This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Arkalian

Pages: [1] 2
1
Found it on the Webs / Re: Blackhat USA 2012 Training Video
« on: March 05, 2015, 11:00:31 AM »
I was wondering if this was ever archived.

2
Found it on the Webs / Re: Useful CEH Ethical Hacking Vids
« on: February 22, 2015, 05:56:02 AM »
Nice +1

4


I was looking around on the web and came across this website that was giving EZ some Props. Evilzone rated #2 (Should've been #1 >:() as the the Top 5 Websites To Learn How To Hack Like A Pro!

They said:

"While the name, EvilZone, isn’t exactly the most inviting – it is easily one of the largest forum communities that you’ll find on the subject of hacking. With over 13,042 members and over 50,000 posts (and counting), this community likely has the skills and knowledge to answer any programming question you could possibly have. Just be careful about coming across as a “noob” – these guys don’t handle newcomers with kid gloves, so be careful."


I loved that last part.  ;D

Ark

Here's the website:
http://www.makeuseof.com/tag/top-5-websites-to-learn-how-to-hack-like-a-pro/


5
Say it ain't so.... :'(

6
Say It Ain’t So - An Implementation of Deniable Encryption by Ari Trachtenberg
from Blackhat Asia 2014
https://www.youtube.com/watch?v=9v3_xhzcZOs

Say It Ain’t So - An Implementation of Deniable Encryption
White Paper.
Download Deniable Encrypt.zip

I found this presentation and whitepaper on Deniable Encryption. Pretty cool.

Ark


7
Reverse Engineering / Re: What book to begin with
« on: January 22, 2015, 09:19:27 PM »
I would definitely go with Practical Malware Analysis. It has labs that you can do that progressively get harder as you get more experienced as well as an accompanying website where you can download the sample lab malware. Also, this is a good webinar with Michael Sikorski and Andrew Honig (The guys who wrote it) that has some good info to help get you started. They both are top Malware researchers/analysts from Mandiant. So it's safe to say that they know what there talking about.

I hope this helps.

Ark

Practical Malware Analysis book (Axon's Link)
http://upload.evilzone.org/download.php?id=6047157&type=zip

The accompanying website with the labs and sample malware.
http://practicalmalwareanalysis.com/labs/

Practical Malware Analysis Webinar
https://www.youtube.com/watch?v=1PfVhvtuUDM


8
General discussion / Re: Question:How to be a Cryptographer?
« on: March 31, 2014, 07:46:40 AM »
Must you be a math geek A+ student to understand cryptography? ..can't a B student crack or design Hash algorithms?...and how can a B student become a cryptographer?...  is there hope?

Hi Clone,
     You ask a great question. I am actually in college to do that very thing. Here are a few really good places to start.

1. Here is an Article by Bruce Schneier. This is from his famous blog "Schneier On Security". I am sure you will find it helpful. He is actually one of the top Cryptographers/Cryptographic Engineers/Mathematicians in the world and has written several top books on Cryptography. ie Applied Cryptography, Practical Cryptography, Cryptography Engineering. He invented the Blowfish and Twofish (AES Top Five Finalist) Ciphers, along with the Skein Hashing Function (Another AES Top Five Finalist).

https://www.schneier.com/crypto-gram-9910.html#SoYouWanttobeaCryptographer


2.This is a link University of Washington Course of Cryptography. U. of Washington is one of the top Crypto schools in the world. Home of famous Professors like Neal Koblitz (Elliptic Curve Cryptography) and Josh Benaloh (Microsoft). It's Free. Just click on the Lectures Section.

http://courses.cs.washington.edu/courses/csep590/06wi/

3. The Handbook of Applied Cryptography. aka. The Cryptography Bible. This is actually the book for the U. of Washington Course. It was written by Alfred Menezes and Scott Vanstone. Both of these guys are from the University of Waterloo's Centre for Applied Cryptographic Research. I went ahead and uploaded it for you.

The Handbook of Applied Cryptography
http://upload.evilzone.org/download.php?id=5303909&type=zip

4. Stanford University's Online Cryptography Course By Dan Boneh
You just need to sign up and it's completely Free. It's awesome.
https://www.coursera.org/course/crypto

I hope this will help you and anyone else interested in Cryptography.

Ark

10
Ahhhh, I see. I thought your response to my post was to ask me if I was able to "count". Like, if I had the ability to count (i.e. 1,2,3,4), then, I would be able to solve my problem...lol. I was like damn what a low blow. I apologize for misunderstanding you. But, I am sure you can see how that could be misinterpreted. I will try to ease off of the trigger a bit. Thanks to everyone for trying to help.

Sincerely,
Ark

11
Well, you can count, can't you?
So you can count the number of equal adjacent elements and set them to 6 if the count is equal or greater than 3 instead of "bruteforcing" them.

First, Clearly you can't. A counting loop CLEARLY will not work because if and when you learn to count you will realize that there the middle cells of the 2 dimensional array have to appear in BOTH binary AND operators.

Code: (c) [Select]
#include <emmintrin.h>

int main(){
    int board[10][10];
    int row, col;
    for(row=0;row<10;row++){
        for(col=0;col<10;col++){
            board[row][col]=rand()%2+1; //filling matrix here
            printf("%d ", board[row][col]);
        }
        printf("\n");
    }
    printf("\n");
    for(row=0;row<10;row++){
        col = 0;
        while(col <= 10 - 4){
            __m128i xmm0 = _mm_loadu_si128((__m128i*)&board[row][col]);
            __m128i xmm1 = _mm_set1_epi32(board[row][col]);
            __m128i xmm2;
            __m128i xmm6 = _mm_set1_epi32(6);
            __m128i xmmn = _mm_set1_epi32(-1);
            unsigned long c;
            int mask;

            xmm0 = _mm_xor_si128(_mm_cmpeq_epi32( xmm0, xmm1 ), xmmn);
            mask = _mm_movemask_epi8(xmm0);
            if (!mask){
                _mm_storeu_si128( (__m128i*)&board[row][col], xmm6 );
                col += 4;
                do{
                    if (col > 10 - 4) col = 10 - 4;
                    xmm0 = _mm_loadu_si128((__m128i*)&board[row][col]);
                    xmm2 = _mm_or_si128( _mm_cmpeq_epi8( xmm0, xmm1 ), _mm_cmpeq_epi8( xmm0, xmm6 ) );
                    xmm0 = _mm_xor_si128(xmm2, xmmn);
                    xmm0 = _mm_or_si128(_mm_slli_si128(xmm0, 4), xmm0);
                    xmm0 = _mm_or_si128(_mm_slli_si128(xmm0, 8), xmm0);
                    xmm2 = _mm_xor_si128(xmm0, xmmn);
                    _mm_maskmoveu_si128( _mm_set1_epi32(6), xmm2 , (char*)&board[row][col] );
                    mask = _mm_movemask_epi8(xmm0);
                    if (col == 10 - 4){
                        col++;
                        break;
                    }
                    c = __builtin_ctz(mask);/* In MSVC: _BitScanForward(mask, &c); */
                    c >>= 2;
                    col += c;
                }while(mask);
            }else{
                col += __builtin_ctz(mask) >> 2;
            }
        }
    }
    for(row=0;row<10;row++){
        for(col=0;col<10;col++){
            printf("%d ", board[row][col]);
        }
        printf("\n");
    }

    return 1;
}
This has to be taken care of with intrinsic's.

Now that that is cleared up.

I simply came on here to ask for advice. I said, right of the bat, that it might have mistakes and I apologized for not knowing more about it. But, that's why I asked for the help in the first place. I surely didn't ask so I could get hit with a smart ass insult. Especially, one that doesn't even help. It doesn't send a great message to the community when someone honestly and humbly comes on here to ask for help and they get nothing more out of it than an argument. Things change, I guess.


12
I have a question for you guys. My Bro is working on this for a project and this problem came up. I want to surprise him with the answer. I figured if anyone could deal with it, you guys could. I had to copy and paste it and I am not much of a programmer so if there are any mistakes, I apologize. Any ideas or insight would be great. Thanks in advance! Ark

"I have generated a 10x10 integer matrix, by way of a 2 dimensional array, the elements are randomly generated and lie on

Code: [Select]
1 <= z <= 5
I am in need of an efficient method of setting all adjacent "duplicates" (repeating elements), along any row or column (not diagonally), of length 3 or greater to the integer six (6). The source for the brute method follows for clarity.

Code: [Select]
for(row=0;row<10;row++)
{
    for(col=0;col<10;col++)
    {
        board[row][col]=rand()%4+1; //filling matrix here
    }
}
print_board(board, row, col);

printf("Switch: ROW COLUMN\n ");
scanf("%hu %hu", &x1, &y1);
printf("With: ROW COLUMN\n");
scanf("%hu %hu", &x2, &y2);
swap(board, x1, y1,x2, y2);  //stdrd for loop no good b/c of
                             //below <-this->below   
if(board[0][0]==board[0][1] && board[0][1]==board[0][2] && board[0][2]==board[0][3])
{
    board[0][0]=6;
    board[0][1]=6; 
    board[0][2]=6;
    board[0][3]=6;   // brute force would require many more to complete
}

I know there must exist a much more elegant approach than listing out all permutations. If you have seen this and recall the technique I would very much appreciate your assistance."



13
Found it on the Webs / Elliptic Curve Cryptography Tutorial
« on: February 03, 2014, 04:12:24 AM »
Hey guys,
     I found this Elliptic Curve Cryptography Tutorial. Pretty cool.

http://www.certicom.com/index.ph

Ark

14
General discussion / Anyone here Wrestle or train Brazilian Jiu-Jitsu?
« on: January 30, 2014, 03:56:14 AM »
Hey guys,
     I was wondering if anyone else here Wrestled (Freestyle,Greco-Roman,Folk) or trained BJJ, Gi and/or No-Gi.

Ark

15
Hacking and Security / Re: Encryption software
« on: January 30, 2014, 02:48:23 AM »
No problem at all. Twofish is pretty cool. When it comes to encryption Bruce Schneier is the man. He wrote Applied Cryptography 1 & 2 along with several other bad ass books. I posted his new one in the ebooks section.

Ark

Pages: [1] 2


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.