Skip to content

Ben's ideas and projects

Security, Computer Networking, Photography, Electronics, and Technology

  • Reverse Engineering
  • Security
  • Malware
  • Networking
  • Electronics

Tag: nist

Link: Enhancing Password Security Through Memorized Secrets

In March I posted the following article on CDW blog

Enhancing Password Security Through Memorized Secrets

Revisiting NIST recommendations provides some essential techniques for protecting your organization’s accounts
Link: Enhancing Password Security Through Memorized Secrets Author Ben MasonPosted on 2019-07-312019-08-28Format LinkCategories SecurityTags link, nist, passwords, reblog, securityLeave a comment on Link: Enhancing Password Security Through Memorized Secrets

About Me

Technical Architect – Computer Security – Reverse Engineering – Malware – Electronics Hobbyist – Sometimes Photographer – Spaceflight – Cat Enthusiast

Socials

Categories

  • Electronics
  • Malware
  • Meta
  • Networking
  • Photos
  • Presentations
  • Reverse Engineering
  • RF
  • Security

Pages

  • About Me
  • My Notes
    • AVR Development
    • C Notes
    • gdb notes
    • git / GitHub notes
    • Pointers in C / C++
    • Radare2 Cheatsheet
    • STM32 Development Notes
    • Strings in C
    • tmux Notes
    • VI Notes
  • OSCP Notes
    • Buffer Overflows
    • Enumeration
    • Metasploit
    • Password attacks
    • Pivoting
    • Shell and Linux / UNIX
    • Web Exploitation
    • Windows
  • Project FlareOn

Recent Posts

  • Reversing ARM Cortex-M Bit Band addresses
  • Compiling Ghidra Plugins
  • Reblog: Using the MITRE ATT&CK Framework
  • Flare-on 5 – 1 – MinesweeperChampionshipRegistration
  • Flare-on 3 – Challenge 2

Tags

.net 8static art art museum autodiscovery baltimore blade center blipfestival boston chiptune cisco city hall concert conference ctf digoo dg-hosa discards flare-on ghidra hardware kinetic sculpture kinetic sculpture race link malware meta monitoring music networking nexus personal philadelphia philamoca photowalk presentations python reblog reverse engineering revil rf scotland sdn security travel vacation windows

Archives

Recent Comments

  1. Eric on Reversing Revil Malware – Part 2 – String Obfuscation and Configuration Setup2022-01-27

    That was amazing!! You have a brilliant mind man. I started in InfoSec late in life unfortunately, and now in…

  2. Eze on DIGOO DG-HOSA – Part 2 Firmware Extraction and Initial Analysis2021-12-15

    The problema is the fuc**** iOS App. Download the Android App, use the same account that you have on the…

  3. Reversing Revil Malware – Part 2 – String Obfuscation and Configuration Setup – Ben's ideas and projects on Reversing Revil Malware – Part 1 – Stage 1 Unpacker2021-08-20

    […] is the second in a series looking at part of the Revil malware. The first post covered a triage…

  4. The Allegedly Ryuk Ransomware builder: #RyukJoke – Marco Ramilli Web Corner on Ryuk Malware – Analysis and Reverse Engineering2021-06-14

    […] to HERE, HERE and HERE in recent Ryuk sample the persistence happens by modifying the very well know registry…

  5. Billy on DIGOO DG-HOSA – Part 2 Firmware Extraction and Initial Analysis2020-09-29

    Hello, thanks for your post. You have done a great analysis! While sniffing the packets that this alarm sends, I…

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • Reverse Engineering
  • Security
  • Malware
  • Networking
  • Electronics
Ben's ideas and projects Proudly powered by WordPress