Security Vulnerabilities

/Security Vulnerabilities

Week 25 In Review – 2016

Events Related

Circle City Con 2016 Videos – www.irongeek.com

Area41 – 2016 – confseclive.wordpress.com
I had the opportunity this year to attend Area41 conference in Zurich. The conference is organised by the DEFCON Switzerland group and the talks are mainly technical.

ShowMeCon 2016 Videos – www.irongeek.com

Recordings of talks and speakers at Security Fest 2016 – securityfest.com

Resources

ActBlue […]

Week 24 In Review – 2016

Resources

Typosquatting programming language package managers – incolumitas.com
Typosquatting is the malicious registering of a domain that is lexically similar to another, often highly frequented, website. Typosquatters would for instance register a domain named Gooogle.com instead of the well known Google.com. Then they hope that people mistype the website name in the browser and accidentally arrive on the wrong […]

Week 23 In Review – 2016

Resources

Out-of-Box Exploitation: A Security Analysis of OEM Updaters – duo.com
Original Equipment Manufacturers (OEM) refer to the first boot of a new PC as the out-of-box experience (OOBE). As you battle your way through modal dialogues for questionable software, and agree to some exciting 30 day antivirus trials, it’s pretty forgivable to want to throw your […]

Week 22 In Review – 2016

Events Related

NolaCon 2016 – www.irongeek.com

Resources

BlueCoat now has a CA signed by Symantec – twitter.com

hitbsecconf2016ams – conference.hitb.org

Tools

Practical Malware Analysis Starter Kit – bluesoul.me
This package contains most of the software referenced in Practical Malware Analysis. Some of the links have broken over time, some companies have folded or been bought.

1 alpha 20160525 (oe.eo) […]

Week 21 In Review – 2016

Tools

fwexpl – github.com
PC firmware exploitation tool and library

Techniques

The best part about open source software is there’s no hidden backdoors – twitter.com

Kerberoasting
SPNs are used by Kerberos authentication to associate a service instance with a service logon account.

Kerberoasting – Part 1 – room362.com
Kerberoasting – Part 2 – room362.com
Kerberoasting – Part 3 […]

Week 20 In Review – 2016

Events Related

Cybersecurity sleuths learn to think like hackers – www.cnet.com
About 35 high-school students sit at neatly arranged rows of tables in the university’s gym. Another 115 college-level contestants surround the high schoolers. The room is pretty quiet, with only the occasional rattle from the New York subway tunnels below cutting into the hushed conversations.

Techniques

[…]

Week 19 In Review – 2016

Resources

Phrack – phrack.org

Tools

Can’t Hack a Hacker: Reverse Engineering a Discovered ATM Skimmer – trustfoundry.net
Brian Krebs has produced numerous articles on ATM skimmers. He has essentially become the “go to” journalist on ATM fraud. From reading his stuff, I have learned how the “bad guys” think when it comes to ATM fraud.

exploit-poc – […]

Week 18 In Review – 2016

Events Related

OWASP AppSec California 2016 – www.youtube.com

Resources

SyScan360 Singapore 2016 slides and exploit code – reverse.put.as
The exploit for the bug I presented last March at SyScan360 is today one year old so I decided to release it. I wasn’t sure if I should do it or not since it can be used in the wild but […]

Week 16 In Review – 2016

Events Related

CanSecWest – www.slideshare.net

BSides Nashville 2016 Videos – www.irongeek.com

Infiltrate 2016 – infiltratecon.com

Resources

Ransomware: Past, Present, and Future – blog.talosintel.com
The rise of ransomware over the past year is an ever growing problem. Businesses often believe that paying the ransom is the most cost effective way of getting their data back – and this may also be the […]

Week 15 In Review – 2016

Events Related

Tailoring the NIST Cybersecurity Framework for a Precise Fit – www.tenable.com
One thing caught my attention right away: there were two digital clocks prominently displayed on either side of the auditorium. Both clocks were synchronized, and according to my phone, they were accurate to the second. It makes sense because NIST is the keeper of […]