Home page logo

pen-test logo Penetration Testing mailing list archives

Re: Re: Determining the encryption used
From: cwright () bdosyd com au
Date: 12 May 2006 22:26:10 -0000

To throw in my 5 cents (2cents being abolished in AU)

There are a couple classes to consider. First is the obvious. If there are headers and footers that allow analysis than 
these are covered early.

Next if we look at classes where there are no headers etc to see directly what it is, there is a level of analysis 

First is the data chunked? Does it conform to set blocks. Is it streamed?

Is there any surrounding stream information that can help?

Inferential Statistics and a good program for data mining will help. but this would be another 300-800 pages to post.

Grab a book;
Differential Cryptanalysis of the Data Encryption Standard
by Eli Biham, Adi Shamir 

or as an intro to the subject;
by Helen F. Gaines 

In reality this is not a question that can easily be answered. It needs to be fleshed out. Where was the data obtained. 
In a file and extracted, from a stream? What supporting information is there? How was it created? How was it found? 
What permissions does it have?.......


This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]