We solve the crackme from Kaspersky Lab

One day, different channels in Telegram started throwing link on crack poker from LC, 3r3-3101. Successfully completed the task will be invited for an interview! 3r3102. . After such a loud statement, I wondered how difficult the reverse would be. How I solved this task can be read under the cut (many pictures). 3r3202.  
3r3202.  
3r3202.  
When I got home, I carefully read the assignment again, downloaded the archive, and began to watch what was inside. And inside was this:
 
3r3202.  
We solve the crackme from Kaspersky Lab 3r3202.  
3r3202...
+ 0 -

Block system encryption of Windows Linux installed systems. Double encrypted download. Defense and attack on GRUB2

Block system encryption of Windows Linux installed systems. Double encrypted download. Defense and attack on GRUB2 3r32089.  
3r32089.  
3r32087. Cowboy strategy:
3r32089.  
[A]block system encryption Windows 7 installed system; 3r32089.  
GNU /Linux block system encryption (Debian) installed system 3r313324. (including /boot) [/i] ; 3r32089.  
[C]GRUB2 setup, bootloader protection with digital signature, authentication protection; 3r32089.  
[D]sweep - the destruction of unencrypted data; 3r32089.  
[E]universal backup encrypted OS; 3r32089.  
[F]attack to GRUB2 bootloader; 3r32089.  
[G]useful documentation. 3r32089.  
3r32089.  
3r31885. Scheme
: 3r3r8686. 3r32089.  
3r32089.  
* encryption is not hidden; 3r32089.  
* Windows ...[/G][/F][/E][/D][/C]
[/A]
+ 0 -

ShadowCloud is a universal

ShadowCloud is a universalcloud client. 3r3145. 3r3-31.Currently, many companies provide cloud storage service, but each has its own proprietary client and their functionality, as a rule, leaves much to be desired. 3r3145. The existing alternatives did not suit me for many reasons, so I decided to make my own universal client - 3r3888. shadowcloud3r3133. 3r3145.Something like this: 3r3145. 3r3133. 3r3145.What can 3r3145. 3r3398.  3r3145.Direct download (without using a local disk) to Google Drive, Yandex Disk (WebDAV), Cloud Mail.Ru, Dropbox 3r3145.Full default encryption, a large selection of algorithms and settings 3r3107.  3r3145.Password ...
+ 0 -

Electronic signature of GOST R ??? PDF documents in the LibreOffice office suite

+ 0 -

Why did I get a call from the NSA in the middle of the night and asked for the source code

 3r3189. 3r3-31. 3r388. The story of my top secret coffee cup [/b] 3r33177.  3r3189. 3r33177.  3r3189. Why did I get a call from the NSA in the middle of the night and asked for the source code 3r388. It was a national security issue. [/b] [/i] 3r33177.  3r3189. 3r3331.
3r33177.  3r3189. The caller apologized for the late call and said that his name is Dave. He asked to take a pen and paper, because he was going to give a few important instructions that would confirm his identity. And then I was stunned by the phrase: "This is a matter of national security." 3r33177.  3r3189. 3r33177.  3r3189. Some of my relatives began to gather near the kitchen, where I was standing against the wall with a telephone...
+ 0 -

A graduate student solved the problem of confirming quantum computing

Urmila Mahadev spent eight years in the master's program in search of an answer to one of the most basic questions of quantum computing: how do we know that the quantum computer did at least something at the quantum level?


 
A graduate student solved the problem of confirming quantum computing  
 
In the spring of 201? Urmila Mahadev was in a good position, in terms of the majority of graduate students. She has just solved the most important problem of quantum computing - the field of computer studies, deriving its capabilities from the strange laws of quantum physics. Together with her earlier works, Mahadev’s new result describing the so-called “Blind computation,” ...[/h]
+ 0 -

Ways to use the blockchain turned somewhere not there. Sony has announced the creation of a DRM system based on a

Ways to use the blockchain turned somewhere not there. Sony has announced the creation of a DRM system based on ablock chain. 3r3-31. When the blockchain just started its way "to the masses", evangelical technology told us that it brings only positive changes to the world. The clarity, immutability and transparency of the blockchain as a transactional platform presented the technical community an excellent opportunity to change the world for the better. However, as time went on, developers and companies began to more and more actively look for options for applying the chain of blocks. After bitcoin and the Altcoin boom, smart contracts for business and insurance appeared on the scene, private blockchains appeared that ...
+ 0 -

Validation of electronic signatures in C # using CRIPTO PRO

 3r33333. 3r3-31. Continuing the conversation on the topic of electronic signatures (hereinafter referred to as ED), it is necessary to say about verification. In the previous article I examined the more difficult part of the task - the creation of a signature. This article is somewhat simpler. Most of the code is an adaptation of examples from the CRYPTO PRO .NET SDK. First of all, we will check signatures according to GOST R ???-2001 and GOST R ???-201? for which we need the CRIPTO PRO. 3r33333.  3r33333.
3r33333.  3r33333. The task for us is divided into 3 parts: a separated signature, a signature ...
+ 0 -

Signing a PDF on JS and inserting a signature on C # using Krypto PRO

 3r33434. 3r3-31. So. The task came. Using a browser, invite the user to sign a PDF with an electronic signature (hereinafter referred to as ES) The user must have a token containing a certificate, public and private key. Next on the server you need to insert a signature in the PDF document. After that, you need to check the signature for validity. We use ASP.NET and C # as the back-end.
 3r33434.
 3r33434. All salt in that it is necessary to use the signature in the CAdES-X Long Type 1 format, and the Russian GOST R ???-200? GOST R ???-201? etc. In addition, there can be more than one signatures...
+ 0 -

Fascinating cryptography or research on the topic of reversible encryption in PHP

One of the main truths of cryptography is that you should not invent anything in this area if you are not a professional. This is partly true, because all the best has long been invented, suffered and used for more than a decade in the field of information technology. The other side of the truth is that the development of some area of ​​knowledge occurs only with a constant influx of fresh ideas and original solutions in it.
 
 
For obvious reasons, we will not attack the giants of industrial cryptography like AES, but plunge into our own cryptographic research with blackjack and jokes.
 
...
+ 0 -