Fork this blog on GitHub Fork this blog on GitHub

Brute Forcing One Time Pads - Defcon Mystery Challenge Cryptanalysis Preparation

Brute Forcing One Time Pads - Defcon Mystery Challenge Cryptanalysis Preparation

In preparation for the mystery challenge at Defcon 20 this year, I put together some simple python tools.  I find it quite enjoyable making anti-1057 cryptanalysis tools, so I may be adding more.  This is what I have so far.

Update: This is now on Github

Generate Lookups

Each of these lookups is a dictionary.  The key:value pairs in each dictionary can easily be extended and fed into the crypto functions.

lookup1a = {i : chr(64+i) for i in range(1,27)} #1:A, 2:B, etc
lookupa1 = {chr(64+i):i for i in range(1,27)} #A ...

Continue reading

Preparing for Defcon by Voiding a Warranty (or how to replace an Asus B121 hard drive)

Preparing for Defcon by Voiding a Warranty (or how to replace an Asus B121 hard drive)

So I thought to myself... Self?  How about we replace the hard drive in this handy tablet, install linux, and bring it to Defcon?  I typically prepare for a security conference by wiping a hard drive before and after so I can experiment and enjoy the con.  Instead of wiping and reinstalling, I have always just popped drives in and out.  I love this device because it weighs 2.5 pounds and has a large 12" x 8" screen which makes a perfect travel companion.

How to open the Asus B121

Tools required:  Something thin like a credit card or ...

Continue reading