sábado, 21 de febrero de 2015

Nuzzel News Alert - Exploiting the Superfish certificate

Nuzzel Logo News Alert
Breaking news from your Nuzzel feed: View all my news
3
friends
Tweet
Share
Errata Security – Robert Graham – Feb 21 – As discussed in my previous blogpost, it took about 3 hours to reverse engineer the Lenovo/Superfish certificate and crack the password. In this blog post, I described how I used that certificate in order to own victims using a rogue WiFi hotspot.
_cypherpunks_ hackerfantastic DragonJAR
Image not available
Sent to hudosuppt@gmail.com. Unsubscribe or change settings.
Nuzzel, Inc., 665 3rd St., Suite 150, San Francisco, CA 94107

No hay comentarios.:

Publicar un comentario