Security Conferences

/Security Conferences

Week 1 In Review – 2017

Resources

33C3: Chris Gerlinsky Cracks Pay TV – hackaday.com
People who have incredible competence in a wide range of fields are rare, and it can appear deceptively simple when they present their work. ’s talk on breaking the encryption used on satellite and cable pay TV set-top boxes was like that.

Tools

mitmproxy: release v1.0.0 – The Christmas […]

Information Security Events For January

Here are information security events in North America this month:
 

FloCon 2017 : January 9 to 12 in San Diego, CA, USA

 

ICS Security Conference (S4x17) 2017 : January 10 to 12 in Miami Beach, FL, USA

 

Suits and Spooks DC 2017 : January 11 to 12 in Arlington, VA, USA

 

BSides San Diego 2017 : January 13 to […]

December 31st, 2016|Security Conferences, Security Training|1 Comment

Week 51 In Review – 2016

Events Related

DefCamp- def.campResources

McAfee Virus Scan for Linux – state.actor
A system running Intel’s McAfee VirusScan Enterprise for Linux can be compromised by remote
attackers due to a number of security vulnerabilities. Some of these vulnerabilities can be chained
together to allow remote code execution as root.

Techniques

Practical Reverse Engineering Part 5 – Digging Through the Firmware – jcjc-dev.com
In part 4 we extracted the entire firmware from the router and decompressed it. As I explained then,
you can often get most of the firmware directly from the manufacturer’s website: Firmware upgrade
binaries often contain partial or entire filesystems, or even entire firmwares.

XNU kernel UaF due to lack of locking in set_dp_control_port – bugs.chromium.org
set_dp_control_port is a MIG method on the host_priv_port so this bug is a root->kernel escalation.

macOS FileVault2 Password Retrieval – blog.frizk.net
macOS FileVault2 let attackers with physical access retrieve the password in clear text by plugging in
a $300 Thunderbolt device into a locked or sleeping mac. The password may be used to unlock the
mac to access everything on it.

Vulnerabilities

Bluetooth-enabled safe lock popped after attackers win PINs – theregister.co.uk
Attackers can locate and pop safes protected with high security commercial locks thanks to poor
Bluetooth implementations, say researchers at Somerset Recon say.

0day drive-by exploit against Fedora
If you run a mainstream distribution of Linux on a desktop computer, there’s a good chance security
researcher Chris Evans can hijack it when you do nothing more than open or even browse a specially
crafted music file. And in the event you’re running Chrome on the just-released Fedora 25, his code-execution attack works as a classic drive-by.

0-days hitting Fedora and Ubuntu open desktops to a world of hurt – arstechnica.com
Redux: compromising Linux using… SNES Ricoh 5A22 processor opcodes?!- scarybeastsecurity.blogspot.com

Other News

 FBI Arrests Customer of Xtreme Stresser DDoS-for-Hire Service – bleepingcomputer.com

The FBI arrested this past week Sean Krishanmakoto Sharma, 26, from La Canada, California, for
launching DDoS attacks against Chatango, an online chat service.

 

Week 50 In Review – 2016

Events Related

PhreakNIC20-2016 – www.youtube.com

Tools

GRASSMARLIN – github.com
GRASSMARLIN provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security.

Techniques

Secure Rom extraction on iPhone 6s – ramtin-amin.fr
Secure ROM, also knows as bootrom, is the very first piece of software that a CPU will run […]

Week 49 In Review – 2016

Events Related

BSidesLV – youtube.com
Recordings of Security BSides Las Vegas sessions, selected sessions of sister conferences and other Information Security related educational materials.

BotConf 2016
This is already the fourth edition of the Botconf security conference, fully dedicated to fighting malware and botnets. Since the first edition, the event location changed every year and it allowed me to visit […]

Information Security Events For December

Here are information security events in North America this month:
 

CISO Executive Summit Montreal : December 1 in Montréal, QC, Canada

 

BSides Philadelphia 2016 : December 2 to 3 in Philadelphia, PA, USA

 

Annual Computer Security Applications Conference (ACSAC 2016) : December 5 to 9 in Los Angeles, CA, USA

 

6th Software Security, Protection, and Reverse Engineering Workshop (SSPPREW) […]

December 1st, 2016|Security Conferences, Security Training|1 Comment

Week 48 In Review – 2016

Events Related

Kiwicon X – www.youtube.com

Resources

Curl Security Audit – daniel.haxx.se
I asked for, and we were granted a security audit of curl from the Mozilla Secure Open Source program a while ago. This was done by Mozilla getting a 3rd party company involved to do the job and footing the bill for it.

CVE-2016-7098 – legalhackers.com
“GNU Wget is a […]

Week 47 In Review – 2016

Events Related

BSides DC 2016 – Opening – www.youtube.com
Alex Norman does what Alex Norman does best. Open the con. Inspirational, motivational and most importantly… short.

AppSecUSA 2016 – www.youtube.com
Recordings from AppSecUSA 2016 in Washington, DC

Highlights from the O’Reilly Security Conference in Amsterdam 2016 – www.oreilly.com
Watch highlights covering security, defense, tools, and more. From the […]

Week 46 In Review – 2016

Resources

Security Conference – conferences.oreilly.com
Speaker slides & videos

Techniques

Nintendo Classic Mini Family Talk of computer contents – translate.google.com
As the person who disassembled it released before it was released. Interest in contents has been increased, but in this article I would like to drill down to a bit more detail.

When CSI meets public wifi: Inferring […]

Week 45 In Review – 2016

Resources

Ruxcon – ruxcon.org.au
Presentation Slides from Ruxcon Australia

BlackHat Europe 2016 – www.blackhat.com

Techniques

Kerberoasting Without Mimikatz – www.harmj0y.net
Thanks to an awesome PowerView pull request by @machosec, Kerberoasting is easier than ever using pure PowerShell. I wanted to briefly cover this technique and its background, how we’ve been using it recently, and a few awesome new developments.

Bypassing Two-Factor Authentication […]