a greater amount of information … Continue reading

Posted in forensics, gps, paper, security | Leave a comment

Paper: “Kindle Forensics: Acquisition & Analysis”

Title: Kindle Forensics: Acquisition & Analysis Authors: Peter Hannay Abstract The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, … Continue reading

Posted in forensics, paper, security | Leave a comment

Paper: “Backtrack in the Outback – A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia”

Title: Backtrack in the Outback – A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia Authors: Craig Valli, Andrew Woodward, Peter Hannay Abstract The authors were involved in extensive vulnerability assessment and penetration testing of over 15 … Continue reading

Posted in paper, security | Leave a comment

Hooray for Reading: Hacking the Kindle

As promised here are the slides & the sample code for the kindle ssh thingy. Update: The magical key required to identify to amazon can be found at: /var/local/java/prefs/cookies/Cookie__x-fsn_WITH_DOMAIN__amazon.com.cookie No more browser trickery required slides modified corkscrew.c current jailbreak & … Continue reading

Posted in security, tutorial | 1 Comment

Paper: “Using Traffic Analysis to Identify Tor Usage – A Proposed Study”

Title: Using Traffic Analysis to Identify Tor Usage – A Proposed Study Authors: John Barker, Peter Hannay, Christopher Bolan Abstract Traditional attacks against anonymous routing systems aim to uncover the identities of those involved, however, a more likely goal of … Continue reading

Posted in paper, security | Leave a comment