Wednesday, 2. November 2011
Exploiting P2P Communications
This paper, shows how to exploit real-time communication applications to determine the IP address of a targeted user.
This paper focuses on Skype, although other real-time communication applications may have similar privacy issues. The paper presenter designed a scheme that calls an identified targeted user inconspicuously to find his IP address, which can be done even if he is behind a NAT! By calling the user periodically, they were then able to observe the mobility of the user.

Download PDF
http://arxiv.org/PS_cache/arxiv/pdf/1109/1109.4039v3.pdf

Permalink

 


Android Reverse Engineering (A.R.E) - Android
The Honeynet Project release of the Android Reverse Engineering (A.R.E.) Virtual Machine. Do you need to analyze a piece of Android malware, but dont have all your analysis tools at hand? The Android Reverse Engineering (A.R.E.) Virtual Machine, put together by Anthony Desnos from our French chapter, is here to help. A.R.E. combines the latest Android malware analysis tools in a readily accessible toolbox.

Download
http://redmine.honeynet.org/projects/are/wiki

Permalink