Security Vulnerabilities

/Security Vulnerabilities

Week 21 In Review – 2016

Tools

fwexpl – github.com
PC firmware exploitation tool and library

Techniques

The best part about open source software is there’s no hidden backdoors – twitter.com

Kerberoasting
SPNs are used by Kerberos authentication to associate a service instance with a service logon account.

Kerberoasting – Part 1 – room362.com
Kerberoasting – Part 2 – room362.com
Kerberoasting – Part 3 […]

Week 20 In Review – 2016

Events Related

Cybersecurity sleuths learn to think like hackers – www.cnet.com
About 35 high-school students sit at neatly arranged rows of tables in the university’s gym. Another 115 college-level contestants surround the high schoolers. The room is pretty quiet, with only the occasional rattle from the New York subway tunnels below cutting into the hushed conversations.

Techniques

[…]

Week 19 In Review – 2016

Resources

Phrack – phrack.org

Tools

Can’t Hack a Hacker: Reverse Engineering a Discovered ATM Skimmer – trustfoundry.net
Brian Krebs has produced numerous articles on ATM skimmers. He has essentially become the “go to” journalist on ATM fraud. From reading his stuff, I have learned how the “bad guys” think when it comes to ATM fraud.

exploit-poc – […]

Week 18 In Review – 2016

Events Related

OWASP AppSec California 2016 – www.youtube.com

Resources

SyScan360 Singapore 2016 slides and exploit code – reverse.put.as
The exploit for the bug I presented last March at SyScan360 is today one year old so I decided to release it. I wasn’t sure if I should do it or not since it can be used in the wild but […]

Week 16 In Review – 2016

Events Related

CanSecWest – www.slideshare.net

BSides Nashville 2016 Videos – www.irongeek.com

Infiltrate 2016 – infiltratecon.com

Resources

Ransomware: Past, Present, and Future – blog.talosintel.com
The rise of ransomware over the past year is an ever growing problem. Businesses often believe that paying the ransom is the most cost effective way of getting their data back – and this may also be the […]

Week 15 In Review – 2016

Events Related

Tailoring the NIST Cybersecurity Framework for a Precise Fit – www.tenable.com
One thing caught my attention right away: there were two digital clocks prominently displayed on either side of the auditorium. Both clocks were synchronized, and according to my phone, they were accurate to the second. It makes sense because NIST is the keeper of […]

Week 14 In Review – 2016

Events Related

Central Ohio Infosec Summit 2016 Videos – www.irongeek.com
These are the videos from the Central Ohio Infosec Summit conference.

Cyphercon 2016 Videos – www.irongeek.com
These are the videos from the Cyphercon 2016 conference.

TROOPERScon – www.youtube.com

Resources

pysap – github.com
This Python library provides modules for crafting and sending packets using SAP’s NI, Message Server, Router, RFC, SNC, Enqueue and Diag protocols.

Techniques

IoT IP camera teardown […]

Week 13 In Review – 2016

Resources

More on Purple Teaming – carnal0wnage.attackresearch.com
Purple Teaming is “conducting focused Red Teams with clear training objectives for the Blue Team.”

SDR Radio Academy: Reverse engineering a wireless car key fob – phasenoise.livejournal.com
The Software Defined Radio Academy has the goals of attract Radio Amateurs to modern radio technology and show paths into SDR.

Tools

VolUtility – github.com
Web Interface for Volatility […]

Week 12 In Review – 2016

Events Related

Pwn2Own 2016: Hackers Earn $460,000 for 21 New Flaws – securityweek.com
On the first day, contestants earned $282,500 for vulnerabilities in Safari, Flash Player, Chrome, Windows and OS X. On the second day, Tencent Security Team Sniper took the lead after demonstrating a successful root-level code execution exploit in Safari via a use-after-free flaw in Safari and an […]

Week 10 In Review – 2016

Events Related

BSides San Francisco 2016 Videos – www.irongeek.com
These are the videos from the BSides San Francisco conference.

BSides Indy 2016 Videos – www.irongeek.com
These are the videos from the BSides Indy conference.

Tools

HTCAP – www.htcap.org
htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and DOM changes.

Techniques

Getting Domain Admin with Kerberos […]