• S/MIME Public Certs and GPG Public Key
MENU

Phil Hagen's Scratch Pad

  • S/MIME Public Certs and GPG Public Key

Blind iOS Device and Apple ID Discovery

By Phil Hagen On October 20, 2013 · Add Comment · In Information Security
After installing the latest iOS 7 updates on several of my Apple products, I discovered a feature that could also provide unintentional insight to users’ accounts. When composing a new iMessage, typing a few letters provides a list of matching entries from the system-wide address book.  What I found most interesting was that contacts who [...]
Read More »
 
  • Popular
  • Recent
  • Comments
  • Tags

Popular Posts

  • Permanently Ban Repeat Offenders With fail2ban (UPDATED)The fail2ban suite is a very useful tool in the battle against brute force login attempts. Where it's capabilities broke down for me, however, was in addressing repeat offenders. This post includes a configuration to permanently block repeat offenders using the iptables firewall.
  • iptables Processing Flowchart (Updated Often)I've created a flowchart that details the flow traffic takes through the various tables and chains of the Linux iptables firewall.
  • Comcast Sets Customers Up as Phishing TargetsToday I received an e-mail message from Comcast extolling the [...]
  • Logstash: BFD (Big Forensic Data)Presentation video and slides from last week's Security Weekly show, where I talked about Logstash in forensic investigations.

Recent Posts

  • CDN, TLS, and WordPress - Oh My!This is a post that details how, after a great [...]
  • Logstash: BFD (Big Forensic Data)Presentation video and slides from last week's Security Weekly show, where I talked about Logstash in forensic investigations.
  • Slides from SANS @Night, Bangalore IndiaI really enjoyed giving a SANS @Night talk in Bangalore, [...]
  • iptables Processing Flowchart (Updated Often)I've created a flowchart that details the flow traffic takes through the various tables and chains of the Linux iptables firewall.

Comments

  • Phil Hagengreat approach - and sounds like it operated as ex
  • FlacusActually, I described that incorrectly: I didn't
  • FlacusThanks. I inserted LOG rules at top of all the ch
  • Phil HagenThat's a great question - and I don't have a def

Tags

558 backup comcast compromise conference database fail2ban failsauce forensic google imessage ios iptables linux math phishing presentation privacy procmail python sans sansfire security snapshots sql strategy sysadmin tips unicorns vmware
  • Recent Posts

    • CDN, TLS, and WordPress – Oh My!
    • Logstash: BFD (Big Forensic Data)
    • Slides from SANS @Night, Bangalore India
    • iptables Processing Flowchart (Updated Often)
    • Slides from SANS @Night: There’s GOLD in Them Thar Package Management Databases
    • Twitter:
      Follow @PhilHagen
 
  • S/MIME Public Certs and GPG Public Key
DMS