Home
Search results “Iis crypto tool”
IISCrypto - Fixing Windows Server SSL/TLS Config Issues
 
05:43
Fixing SSL/TLS configuration issues on Windows Servers with ease, using IISCrypto. You can download IIS Crypto here - https://www.nartac.com/Products/IISCrypto/Download For a step by step guide, please visit my post here - https://www.phr33fall.co.uk/iiscrypto/
Views: 3896 Phr33fall
Working with IISCrypto
 
01:41
IISCrypto is a great & useful tool van Nartac Software that helps any server or computer administrator, setting up the correct SSL, TLS, Ciphers, Hashes and keys on servers or other managed Windows operating systems with just a few clicks. Just click away the ciphers and protocols, you don't want to be used by the system, and click "apply". I do not recommend to use the best practice button. Setting the order in the cipher suites is very, very handy. Create a template for your whole environment. This is a tool everyone that works in IT business should be aware of. Do not use the Qualys SSL Labs Url test from this tool. Be default the result will be published, On the original site it can be ticked off. Questions on ciphers or protocols? Just leave a comment below! --------- IISCrypto es una excelente y útil herramienta de Nartac Software que ayuda a cualquier servidor o administrador de computadora, configurando los SSL, TLS, cifrados, Hashes y claves correctos en servidores u otros sistemas operativos de Windows administrados con solo unos pocos clics. Simplemente haga clic en los cifrados y protocolos, no quiere que el sistema lo utilice y haga clic en "aplicar". No recomiendo usar el botón de mejores prácticas. Establecer el orden en las suites de cifrado es muy, muy útil. Crea una plantilla para todo tu entorno. Esta es una herramienta que todos los que trabajan en el negocio de TI deben conocer. No utilice la prueba de URL de Labs SSL de Qualys de esta herramienta. Por defecto, el resultado se publicará. En el sitio original se puede marcar. ¿Preguntas sobre cifrados o protocolos? ¡Solo deja un comentario abajo! --------- IISCrypto est un outil formidable et utile pour Nartac Software, qui aide tout administrateur de serveur ou d’ordinateur, à configurer en quelques clics les protocoles SSL, TLS, Ciphers, Hash et clés appropriés. Il suffit de cliquer sur les chiffrements et les protocoles, vous ne voulez pas être utilisé par le système, et cliquez sur "Appliquer". Je ne recommande pas d'utiliser le bouton des meilleures pratiques. Définir l’ordre dans les suites de chiffrement est très pratique. Créez un modèle pour tout votre environnement. C’est un outil que tout le monde qui travaille dans le secteur informatique devrait connaître. N'utilisez pas le test Qualys SSL Labs Url à partir de cet outil. Par défaut, le résultat sera publié. Sur le site d'origine, il peut être coché. Des questions sur les chiffrements ou les protocoles? Laissez juste un commentaire ci-dessous! --------- IISCryptoは、数回のクリックでサーバや他の管理されたWindowsオペレーティングシステム上の正しいSSL、TLS、暗号、ハッシュ、キーを設定して、あらゆるサーバやコンピュータの管理者を助ける優れたツールバンNartacソフトウェアです。 暗号とプロトコルをクリックするだけで、システムで使用したくない場合は、「適用」をクリックします。 ベストプラクティスボタンを使用することはお勧めしません。 暗号スイートの順序を設定することは非常に便利です。 環境全体のテンプレートを作成します。 これは、ITビジネスで働くすべての人が知っておくべきツールです。 このツールのQualys SSL Labs Urlテストは使用しないでください。 デフォルトのままにすると、結果が公開されます。元のサイトでは、オフにすることができます。 暗号やプロトコルに関する質問? 下にコメントを残してください! --------- IISCrypto是一款非常实用的工具van Nartac Software,可帮助任何服务器或计算机管理员,只需点击几下即可在服务器或其他托管Windows操作系统上设置正确的SSL,TLS,密码,哈希和密钥。 只需单击密码和协议,您不希望系统使用它,然后单击“应用”。 我不建议使用最佳练习按钮。 在密码套件中设置顺序非常非常方便。 为整个环境创建模板。 这是一个在IT业务中工作的人应该注意的工具。 请勿使用此工具中的Qualys SSL Labs Url测试。 默认情况下,结果将被发布,在原始网站上可以勾选。 关于密码或协议的问题? 请在下面发表评论! --------- IISCrypto एक महान और उपयोगी टूल वैन नार्टैक सॉफ़्टवेयर है जो किसी भी सर्वर या कंप्यूटर व्यवस्थापक की सहायता करता है, सर्वर पर या अन्य प्रबंधित विंडोज ऑपरेटिंग सिस्टम पर कुछ एसएसएल, टीएलएस, सिफर, हैश और चाबियाँ सेट करता है। बस सिफर और प्रोटोकॉल पर क्लिक करें, आप सिस्टम द्वारा उपयोग नहीं करना चाहते हैं, और "लागू करें" पर क्लिक करें। मैं सबसे अच्छा अभ्यास बटन का उपयोग करने की सिफारिश नहीं करता हूं। सिफर सुइट्स में ऑर्डर सेट करना बहुत आसान है। अपने पूरे पर्यावरण के लिए एक टेम्पलेट बनाएँ। यह एक उपकरण है जो आईटी व्यवसाय में काम करता है हर किसी के बारे में पता होना चाहिए। इस टूल से क्वालिज़ एसएसएल लैब्स यूआरएल परीक्षण का उपयोग न करें। डिफ़ॉल्ट बनें परिणाम प्रकाशित हो जाएगा, मूल साइट पर इसे टाटा जा सकता है। सिफर या प्रोटोकॉल पर सवाल? बस नीचे एक टिप्पणी छोड़ दो! -------- O IISCrypto é uma ótima e útil ferramenta do software Nartac que ajuda qualquer administrador de servidor ou de computador, configurando o SSL, TLS, Ciphers, Hashes e chaves corretos em servidores ou outros sistemas operacionais Windows gerenciados com apenas alguns cliques. Basta clicar as cifras e protocolos, você não quer ser usado pelo sistema e clique em "aplicar". Eu não recomendo usar o botão de melhores práticas. Definir a ordem nos conjuntos de criptografia é muito, muito útil. Crie um modelo para todo o seu ambiente. Esta é uma ferramenta que todos que trabalham em negócios de TI devem estar cientes. Não use o teste Qualel SSL Labs Url dessa ferramenta. Por padrão, o resultado será publicado. No site original, ele pode ser marcado. Perguntas sobre cifras ou protocolos? Basta deixar um comentário abaixo! ---------
Views: 134 Ben Oostdam
IIS 7 7.5 8 Hardening SSL TLS - Windows Server 2008 R2 2012 R2 DISABLE SSL V2/3 POODLE BEAST
 
05:53
One of the first steps you should do when deploying a new public facing web server is hardening your server's SSL/TLS connections. Disabling vulnerable protocols, ciphers, hashes and key exchange algorithms can help mitigate the now more common exploits like the BEAST attack and now POODLE. By default many weaker technologies are enabled, leaving IIS traffic vulnerable and exposed. In this video I show how to harden IIS via the registry or IISCrypto. For more info and links, check out my blog post: http://robwillis.info/2013/09/iis-77-5-hardening-ssl-tls-windows-server-2008-r2/ Thanks to http://teknoaxe.com for the music!
Views: 16478 Rob Willis
Secure Apache Web Server - Use SSLScan and Disable Ciphers (SSLv3, TLSv1 ..etc)
 
04:57
How to Disable Vulnerable Ciphers after Finding Them using SSLScan This part of the series will be an SSLScan tutorial while giving examples to it. In this tutorial i will go through SSLScan and how to use it to find available ciphers. I will then update the openssl and disable vulnerable ciphers and force to use newer ones. sslscan will scan all the different ciphers being used in the target host, there are different versions and types of SSLs and this is where SSLscan comes to help you determine everything about them. Older Ciphers are vulnerable to attacks and that's why it's a good practice to disable them and force to use only newer ones. Other Apache Hardening Tutorials: 1- Secure Apache Web Server - Use SSLScan and Disable Ciphers: https://goo.gl/mb7pYz 2- Apache Secure Tutorial: Hide HTTP Header and Disable Directory Listing: https://goo.gl/VqcLrG 3- Apache Hardening Tutorial: Disable HTTP Trace / Cross Site Method https://goo.gl/KJnbDS Install SSLScan utility on linux yum install sslscan Or manually You must have git , glibc and openssl-devel installed, if you don't have them run 'yum install git gcc openssl-devel' Download the tar file from here to your linux box Decompress the file using 'tar xfvz file-name-tar.gz' Change folder to the one you decompressed the files and run 'make static' Run 'make install' Confirm by running 'sslscan version' Use SSLScan for scanning available ciphers. Replace "whatever" with the domain or use an IP and specify the port which is 443 by default. sslscan www.whatever.com:443 Or sslscan ip.ip.ip.ip:443 Disable older ciphers vi /etc/httpd/conf.d/ssl.conf SSLProtocol all -SSLv2 -SSLv3 Save Restart the service service httpd restart systemctl restart httpd Update your Openssl and force newer ciphers Note: to enable newer ciphers you have to be sure that your openssl is updated and supports them or else you will get similar error to "SSLProtocol: Illegal protocol 'TLSv1.1'" This is part of the Apache Web Server Hardening and Secure Tutorial Series. This tutorial apply to all ciphers like disablng sslv3 , sslv2 and forcing all tlsv1 , tlsv1.1 and tlsv1.2
Views: 4840 dotsway
Disable Weak Ciphers (RC4 & TripleDES) Windows Server 2012
 
06:12
This video is following on from the previous one (Disabling SSLv3 and TLS v1.0), which can be found here - https://www.youtube.com/watch?v=Yuvq3TtrKPI&t=2s The video covers removing support for RC4 and TripleDES ciphers, as well as removing support for the weaker exchange algorithm 'Diffie-Hellman'.
Views: 4840 Phr33fall
Ошибка HTTP 404.3  - Not Found - IIS WCF - FIX Сопоставления обработчиков - включаем сервисы *.svc
 
01:50
https://vk.com/imacros_javascript =========================== .NET FRAMEWORK 4.7.1. https://www.microsoft.com/ru-RU/download/details.aspx?id=56116 =========================== TXT SOLUTION : https://stackoverflow.com/questions/43502011/wcf-service-on-iis-7-erreur-http-404-3-not-found =========================== WIN+R (для запуска Выполнить) inetmgr (ввести в выполнить) *Add Managed Handler (добавить управляемый обработчик): 1) *.svc 2) System.ServiceModel.Activation.ServiceHttpHandlerFactory, System.ServiceModel.Activation, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35 3) svc-Integrated-4.0 OK. * Add Script Map (добавить сопоставляющие сценарии): 1) *.svc 2) %SystemRoot%\Microsoft.NET\Framework\v2.0.50727\aspnet_isapi.dll 3) svc-ISAPI-2.0 OK - OK. =========================== =========================== =========================== =========================== =========================== =========================== =========================== =========================== Ошибка HTTP 404.3 — Not Found Запрашиваемая страница не может быть отображена из-за конфигурации расширения. Если страница является сценарием, добавьте обработчик. Если необходимо загрузить файл, добавьте карту MIME. Наиболее вероятные причины: Возможно, отсутствует сопоставление обработчиков. По умолчанию все содержимое обрабатывается обработчиком статических файлов. Возможно, компонент к которому происходит обращение не установлен. Соответствующая карта MIME не активируется для веб-сайта или приложения. Предупреждение: Не следует создавать карты MIME для содержимого, которое пользователи не должны загружать - скажем, для страниц .ASPX или для файлов .config. Если ASP.NET не установлена. Возможные решения: В разделе system.webServer/handlers выполните следующие действия: Убедитесь, что ожидаемый для текущей страницы обработчик сопоставлен. Уделите пристальное внимание предварительным условиям (таким как runtimeVersion, pipelineMode, bitness) и сопоставьте их настройкам пула приложений. Внимательно следите за тем, чтобы в строки с ожидаемыми обработчиками не вкрались орфографические ошибки. Убедитесь, что компонент, к которому происходит обращение, установлен. Убедитесь, что карта MIME активирована или добавьте карту MIME на веб-сайт, при помощи appcmd.exe Используйте следующую команду, чтобы установить тип MIME: %SystemRoot%\windows\system32\inetsrv\appcmd set config /section:staticContent /+[fileExtension='string',mimeType='string'] Переменная строка fileExtension - это расширение файла, а переменная строка mimeType - это описание типа файла. Например, чтобы добавить сопоставление MIME для файла с расширением ".xyz", введите appcmd set config /section:staticContent /+[fileExtension='.xyz',mimeType='text/plain'] Предупреждение. Убедитесь, что данное сопоставление MIME необходимо вашему веб-серверу, перед тем как добавлять его в список. Файлы конфигурации, такие как .CONFIG, и страницы динамических сценариев, такие как .ASP или .ASPX, не следует загружать напрямую; их всегда нужно обрабатывать с помощью обработчиков. Другие файлы, например файлы баз данных или файлы, используемые для хранения данных конфигурации, такие как .XML или .MDF, иногда используются для хранения сведений о конфигурации. Определите, могут ли клиенты загружать эти файлы перед их активацией. Установите ASP.NET. Создайте правило трассировки, чтобы отслеживать невыполненные запросы для этого кода состояния HTTP. Чтобы получить дополнительные сведения о создании правила трассировки для невыполненных запросов, щелкните здесь. Подробные сведения об ошибке: Модуль nbsp; StaticFileModule Уведомление ExecuteRequestHandler Обработчик StaticFile Код ошибки 0x80070032 Запрошенный URL-адрес https://ssd.marinet.ru:443/ssd/LiteService.svc Физический путь C:\Program Files\Crypto Pro\DSS\LiteSignatureService\LiteService.svc Метод входа Анонимная Пользователь, выполнивший вход Анонимная Дополнительные сведения: Эта ошибка возникает, когда файловое расширение для запрашиваемого URL-адреса предназначено для типа MIME, не предусмотренного на данном сервере. Существует возможность добавлять тип MIME для расширений файлов, которые не являются страницами динамических сценариев, файлами баз данных или файлами конфигурации. Обрабатывайте указанные типы файлов с помощью обработчиков. ========== 404 3 Not Found, 404, 404.3, not found, ошибка 404, ошибка ютуб, http 404, http error 404.3 - not found, http error 404.3 not found wcf, http 404.3 not found wcf, 404.3 - not found iis 8.5, 404.3 not found iis7, 404.3 - not found, 404.3 not found svc, 404.3 not found iis, 404.3 not found error, 404.3 - not found wcf, ошибка http 404.3 - not found, error 404.3 not found iis7, 404.3 not found, http error 404.3 not found, http 404.3 not found, http error 404.3 not found 1c web, http error 404.3 not found 0x80070032, http error 404.3 not found iis #ошибка #ютуб #3 #85 #404 #4043 #not #found #http #error #wcf #iis #iis7 #svc #0x80070032
Views: 854 Kostia Bazrov-WORK
MCITP 70-640: Default Local Groups
 
15:45
Default local groups exist locally on a Windows computer and available only on that computer. This video looks at the local groups that are created by default on every Windows 7 and Windows Server 2008 operating system. Demonstration 10:17 Administrators 1:30 Users 2:10 Power Users 3:26 Guests 4:43 Backup Operators 5:32 Remote Desktop Users 5:53 Offer Remote Assistance Helpers 6:24 Network Configuration Operators 7:05 Performance Monitor Users 7:28 Performance Log Users 7:56 IIS_IUSRS 8:08 Replicator 8:45 Distributed COM Users 9:17 Cartographic Operators 09:39 Administrators Any user added to this group has full control over that computer. By default, the administrator will have access to everything, for example all files and folders. If an administrator has been denied access they can take ownership of the object in question and give themselves permissions to the object. Users This group is designed for the general user. It allows them to run software and change settings that relate to them. Power Users The power users group was introduced in Windows XP to give the user more access than the user group but less than an administrator. In Windows Vista this group was removed and in Windows 7 it was added again. In Windows 7, the Power Users group does not provide any access other than user access and is included only for legacy reasons. If you want to give this group the same permissions as Windows XP, you can apply a security template as explained below. This security template should only be applied as a last resort. The process is not reversible and may not function as expected with newer software. To apply the security template to the Power Users Group 1. Open mmc and add the snap-in Configuration and Security Analysis 2. Right click Security Configuration and Analysis and select open database 3. Enter a new database name or open an existing database 4. When prompted open c:\windows\inf\puwk.inf. If not prompted, right click Security Configuration and Analysis and select open template 5. Right click Security Configuration and Analysis and select configure computer now Guests The guest group gives the user the ability to login and run software. Any changes that are made by that user, for example changing the wallpaper, will be lost when the user logs off. The guest account is usually used for computers that are set up as kiosks. In this case, you want the user to have access to run software and make changes if they need to, but when the next user uses the computer, you want to ensure that the new user gets the default settings and not the modified settings. Description to long for YouTube Please see http://itfreetraining.com/70-640/default-local-groups for the rest of the description. References "Default local groups" http://technet.microsoft.com/en-us/library/cc771990.aspx "Understanding Built-In User and Group Accounts in IIS 7" http://learn.iis.net/page.aspx/140/understanding-built-in-user-and-group-accounts-in-iis/ "Crypto Operators security group" http://support.microsoft.com/kb/949299 "Offering Remote Assistance" http://technet.microsoft.com/en-us/library/cc505914.aspx "List of features removed in Windows 7" http://en.wikipedia.org/wiki/List_of_features_removed_in_Windows_7
Views: 34733 itfreetraining
SSLEYE Fake SSL Certificate Detection Tool E-11
 
14:00
SSL Eye is a unique tool that is designed in a way it can detect SSL man in the middle spying, by comparing SSL fingerprints of single or multiple sites across many remote nodes that are owned and managed by EEDS located in different countries such as Singapore, USA, UK, Germany and Netherlands. This is done by comparing the other nodes finger prints results with yours that comes through your local ISP. Additionally the tool will tell you if the site is using Extended Validation (EV) certificates or perfect forward secrecy through the key exchange mechanism such as DHE_RSA or ECDHE_RSA which is currently being used by Google Inc. We have also implemented global short-cut keys on the application that allows you to copy a site from the browser address bar and call it for instant scan to check if you are a victim of Man in The Middle Attack (MITM). Where normally attackers listen to your communication channel in a public key exchange re-sends the keys on your behalf, substituting his own fake keys for the requested one, so that the two original parties (you and your bank) will still appear to be communicating with each other. ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬● Follow me: Twitter - https://twitter.com/warith2020 Facebook - https://www.facebook.com/warith.almaawali Instagram - https://www.instagram.com/warith77/ Google Plus - https://plus.google.com/+WarithAlMaawali Linkedin - https://www.linkedin.com/in/warith1977 ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬● Links: ! ◆ SSLEYE https://www.digi77.com/ssl-eye-prism-protection/ ! ◆ My websites: https://digi77.com https://om77.net ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬● Credits: ! ◆ Cartoon Character and Youtube art: pixabay https://pixabay.com/ ! ◆ Music by: Alex Lisi Horror-Suspense Music [Royalty Free] Haunted Places - Alex Lisi https://www.youtube.com/watch?v=CwdFIt4TTEI http://alexlisi.xyz/RoyaltyFree ! ◆ Intro Video by: Videezy https://www.Videezy.com Videvo videvo.net/ ●▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬● I am not a financial adviser and this is not financial advice.
Disable SSLv3 & TLS1.0 Windows Server 2012 R2
 
04:40
A video about disabling SSL v3.0 and TLS v1.0 on Windows Server 2012 R2 in Registry Editor. I've created a step by step guide on disabling SSLv3 and TLS v1.0 here - https://www.phr33fall.co.uk/ssl-tls-issues-server-2012/ If you're looking to remove support for RC4, TripleDES and Diffie-Hellman, you can find that here - https://youtu.be/8eoU0gVvzpE Or the step by step guide to disable weaker ciphers is here - https://www.phr33fall.co.uk/weakciphers/
Views: 11751 Phr33fall
How to Create a Java Key Store and Generate a CSR
 
07:22
Learn how to create a Java Key Store and generate a certificate signing request in Java from the GlobalSign Support Team. Get your Code Signing Certificate from GlobalSign: https://goo.gl/zZFJRK ********************************************************************* GlobalSign is a WebTrust-certified certificate authority (CA) and provider of Identity Services. Founded in Belgium in 1996, the company offers a diverse range of Identity service solutions. GlobalSign provides PKI and Identity and Access Management services to provide enterprises with a platform to manage internal and external identities for the Internet of Everything. The services allow organizations to deploy secure e-services, manage employee and extended enterprise identities and automate PKI deployments for users, mobile, and machines. #SSL #PKI #IoT ********************************************************************* ✔ We've been a Certificate Authority for over 20 years! 🌎 Visit the link to find out more about GlobalSign: ➪ https://www.globalsign.com/ 🔒 Click below to explore our SSL options: ➪ https://www.globalsign.com/en/ssl/ ☁ Scalable options made available for business and enterprise levels, visit the link below to find out more details: ➪ https://www.globalsign.com/en/enterprise/ ********************************************************************* 👉 Follow our Social Networks and stay connected: ● Facebook - https://www.facebook.com/GlobalSignSSL/ ● Twitter - https://www.twitter.com/globalsign ● Google Plus - https://www.google.com/+globalsign ● LinkedIn - https://www.linkedin.com/company/928855/ *********************************************************************
Views: 7913 GlobalSign
Attack SSL/TLS(weak cipher :RSA512- Factor Modulus)
 
04:52
Must watch until the end of this video :3
Views: 5608 Aiden Pearce
SSL - TLS Attack called Bar Mitzfah
 
01:59
The Bar mitzvah attack is an attack on the SSL/TLS protocols that exploits the use of the RC4 cipher with weak keys for that cipher. https://www.strikehawk.com/secure-web-hosting/ While this affects only the first hundred bytes of only the very small fraction of connections that happen to use weak keys, it allows significant compromise of user security, for example by allowing the interception of password information. The attack uses a vulnerability in RC4 described as the invariance weakness by Fluhrer et. al. in their 2001 paper on RC4 weaknesses.
Microsoft FTP Server Migration
 
13:26
This video demonstrates how to migrate a Microsoft Windows® 2008 R2 FTP member server onto another 2012 R2 member server in the same domain. It shows how to migrate the FTP site's folder and also local groups and user accounts including passwords.
Views: 1605 SysManage
3- crypto config
 
18:53
In this video I will show you how you can create crypto-config.yaml file and how to use cryptogen tool to generate all certificates that are need for Hyperledger Fabric
Views: 13221 Иван Ванков
SSLScan
 
01:40
Example of using the SSLScan tool to determine which ciphers are supported by a certain website.
Views: 191 Aiko Pras
Quality DMD Diamond Whetstone Sharpening & Honing Tools
 
05:21
See these 3 different types of diamond whetstone tools made by DMD Great for sharpening a variety of different tools. SEE LINKS BELOW:- DMD 400/1000 Grit Double Side Diamond Ceramic Knife Sharpening Stone -- http://bit.ly/2HAB67C 600/1200 Grit Double Side Diamond Sharpening Stone -- http://bit.ly/2HEQkIT 3pcs 240/600/1000 Grit Knife Sharpening Stones -- http://bit.ly/2UFqbNs
Views: 1711 Steve Jordan
Howto Disable SSLv2 & Weak Ciphers on IIS
 
01:38
Learn how to disable SSLv2 (version 2) protocol and weak ciphers on IIS servers for PCI compliance using a product from foundeo.com This videos screencast uses IIS 7 on Windows 2008 but the same technique will work for IIS6 on Windows 2003 and IIS 7.5
Views: 4922 Pete Freitag
Disabling SSH Server CBC Mode Ciphers and SSH Weak MAC Algorithms on Ubuntu 14.04
 
02:13
Disabling SSH Server CBC Mode Ciphers and SSH Weak MAC Algorithms on Ubuntu 14.04
Views: 2918 Blue Team Security
How EFS, SSL and IPSEC Encrypt
 
14:50
Encryption is an important tool for security communications. In this video, Doug explores the methods used in EFS, IPSEC and SSL. Digital communications can be vulnerable to eavesdropping and interception. There are a variety of security methods that enhance confidentiality. Technologies such as the Encrypting File System (EFS), IP Security (IPSEC), and Secure Sockets Layer (SSL) use a combination of methods to help ensure your digital information is safe. Senior Technical Instructor Doug Bassett peels back the mystery and shows how a combination of symmetrical and asymmetrical encryption puts your information in a lock box. He also illustrates, using EFS, how you can share this data with multiple people and still keep it secure. If you want to learn more about protecting vital data and how to ensure proper configuration, optimization and security, we invite you to attend our Active Directory, Network Infrastructure and Applications Server classes. If you have any questions, feel free to email Doug at [email protected] We look forward to seeing you soon. www.stormwindlive.com
Views: 9830 StormWind Studios
OpenSSL install and cert creation
 
03:49
This video walks you thru the installation of OpenSSL and the creation of a Private and Public certs
Views: 99186 gsayer1234
Hacking IIS's AppHost
 
12:17
Week 18 of a 52 web pro series on what every web administrators needs to know to be successful in this space. This week covers advanced IIS management by editing of applicationHost.config.
Views: 2004 Scott Forsyth
Crear Habbo Holo, New Crypto, IIS, Swf propias, Actualizado 2013. [PARTE 2/4]
 
12:28
Hola, gracias a todos por ver este vídeo, por favor tanto si os ha funcionado como si teneis algun error comentarlo o podeis contactarme mejor a partir de las redes sociales: Facebook : http://facebook.com/adritrex Twitter : http://twitter.com/adrialcapez Skype : adriheavy21 Links de descarga del pack ( son tres partes ): Parte 1: http://www.mediafire.com/?k7cz6dkhkhg6on9 Parte 2: http://www.mediafire.com/?93esa38dr8gr3ch Parte 3: http://www.mediafire.com/?1kim1ad4901913w "Descomprimir todas juntas y os saldrá solo una carpeta" ALTERNATIVA POR SI NO FUNCIONA MEDIAFIRE: Parte1: http://rapidshare.com/files/292088569/Crear%20holo%20Adritrex%202013.part1.rar Parte2: http://rapidshare.com/files/1090264239/Crear%20holo%20Adritrex%202013.part2.rar Parte3 :http://rapidshare.com/files/4183345669/Crear%20holo%20Adritrex%202013.part3.rar Gracias y unete a la web de facebook ;) suelo responder por allí. Primera parte: http://www.youtube.com/watch?v=pl8XeOd69FE
Views: 4032 adritrex
Teleconsole – A Tool To Share Your Terminal Session Instantly To Anyone In Seconds
 
06:02
Teleconsole – A Tool To Share Your Terminal Session Instantly To Anyone In Seconds
Views: 105 Ehtesham Haidar
Сборка OpenSSL-1.1.1 под Visual Studio 2012
 
09:46
Сборка динамических библиотек perl Configure VC-WIN32 no-asm --prefix=C:/Libs/openssl-1.1.1/builds/openssl-vc11-x86-release-shared nmake nmake test nmake install Сборка статических библиотек perl Configure VC-WIN32 no-asm -static --prefix=C:/Libs/openssl-1.1.1/builds/openssl-vc11-x86-release-static nmake nmake test nmake install
Views: 664 Sergey Zhukov
Domain Name Owners SSL Certificate Problem DEFCON 26
 
21:18
Lost and Found Certificates: dealing with residual certificates for pre-owned domains By Ian Foster, Hacker & Dylan Ayrey, Hacker Summary of Presentation: When purchasing a new domain name you would expect that you are the only one who can obtain a valid SSL certificate for it, however that is not always the case. When the domain had a prior owner(s), even several years prior, they may still possess a valid SSL certificate for it and there is very little you can do about it. Using Certificate Transparency, we examined millions of domains and certificates and found thousands of examples where the previous owner for a domain still possessed a valid SSL certificate for the domain long after it changed ownership. We will review the results from our ongoing large scale quantitative analysis over past and current domains and certificates. We'll explore the massive scale of the problem, what we can do about it, how you can protect yourself, and a proposed process change to make this less of a problem going forwards. We end by introducing BygoneSSL, a new tool and dashboard that shows an up to date view of affected domains and certificates using publicly available DNS data and Certificate Transparency logs. BygoneSSL will demonstrate how widespread the issue is, let domain owners determine if they could be affected, and can be used to track the number of affected domains over time. Speaker Background: Ian Foster Ian enjoys researching systems and networking problems and solutions in an effort to make the world more secure. He has published research papers analyzing the new gTLD land rush and crawling and parsing most WHOIS records. From demonstrating how insecure aftermarket OBD "dongles" can be used to compromise and take over automobiles; to measuring the paths an email traverses online with encryption in an effort to increase integrity, authenticity, and confidentiality; and more. During the day Ian is a Security Engineer fighting for the users. Dylan Ayrey Dylan is a security engineer, who in his free time authors lots of open source projects, such as truffleHog. He graduated college in 2015 and has been working in security ever since. Link to PowerPoint: https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Foster-and-Ayrey-Lost-and-Found-Certs-residual-certs-for-pre-owned-domains.pdf Link to Description: https://www.defcon.org/html/defcon-26/dc-26-speakers.html#Foster Follow my Instagram at: https://www.instagram.com/cameron_saman/?hl=en & Check out my app development company I started at: http://Introdite.com Check out my phone repair company I started to get any repairs done go to: http://ocphonewiz.com Like & Subscribe if you enjoyed this video or learned something & comment below if you want more videos like these.
Views: 471 Cameron Saman
Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21
 
12:17
We have a look at stack level 0 from exploit-exercises.com/Protostar and compile it on a current Ubuntu, to see if it's still exploitable. stack0: https://liveoverflow.com/binary_hacking/protostar/stack0.html digitalocean referral:* https://m.do.co/c/826f195e2288 -=[ 🔴 Stuff I use ]=- → Microphone:* https://amzn.to/2LW6ldx → Graphics tablet:* https://amzn.to/2C8djYj → Camera#1 for streaming:* https://amzn.to/2SJ66VM → Lens for streaming:* https://amzn.to/2CdG31I → Connect Camera#1 to PC:* https://amzn.to/2VDRhWj → Camera#2 for electronics:* https://amzn.to/2LWxehv → Lens for macro shots:* https://amzn.to/2C5tXrw → Keyboard:* https://amzn.to/2LZgCFD → Headphones:* https://amzn.to/2M2KhxW -=[ ❤️ Support ]=- → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ 🐕 Social ]=- → Twitter: https://twitter.com/LiveOverflow/ → Website: https://liveoverflow.com/ → Subreddit: https://www.reddit.com/r/LiveOverflow/ → Facebook: https://www.facebook.com/LiveOverflow/ -=[ 📄 P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #BinaryExploitation #BufferOverflow
Views: 35968 LiveOverflow
John the Ripper: How to Recover Your PGP Private Key Password
 
03:22
Please check out my Udemy courses! Coupon code applied to the following links.... https://www.udemy.com/hands-on-penetration-testing-labs-20/?couponCode=NINE99 https://www.udemy.com/kali-linux-web-app-pentesting-labs/?couponCode=NINE99 https://www.udemy.com/kali-linux-hands-on-penetration-testing-labs/?couponCode=NINE99 https://www.udemy.com/network-security-analysis-using-wireshark-snort-and-so/?couponCode=NINE99 https://www.udemy.com/snort-intrusion-detection-rule-writing-and-pcap-analysis/?couponCode=NINE99 Description: This video will show you how to use dictionary and brute force password cracking methodology to recover PGP private key passwords. The tool which is used for this purpose is John the Ripper Bleeding Jumbo version on Kali Linux. The following URLs is where you can acquire JTR and the crackstation wordlist: https://github.com/magnumripper/JohnTheRipper https://crackstation.net/buy-crackstation-wordlist-password-cracking-dictionary.htm
Views: 9740 Jesse Kurrus
BEAST Attack : To decrypt a complete header and the secret cookie from HTTPS
 
04:57
Cette démonstration de l'attaque BEAST montre qu'il est possible de décrypter le cookie d'une requête HTTPS à cause du mode CBC de SSLv3.0/TLS1.0. Dans cet vidéo, on décrypte le header complètement pour récupérer le cookie. On optimise le décryptage en utilisant le fait que l'on connaisse certaines parties du header (ex: User-Agent). Étapes de l'attaque: 1- L'attaquant est en MITM. Il met à disposition un site web contenant un applet java malveillant. 2- La cible visite un site web mise à disposition sur mon réseau local via un canal SSL/TLS. La cible récupère un cookie de session. Le cookie n'est pas passé en clair sur le réseau mais dans le canal sécurisé...La cible a récupéré un cookie de session et ce dernier est stocké dans son navigateur. L'attaquant veut ce cookie. 4- La cible visite le site malveillant de l'attaquant et charge l'applet java. 5- L'attaquant décrypte le header et récupère le cookie de session de la Cible.
Views: 8456 BEASTquentinHARDY
The Cryptographic Service in Windows 7
 
05:35
Provides four management services: Catalog Database Service, which confirms the signatures of Windows files and allows new programs to be installed; Protected Root Service, which adds and removes Trusted Root Certification Authority certificates from the computer; Automatic Root Certificate Update Service, which retrieves root certificates from Windows Update and enable scenarios such as SSL; and Key Service, which helps enroll the computer for certificates. If this service is stopped, these management services will not function properly. If this service is disabled, any services that explicitly depend on it will fail to start.
Views: 46963 Marc Liron
SSL/TLS deployment best practices
 
03:44
Ivan Ristic, Director of Engineering at Qualys, talks about SSL Labs and their efforts to understand how SSL was used and to remedy the lack of easy-to-use SSL tools and documentation. For information security news visit Help Net Security: http://www.net-security.org
Views: 2538 helpnetsecurity
Untangle 101: NG Firewall for State & Local Governments
 
50:10
Government agencies have been hit by numerous breaches, ransomware, insider threats, and many other kinds of attacks. Make sure you have a solution in place to monitor all devices on the network and control access to sensitive information. Join us for the Untangle 101 Webinar: NG Firewall for State & Local Governments to learn how Untangle’s all-in-one solution provides network administrators a cost-effective way to build a safe and secure environment with granular visibility and control over the network. You’ll learn how to: -Leverage NG Firewall to help meet FISMA, NERC, NIST, FIPS and other state and county compliance rules - Create granular policies for specific organizational, departmental and user access - Prioritize network traffic for mission-critical applications - Gain visibility into everything happening in the network at Layer 7 - Identify which NG Firewall apps would benefit you the most - Answer any questions
Views: 186 Untangle, Inc.
Block Specific File Types with FSRM in Windows Server 2019
 
06:20
Block Specific File Types with FSRM in Windows Server 2019 1. Prepare - DC31 : Domain Controller(Yi.vn) | DC32 : File Server | WIN101 : Client - 2 videos named Video01.avi and Video02.avi 2. Step by step : Block Video files with FSRM - DC32 : Create and share a folder named DATA - WIN101 : Upload a video file named Video01.avi to DATA folder === OK - DC32 : Prevent upload video file + Server Manager - Manage - Add Roles and Features - Next to Server Roles : Extend "File and Storage Services" - Extend "File and iSCSI Services" - Select "File Server Resource Manager" - Next to Install + Tools - File Server Resource Manager - Right-click "File Screens" - Create File Screen... - File screen path : Browse... to DATA folder - Choose "Derive properties from this file screen template (recommended)" : Block Audio and Video Files - Create - WIN101 : Upload a video file named Video02.avi to DATA folder === Access Denied === OK -------------------------******************** Youtube.com/c/MicrosoftLab ********************-----------------------
Views: 102 microsoft lab
BITCOIN : BITCOIN CASH : BITCOIN GOLD Update CryptoCurrency Technical Analysis Chart
 
07:53
BITCOIN : BITCOIN CASH : BITCOIN GOLD Update CryptoCurrency Technical Analysis Chart Chapters BITCOIN - 0:11 BITCOIN CASH - 3:52 BITCOIN GOLD - 5:40 Get caught up on our free YouTube ‘trading training’ videos 'Technical Tools Series' for Cryptos - http://bit.ly/2EGdp9P 'Price Action Series' for Cryptos - http://bit.ly/2FiSM4C How To Series - http://bit.ly/2Cb15AJ Would you like to try the software Mike does in our videos? - Coinigy: https://www.coinigy.com/?r=dd513953 Support Path Trading Partners - Patreon: https://www.patreon.com/pathtradingpartners All our Path Trading Partners links - Store: http://path-trading-partners.teachable.com - Homepage: http://www.pathtradingpartners.com - Twitter: https://twitter.com/path_trading - The Money Path Podcast: https://apple.co/2oiu2lN - Mike Arnold (Twitter) @mgarnold - Bob Iaccino (Twitter) @Bob_Iaccino Disclaimer: This presentation is for information purposes only and does not constitute investment advice nor an offer, solicitation or recommendation to acquire or dispose of any investment or to engage in any other transaction. This presentation is not intended for solicitation purposes but only for use as general information. All descriptions, examples and calculations contained in this publication are for illustrative purposes only. The risk of loss in trading can be substantial. You should therefore carefully consider whether such trading is suitable for you in light of your financial condition. Past performance is not indicative of future results. path trading partners, bob iaccino, Mike Arnold, technical analysis price action, trading, stocks, charts, education, technicals, candlestick, forex, futures, vix, dow, dji, gold, silver, nasdaq, nadex, sp500, metals, investing, day trading, markets, crude oil, news, market news, futures, assets, day tracking, copper, cryptocurrencies. altcoins, alts, blockchain
Checking SSL POODLE vulnerability with NMAP
 
02:57
here is a quick tutorial for Checking SSL POODLE vulnerability for Bug Bounty hunting about POODLE---https://en.wikipedia.org/wiki/POODLE Nmap command : nmap -sV --version-light --script ssl-poodle -p 443 host screen recorder-- https://techsmith.pxf.io/LDA6L Microphone -https://amzn.to/2LcRCuj learn hacking and make money https://academy.silesiasecuritylab.com/?affcode=260095_jmiejmqw nmap tutorial, nmap scan, nmap basics, nmap hak5, nmap 101, nmap tutorial windows, nmap defcon, nmap for windows, nmap hacking, nmap scan network, nmap kali linux, nmap explained, nmap advanced, nmap attack, nmap android, nmap and metasploit, nmap advanced scan, nmap advanced tutorial, nmap api bug bounty hunter bug bounty tutorial bug bounty program list bug bounty facebook bug bounty programs 2017 bug bounty forum bug bounty training bug bounty websites bug bounty android hacking bug bounty amazon becoming a bug bounty hunter what is a bug bounty what is a bug bounty program bug bounty blogs bug bounty books bug bounty beginner
Views: 1181 Raghavendra Singh
Exploiting the ASP.NET vulnerability in 565 request
 
03:46
Using the magic "T-Block" we optimize our CANVAS module to exploit the ASP.Net bad crypto implementation vulnerability in 565 requests.
Views: 10701 ImmunityInc
Ebot  Установка и настройка комплекса  Часть 1  Немного теории и подготовка сервера
 
20:50
http://ubuntu.ru/get - ссылка на дистрибутив Ubuntu Server http://cs.nngl.ru - ссылка на матч-центр NNGL https://vk.com/nnovgameleague - группа вк http://forum.esport-tools.net/ - форум разработчика
Views: 1959 nngl
BSidesCHS 2018: "Taking the Red Pill: Make Malware Analysis Great Again #MMAGA" by Crane Hassold
 
40:44
Security BSides 2018 College of Charleston, SC November 10, 2018 @BSidesCHS Title: "Taking the Red Pill: Make Malware Analysis Great Again #MMAGA" Speaker: Crane Hassold (@CraneHassold)
Views: 181 BSidesCHS
Wallet Demo - Liquidity.Network
 
03:15
We show you how a user can register with a particular payment hub, deposit ether with the payment hub and then perform an instant off-chain transaction with other wallets associated to the same payment hub. For more details, visit http://liquidity.network
Cryptopass
 
05:13
CryptoPass is a suite of data encryption and management tools accessible through a master password set by the user. All your data is encrypted and stored locally on your machine, never in a database. By securely accessing all your sensitive data through just one password, you'll never have to worry about forgetting your passwords or critical data again. For your convenience CryptoPass includes a desktop app, a chrome extension, and a mobile app. Easily view, add, or update any account, credit card, and personal info you desire, and using our random password generator, give your accounts the strong unique passwords they deserve. Using our chrome extension, automatically navigate and log-in to all your favorite websites, and checkout using any of your saved credit cards. Forgot your password? If you've linked your account with Dropbox, you can recover your data using your phone's built-in fingerprint verification technology. CryptoPass was developed in JavaScript using Electron, Ionic, and AngularJS frameworks, and utilizes Socket.io, Crypto-js, and other Node.js libraries. ---- Fullstack Academy was recently ranked the #1 coding bootcamp in the U.S. Learn more at https://www.fullstackacademy.com.
Views: 627 Fullstack Academy
CONFidence 2016: Recover a RSA private key from a TLS session (Marco Ortisi)
 
37:18
Recover a RSA private key from a TLS session with Perfect Forward Secrecy They always taught us that the only thing it can be pulled out from a SSL/TLS session using strong authentication and latest state-of-art (Perfect Forward Secrecy) ciphersuites is the public key of the certificate exchanged during the TLS handshake, an insufficient condition to place a MiTM attack without to generate alarms on the validity of the TLS connection and certificate itself. Anyway, this is not always true. In certain circumstances it is possible to derive the private key of server regardless the size of modulus used. Even RSA keys of 4096 bits can be factored at the cost of a few CPU cycles and computational resources. All that needed is the generation of a faulty digital signature from server, an event that can be observed when occuring error conditions such as CPU overheating and/or hardware faults. Because of these premises devices like firewall, switch, router and other embedded appliances are more exposed than traditional IT servers or clients. During the talk, the author will explain the theory behind the attack, how common are the factors that make it possible, and his customized implementation of the technique. At the end a proof-of-concept able to work both in passive mode (i.e. only sniffing the network traffic) and in active mode (namely, partecipating directly in the establishment of TLS handshakes) will be released. CONFidence: http://confidence.org.pl/ Facebook: https://www.facebook.com/confidence.conference Twitter: https://twitter.com/CONFidence_news
Views: 328 PROIDEA Events
The Beast Attack
 
12:42
Steve Smith explains what the Beast Attack is, how it affects you, and what can be done about it. Show Notes for this Episode https://tqaweekly.com/se3ep48 Follow Steve Smith (Zed Axis) on Facebook : https://www.facebook.com/zedaxis1981 Twitter : http://www.twitter.com/zedaxis Google+ : https://plus.google.com/u/0/107628320370330737757 To interact with the show, subscribe to our weekly newsletter, and acquire unique custom gear and apparel, head over to http://tqaweekly.com/ Subscribe to the Weekly TQA Podcast on iTunes 720P Video - http://itunes.apple.com/ca/podcast/technology-questions-answered/id556426538 MP4 Video - http://itunes.apple.com/ca/podcast/technology-questions-answered/id405826320 MP3 Audio - http://itunes.apple.com/ca/podcast/technology-questions-answered/id393776403 For more subscription methods, go to http://tqaweekly.com/subscribe
Views: 3096 Steve Smith
How to create a self-signed certificate using openssl
 
03:39
This short video shows how to create a self-signed certificate using the openssl command tools. For more information on openssl see http://openssl.org. Summary: - create a Certificate Signing Request (CSR) with the command: openssl req -new -newkey rsa:2048 -nodes -keyout localhost.key -out localhost.csr - self-sign the Certificate with the command: openssl x509 -req -days 365 -in localhost.csr -signkey localhost.key -out localhost.crt Ask for more videos on technical question to [email protected]
Views: 34534 BrightMindedLtd
CVE-2017-0199 Demo
 
05:44
https://videos.didierstevens.com/2017/04/22/cve-2017-0199-demo/
Views: 3204 dist67
How to Install FREE SSL on Wordpress or Any Website Using LetsEncrypt/Cloudflare (Urdu/Hindi)
 
18:19
Fast Forward Check SSL Certificate : 00:38 LetsEncrypt Certificate Installation : 01:00 Cloudflare Installation : 09:05 Change NameServers : 10:46 Cloudflare SSL Settings : 15:23 How to Install Free SSL using LetsEncrypt and Cloudflare, redirect your HTTP website to HTTPS for free. Today i will show you how to install Free SSL Certificate on your website LetsEncrypt Certificate Goto sslforfree.com Type your domain name and subdomain name (any) of which you want certificate, Click Manual Verification, Upload files in acme-challenge Folder. Verify Domain, then Copy All Three Boxes, then Goto Cpanel and then SSL/TLS, Manage SSL Certificate and there select your Domain and paste those three boxes data in these three Boxes and this will install SSL Certificate on your website. LetsEncrypt Certificate will expire after every 90 days, so you have to repeat step after every 88 Days, if you want to get email notification about your SSL Expiration then please signup at sslforfree.com For Cloudflare it is litte lengthy process, first you have to goto Cloudflare.com and signup there, then add your site in next step, Cloudflare will get your website details and show it to you for confirmation, most of the times it is already correct and you dont need to change anything, only change here if after setting Cloudflare up your website is not working, after setting up everything Cloudflare will ask you to replace your nameServers with cloudflare's, you have to goto your Domain Registar and change nameserver from Domain setting. After Setting up new NameServer it will take 5 to 10 minutes to update settings in Cloudflare, then just Click on Crypto and make sure it is Authorising SSL Certificate and after SSL Certificate is Active now you can Redirect your all traffic to HTTPS using simple .htaccess or according to your server software, please search in google for htaccess or other code for your Redirect "http to https redirection htaccess" "http to https redirection nginx" http to https redirection IIS" If you have any Question regarding these process or any error or problem you are getting feel free to ask in Comments i will be happy to reply.
Views: 138 NaJaM Ul HaSaN
Website Optimization For The Holiday Season | Uptrends
 
32:43
See how Fred Dilkes explains the ins and outs of performance monitoring for the 2016 holiday season in this free webinar.
Views: 409 Uptrends
DEF CON 23 - Panel - Lets Encrypt   Minting Free Certs to Encrypt the Entire Web
 
52:35
Let's Encrypt is a new certificate authority that is being launched by EFF in collaboration with Mozilla, Cisco, Akamai, IdenTrust, and a team at the University of Michigan. It will issue certificates for free, using a new automated protocol called ACME for verification of domain control and issuance. This talk will describe the features of the CA and available clients at launch; explore the security challenges inherent in building such a system; and its effect on the security of the CA marketplace as a whole. We will also update our place on the roadmap to a Web that uses HTTPS by default. Speaker Bios: Peter Eckersley is Chief Computer Scientist for the Electronic Frontier Foundation. He leads a team of technologists who watch for technologies that, by accident or design, pose a risk to computer users' freedoms—and then look for ways to fix them. They write code to make the Internet more secure, more open, and safer against surveillance and censorship. They explain gadgets to lawyers and policymakers, and law and policy to gadgets. Aside from Let's Encrypt, Peter's other work at EFF has included privacy and security projects such as Panopticlick, HTTPS Everywhere, SSDI, and the SSL Observatory; helping to launch a movement for open wireless networks; fighting to keep modern computing platforms open; and running the first controlled tests to confirm that Comcast was using forged reset packets to interfere with P2P protocols. Peter holds a PhD in computer science and law from the University of Melbourne. James Kasten is a PhD candidate in Computer Science and Engineering at the University of Michgan and a STIET fellow. James is also a contractor at the Electronic Frontier Foundation. His research focuses on practical network security and PKI. James has published on the state of TLS, its certificate ecosystem and its vulnerabilities. Most notably, James has helped design the protocol and launch the technology behind Let's Encrypt. Yan is a security engineer at Yahoo, mostly working on End-to-End email encryption and improving TLS usage. She is also a Technology Fellow at EFF and a core developer of Let's Encrypt, HTTPS Everywhere, Privacy Badger Firefox, and SecureDrop. Yan has held a variety of jobs in the past, ranging from hacking web apps to composing modern orchestra music. She got a B.S. from MIT in 2012 and is a proud PhD dropout from Stanford. Yan has been a speaker at HOPE, DEFCON 22, jQuerySF, Real World Crypto, SXSW, and various other human gatherings. She is @bcrypt on Twitter.
Views: 7172 DEFCONConference
ASP.NET MVC Crypto Nesnesi
 
04:32
ASP.NET MVC Crypto Nesnesi www.furkansabaz.com
Views: 263 Furkan Sabaz
The Multi User Security of Authenticated Encryption  AES GCM in TLS 1 3
 
24:44
Mihir Bellare and Björn Tackmann, Crypto 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27666
Views: 710 TheIACR