Lorem ipsum dolor sit amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi eleifend tempus fermentum. Nulla facilisi. Mauris accumsan, odio feugiat semper dapibus, orci velit elementum metus, at elementum ipsum felis in odio. Etiam id nunc mollis tortor hendrerit feugiat interdum eget diam. Phasellus et ipsum mauris, et ornare quam. Suspendisse placerat tempor ipsum eu ullamcorper. In hac habitasse platea dictumst. Duis quis tellus felis, sodales commodo nibh. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam fermentum lorem rhoncus tellus porttitor eget iaculis arcu faucibus. Aliquam a leo tellus. Morbi nibh dolor, vehicula eget ullamcorper in, sodales quis risus. Nam sapien nisl, tristique et condimentum quis, viverra nec arcu. Phasellus hendrerit tincidunt felis, at convallis urna molestie sagittis. Sed nec nunc lectus, sit amet lacinia orci. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Maecenas quis nibh vel metus venenatis congue nec quis elit.

Pellentesque volutpat elementum lacus a posuere. Aliquam ornare malesuada neque, sit amet faucibus ligula tincidunt at. Aliquam erat volutpat. Nulla orci nunc, malesuada quis varius vitae, vulputate ac dui. Etiam sed placerat felis. Maecenas non risus at nunc interdum varius sit amet eu dui. Donec convallis purus sit amet diam luctus posuere lobortis odio suscipit. Vivamus ut nisi at magna posuere mollis. Vestibulum iaculis rutrum porta. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Curabitur eu pellentesque diam. Pellentesque neque turpis, ultricies ac gravida ut, aliquet nec orci. Nulla facilisis leo ac lacus aliquam luctus. Proin convallis, purus quis ullamcorper pretium, sapien sapien imperdiet tortor, non pellentesque mauris eros quis tortor. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Living with the iPad

I have been using my new iPad for almost 2 weeks now and I thought that I should share my experiances with it with you. I bought it while attending Blackhat and Defcon in Las Vegas and it immidiate replaced my laptop for my browsing and social network need, mainly for two reasons:

* My laptop's battery is not very good any longer, if I am lucky I can get maybe two hours out of it between recharges - not that good if you are attending conference activities about 10 hours a day.

* A laptop is quite cumbersome to open and close as well, weights twice as much as my iPad and takes a while to start and power off, meaning that you get even less usable time working on it.

It took a few hours to get used to the iPad's on-screen keyboard, but it works quite well now. I am in fact writing this whole blog post using my iPad using BlogPress.

Apart from using it for blogging and twittering (using TweetDeck) I uploaded my collection of PDF-magazines (Hakin9, (IN)Secure Mag, ClubHack etc.) as well as Dive Into Python PDF book and some PDF's from the academic courses I am persuing this semester and I have no problem reading those on the iPad either.

The only drawback I percive with the iPad at the moment are that:
1) I don't have a mobile broadband plan for it (yet). This will be sorted out in the next few weeks.

2) Many of the iPhone applications has yet to be updated to support the iPad, and running games and such in 2x magnified mode basically sucks and looks pretty ugly.

Now when I can blog more easily on the road I think I can take the time to keep the blog updated.

Thoughts from the trip to Las Vegas

Two weeks ago Blackhat USA 2010 started, followed by Defcon (didn't have time to attend B-Sides). I found it difficult to live-blog during the presentations at the conferences, so I thought I would summarize them now when I has some time to digest what was said. This was my first trip to Las Vegas, or the states for that matter, so lets start at the travel to the country of oppertunities.

The flight went without problems from Sweden (Arlanda) to New York (Newark), where we (my colleges and me) has to collect our suitcases just hand them in again (some customs deal, although they just took the bags and out them on another conveyer belt - no questions asked nor was there any separate line if you has something to declare). Dunno what it was all about but it went fairly easy. Them came the TSA security checkpoint, where you had to take off your shoes, belt and anything else metallic. That also went fairly well, but I have been loosing weight lately so my pants did almost fall off. The flight to Las Vegas was a little late taking off, but we arrived earlier then predicted so that was cool.

Once in Las Vegas we went to our hotel (Caesars Palace) and checked in, dumped our bags and went to town to grab something to eat (9pm local time). We ended up at an japanese resturant in Forum mall (which is physically connected to Caesars Palace) and ate some ramen (which I really enjoyed).

The next day (Tuesday) we went started the day with a nice breakfast, followed by a margarita drink. We took a cab to Town Square and went shopping a bit, with regular pauses at a pub to keep our fluid levels as it is very hot in Las Vegas during the summer. I bought myself a new wallet as my old one was starting to break and it was not wide enough to hold US dollars. It was a quite nice wallet with a money clip on the outside that also funtions as a bottle opener (haven't had the oppertutinty to try out that fuction yet though). When we arrived back at the hotel we picked up our Blackhat badges and went to watching the Penn & Teller show, which was great. After the show we went to bed to be fresh for the conference.

Thoughts from Black Hat USA 2010, day 1

The breakfast at Blackhat was not that great, had some bread with jam and juice (I really missed the egg and bacon breakfast from yesterday). The opening by Jeff Moss was great, and the place was packed. I have heard later that we were about 2000 attendees at the conference.

The most noteworthy talk during the day was Jack Barnaby's presentation on how he developed the hacks for the ATM machines. The whole story how he hot hold of them was hillarious in it self, but then it got scary. The keys needed to access the computer that sits on the big honking safe can be bought directly from the vendor's website and they will use the same key for all the ATM's they ship unless specified otherwise. The computer on the ATMs he aquired (shipped to his /home/ adress) were running Windows CE (IIRC), and the Windows CE has not gotten the same attention as Windows server and client OSs have so they were vulnerable.

Jack developed a tool to communicate with the remote managment facility (which can be reached by IP and POTS networks) and discovered that there was a flaw in how access was authenticated, making it possible to bypass the whole authentication requirement. Once connected he could do things like uploaded new firmware. The new firmware he uploaded had some extra functionality; he could use the built-in cardreader as an skimming device, so pulling the ATMs parts to check if there is any extra devices commonly use in normal skimming attacks is useless. He could also walk up to the machine and insert a special ATM cardreader (ie the ATM is programmed to give an admin console when it is inserted) to make it spit cash (which also is a funtion you can tell it to perform from the admin console remotely).

The other hack was to insert an USB device, reboot the ATM and let it boot up from the USB stick and just make it empty its content. Very cool find, and the ATM vendors have had over 18 months to fix this (the talk got pulled last year when the vendors pressured Barnaby's employeer, that problem was resolved by a change of employeer).

The other noteworthy presentation of the day was Sammy's talk "how I meet your girlfriend", were he, among other things, reduced PHP's session cookie from 160 bits to just 20 bits, which it totally reasonable to bruteforce.