Security Vulnerabilities

/Security Vulnerabilities

Week 38 In Review – 2016

Events Related

BSides Augusta 2016 Videos – www.irongeek.com
These are the videos from the BSides Augusta conference.

Resources

Long Secret Stingray Manuals Detail How Police Can Spy On Phones – theintercept.com
The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet.

Techniques

Reprogramming the Defcon 24 badge – diyevil.com
The Defcon 24 […]

Week 37 In Review – 2016

Resources

House of Keys: 9 Months later… 40% Worse – blog.sec-consult.com
In our initial study we analyzed SSH host key use as well. Unfortunately there is no recent scan data on SSH host keys available (however there is a ticket over at the awesome ZMap project).

Tools

FaceWhisperer – github.com
FaceWhisperer is a hardware add-on for the ChipWhisperer side-channel analysis tool, for […]

Week 36 In Review – 2016

Tools

WiFi-Pumpkin – github.com
Framework for Rogue Wi-Fi Access Point Attack

Python tools for penetration testers – github.com
Python tools for penetration testers

Nmap 7.25BETA2 Birthday Release – nmap.org
Nmap 7.25BETA1 includes dozens of performance improvements, bug fixes, and new features.

Vulnerabilities

Meet USBee, the malware that uses USB drives to covertly jump airgaps – arstechnica.com
The USBee—so named because […]

Week 35 In Review – 2016

Resources

DEF CON 24 Wireless Monitoring Services – palshack.org
One of the frequent things you hear leading up to DEF CON is that it is the most dangerous network in the world. Ask anyone, and they’ll tell you that if you don’t lock down your devices you will get pwn’d. I wanted to know if […]

Week 34 In Review – 2016

Events Related

Impressions From DEF CON 24: The Machines Are Rising – securityintelligence.com
DEF CON 24, the world’s largest hacker conference, ended Aug. 7, and I must say I enjoyed every moment of it. There was so much to see in so little time; I definitely regret missing some great stuff that happened. Even so, I […]

Week 33 In Review – 2016

Events Related

DefCon Event
Council of 9 ventured forth to DEFCON 24 to compete in this year’s badge challenge, brought to us each year by 1o57. There was determination among the team to win at DC24 to ensure that last year’s win was not a fluke. After many sleepless nights in Vegas, we emerged victorious for a […]

Week 32 In Review – 2016

Events Related

DARPA’s Cyber Grand Challenge: Early Highlights from the Competition – www.youtube.com
Early highlights from the world’s first all-machine hacking tournament, DARPA’s Cyber Grand Challenge (CGC). This computer security competition featured seven High Performance Computers as competitors. CGC took place on Thursday, August 4, 2016.

Building the Workforce through Cybersecurity Competitions – www.whitehouse.gov
The National Science […]

Week 31 In Review – 2016

Events Related

The Security Summer Camp Talks I Want To See… – jerrygamblin.com
I took some time tonight and read through the Security Summer Camp (BSidesLV, Blackhat and Defcon) schedules and picked the talks from this year that I think will be the best and that I do not want to miss.

BlackHat/Def Con/BSides Talk Picks for 2016 – […]

Week 28 In Review – 2016

Events Related

USENIX Annual Technical Conference (ATC) 2016: The Best and Brightest Security Talks – duo.com
I recently attended the USENIX Annual Technical Conference (ATC) 2016 in Denver, Colorado. I was invited to give an industry talk, discussing my Bring Your Own Dilemma paper from last March (touching briefly on the Out Of Box Exploitation paper from May). Instead of just flying in […]

Week 27 In Review – 2016

Resources

Exploring and exploiting Lenovo firmware secrets – blog.cr4.sh
Hi, everyone! In this article I will continue to publish my research of Lenovo ThinkPad’s firmware. Previously I shown how to discover and exploit SMM callout vulnerabilities on example of SystemSmmAhciAspiLegacyRt UEFI driver 1day vulnerability. Also, I introduced a small toolkit called fwexpl that provides API for comfortable development of firmware exploits […]