16 Sep
1996
16 Sep
'96
11:55 p.m.
(2) Using documented stochastic methods, look for the hidden pattern in the pseudo-random sequences. There are computer programs to do this, sorry, I would have to do a search to find one (the exist, however); Watch out for this step, it's a doozey. The attacker could be using a non-cryptographic random number generator (like rand() or random()), but if he had a clue, he would be using a cryptographic random number generator based on DES, IDEA, RC4, etc., to generate the random bitstream to fill the headers. He could also be using /dev/random on late-model linux systems which would probably be even harder to reverse-engineer. - Bill
10325
Age (days ago)
10325
Last active (days ago)
0 comments
1 participants
participants (1)
-
Bill Sommerfeld