⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 vpnlecture.html

📁 黑客培训教程
💻 HTML
📖 第 1 页 / 共 5 页
字号:
<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the above scenario is simply 

called</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Mikkkeee&gt; damn mad ppl are awake for this 

lecture, lol</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; symetric encryption</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; PhrostByte 

(PhrostByte@RlNKlHrtD4k.socal.rr.com) has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; there is also</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; aysmetric encryption( w/o 

symetry)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; which i will describe later</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; another term is cipher text , this 

is the data being encrypted</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; Encrytipon is the act of 

transforming clear text into cipher text</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; normally a key has to be provided 

along w/ the cipher textt</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; this is a simple formula those 

describles the encrytion processs</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- PhrostByte 

(PhrostByte@RlNKlHrtD4k.socal.rr.com) has left #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; PhrostByte 

(PhrostByte@RlNKlHrtD4k.socal.rr.com) has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ciphertext= f (clear-text, K1)</P>

<P style="MARGIN-BOTTOM: 0cm">&gt;Mikkkeee&lt; whats up</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; whereis f=algorithm,K=Key </P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; so</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; suppose you had the word</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; fag</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; whoops</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; i should be PC</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the word toy</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; toy =clear-text</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; algorithm will be add 3 letters to 

each letter</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; whoops</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; algorithm is addletters</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; while</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the Key is add 3 letters</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; so</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- linuxlogic has quit (Ping timeout: 180 

seconds)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; cipher= add-letters( toy , 3)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; result would be</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; wrb= addletters( toy, 3)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; and</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; decryption would do the 

oppositte</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; removeletters( wrb ,3) = toy</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; simple eh</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ok</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; definition </P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- Phaedrus has quit (Read error: 104 

(Connection reset by peer))</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; for decryption</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; is</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; Phaedrus (bar@PSBfMieMHWU.128.164.62.O) has 

joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- Zomart has quit ()</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the process of taking the cipher 

text and translating it into clear text..... ( btw this requires a key also)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; what i describe above</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; is a bloated ex. of symentic 

encrption</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- syme_ has quit (Argh! Learn how to fucking 

spell or piss off and die.)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; since there are 56 bit</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; bits</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; there are 2^56 possible keys</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; or</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; about 72x10^12 keys</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; MIT says</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; an average dude with 400 bucks 

would take 38 years to crack regular des encrption</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; however US Governemnt with 

300million takes 12 seconds</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; so</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; an alternate DES was 

developped</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; where</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the data is Encrypted with Key1 

then decrypted with Key2 and reecrpted with Key1</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; thus make the totaol key size to 

56x2</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; theres even another type of 

DES</P>

<P style="MARGIN-BOTTOM: 0cm">--- Mikkkeee sets mode +R #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; called 3des where 3 different Keys 

are involved</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Chris&gt; --- Chris sets mode +R Chris</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; K1 encrypts, k2 decrpts,k3 

encryps</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Chris&gt; ;)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; and the process is reversed on the 

decryption end</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; thers another type of encrption 

called Asymetric .. but i'll first take questions again</P>

<P style="MARGIN-BOTTOM: 0cm">--- simprix sets mode -m #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;simprix&gt; any questions</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ha</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; i dont think anybody is 

listening</P>

<P style="MARGIN-BOTTOM: 0cm">* Lunarcade stirs</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Mikkkeee&gt; damn place is packed</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;b0ttyburp&gt; we are listening</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; SpiderMan (SpiderMan@NIZ2cxYsTpo.o1.com) 

has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">--- ChanServ gives channel operator status to 

SpiderMan</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;simprix&gt; im listening</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;b0ttyburp&gt; *we are</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;snidx2&gt; listening</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Mikkkeee&gt; sup spider</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;SpiderMan&gt; hey</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;LiquidCrystalDismay&gt; watching</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;simprix&gt; you are just explaining ut very 

well</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;b0ttyburp&gt; i can say WE cos we have a royal 

family :O)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Mikkkeee&gt; ;)</P>

<P style="MARGIN-BOTTOM: 0cm">* Phaedrus is more reading than anything</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;b0ttyburp&gt; simprix: ur correct</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; lemme just finish up then</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; wityh asymetric encryption</P>

<P style="MARGIN-BOTTOM: 0cm">--- simprix sets mode +m #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- ldh1 has quit (Your explaining it horribly. 

I'm scarred for ever.)</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; [RaFa] (~none@bbmaCUCLI54Y.wantstofuck.us) 

has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; my fingers are terrible tired from 

typing</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Mikkkeee&gt; sup rafa</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; Asymmetric involves a public and a 

private key</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; its typically used for 

authentication</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Mikkkeee&gt; ;)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; b/c of the high packet payload 

(due to a lot of keys) it doesnt provide an efficient method of data transport 

for time</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; critical data</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; this type is 3des</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; where 3 diff. keys are used</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; it relies on complex mathamatical 

algorithms that mainly depend on large prime numbers....</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; trinity (mec@sV6ppNXc5Bss.203.197.150.O) 

has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the encryption processs is simliar 

in equation for tot that of symetric encryption</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; where</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- phatal has quit (Ping timeout: 180 

seconds)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; Encryption = ciphertext= 

shift-right ( clear-text , 3)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; but the</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; decryption uses a different 

relation similar to</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; decryptions = cleartext= 

shift-right (cipher-text, -3)</P>

<P style="MARGIN-BOTTOM: 0cm">* Chris is away: brb</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the relations ship between key 1 

and key 2 is K1= (-1)K2</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; as with symmetric K1=k2</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ok</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; now when deploying VPN</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; keep in mind</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; what sorta encryption algorithm 

you are going to impart in ur VPN</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; if you are on a slow WAN link</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; you probably want to limit ur 

asymetric encryption to just authentication</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; then transfer private keys for 

symetric encryption</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; however</P>

<P style="MARGIN-BOTTOM: 0cm">--- Mikkkeee gives channel operator status to 

[RaFa]</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; well</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; one sec</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; phatal 

(phatal@Ta5W3Z8Rgg6.bhm.bellsouth.net) has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; my bad silly cat</P>

<P style="MARGIN-BOTTOM: 0cm">--&gt; bluhayz 

(bluhayz@fbbjxw4qW6zo.nv.nv.cox.net) has joined #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; ok symetric is more efficient 

primarly b/c its smaller pay load</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; key size is small</P>

<P style="MARGIN-BOTTOM: 0cm">--- Mikkkeee gives channel operator status to 

bluhayz</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; thus its more efficient for bulk 

transfers </P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; and for slow wan links</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; Aysmetric is exacly the 

opposite</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; oh yea</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; CBC</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; outer-cipher block chaining is 

used in VPN packets</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; to input spoiler data in the 

packet</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; so that repetative data does 

become pattern encrypted</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; like someone is using a 

website</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;-- snidx2 has quit ()</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; the pass is resent over and over 

each time they view anothe rpage in that secure domain</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; well thats it</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; :-D</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; i know i prolly went into 

encryption to much</P>

<P style="MARGIN-BOTTOM: 0cm">--- simprix sets mode -m #bsrf</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;bluhayz&gt; it's over?</P>

<P style="MARGIN-BOTTOM: 0cm">* b0ttyburp clap "" clap """ clap """ :O)</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; but its important for 

understanding the transfer of VPN data</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; hehe</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; if you wanna put it all 

together</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; you can</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;_Jonah_&gt; i'm so tired from typing</P>

<P style="MARGIN-BOTTOM: 0cm">&lt;Phaedrus&g

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -