Re: arc4random weakness (was: WikiLeaks CIA Exploits: FreeBSD References Within)

2017-03-13 Thread Dewayne Geraghty
On 14 March 2017 at 09:06, Steven Chamberlain wrote: > From this document (TOP SECRET//SI//NOFORN): > https://wikileaks.org/ciav7p1/cms/files/NOD%20Cryptographic% > 20Requirements%20v1.1%20TOP%20SECRET.pdf > > version 1.0 said: > > | 8. (S//NF) [...] If RC4 is used, at least the first 1024 > | by

Re: arc4random weakness (was: WikiLeaks CIA Exploits: FreeBSD References Within)

2017-03-13 Thread Steven Chamberlain
From this document (TOP SECRET//SI//NOFORN): https://wikileaks.org/ciav7p1/cms/files/NOD%20Cryptographic%20Requirements%20v1.1%20TOP%20SECRET.pdf version 1.0 said: | 8. (S//NF) [...] If RC4 is used, at least the first 1024 | bytes of the cryptostream must be discarded and may not be used and tha

Re: WikiLeaks CIA Exploits: FreeBSD References Within

2017-03-09 Thread grarpamp
On Wed, Mar 8, 2017 at 10:52 AM, Dag-Erling Smørgrav wrote: > grarpamp writes: >> https://search.wikileaks.org/?q=freebsd > That doesn't indicate a vulnerability. Shell code is what you use to Yep, sec folks are aware of the difference between sample and exploit code, and vulnerabilities. https

Re: WikiLeaks CIA Exploits: FreeBSD References Within

2017-03-08 Thread Dag-Erling Smørgrav
grarpamp writes: > https://search.wikileaks.org/?q=freebsd > > Currently returns many pages similarly named... > > "Shell Code Database > This page includes local links to a shellcode > database discovered at shell-storm.org." That doesn't indicate a vulnerability. Shell code is what you use to

WikiLeaks CIA Exploits: FreeBSD References Within

2017-03-07 Thread grarpamp
https://search.wikileaks.org/?q=freebsd Currently returns many pages similarly named... "Shell Code Database This page includes local links to a shellcode database discovered at shell-storm.org." (And a pentest report mention from much older HBGary. Plus some other unlikely miscellaneous hits.)