Demos
Demo | Date |
1/25/2018 | |
This demo is a small program which will encrypt an image by generating a stream of pseudorandom pixels, and adding it to the image to obtain a ciphertext. You can set the bias of the pseudorandom number generator (PRNG) used to produce this stream using the slider bar. Download the script: stream.py You can invoke the script like this:
Note that this program only works for JPEGs, and the encryption is very slow. Use it only on small images. The –pre-cache flag tells the program to first compute all of the encrypted images it will display before showing the UI so that the UI is more responsive once it loads. NOTE: You will need to install scipy, numpy, and PIL. If you have the pip installer for Python, you can install these as follows (note that you may need to install these as root (i.e., using sudo)):
| |
1/25/2018 | |
This demo is a small program will demonstrate the pitfalls of key re-use with one time pads. Download the script: pad.py You can invoke the script like this:
NOTE: You will need to install cv2 and numpy. If you have the pip installer for Python, you can install these as follows (note that you may need to install these as root (i.e., using sudo)):
| |
2/2/2018 | |
If you don’t yet have openSSL installed on you machine, you can get it using the instructions on their download page here.
To explore more about randomness in your machine, you can start with the script in randomness.sh
| |
2/28/2018 | |
This is a demo of password cracking using legacy CPU hashcat, a free password recover tool, with hashes from the 2012 eHarmony breach. You can find the demo slides here. In order to set up the demo, perform the following steps:
Make sure hashcat has been properly set up by running:
You should see the benchmark times for different hashes that hashcat supports printed. Download the eHarmony hashes here. Download rockyou.txt, a list of passwords recovered from the 2008 RockYou hack here. You can use this rockyou.txt file as a dictionary. Here are a couple things you can try to recover the eHarmony passwords: Dictionary attack: Rule based attack: Mask attack: |