Week 33 In Review – 2014

Events Related

Def Con 22

DEFCON 22: The Con That Keeps on Giving – lunalindsey.com
Luna Lindsey is redefining the conference experience. She had an amazing time this year, as always. But as a neophile, she crave new experiences.
Def Con: the ‘Olympics of hacking’ – www.ft.com
Welcome to Def Con, the Olympics of hacking, where for 21 years computer hackers […]

Week 31 In Review – 2014


REcon 2014 Videos – recon.cx
REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. Here is the index of REcon 2014 videos. Watch and download the videos from here.
RVAsec 2014 Videos – rvasec.com
Miss a talk or even the entire conference? No problem! All of the speaker videos and presentations are […]

Week 20 In Review – 2014


Infiltrate 2014 – shadow-file.blogspot.com
Here are some additional resources of Zach Cutlip that may have mentioned in his Infiltrate 2014 presentation.
BlueHat Security Briefings: Fall 2013 Sessions – channel9.msdn.com
The 2013 BlueHat Security Briefings took place on the Microsoft campus in December 2013. Here are the list of talks and discussions.


mimikatz 2.0 alpha 20140519 – github.com
You can download this new […]

Week 18 In Review – 2014


BSides Chicago 2014 Videos – www.irongeek.com
These are the videos from the BSides Chicago conference. You can watch and download all the videos from here.
Q1 2014 Mobile Threat Report – www.f-secure.com
f-secure’s Mobile Threat Report for Q1 2014 is out! Here’s a couple of the things they cover in it.


Egress Testing using PowerShell – labofapenetrationtester.com
Imagine that you pwned a […]

Week 17 In Review – 2014


Verizon Data Breach Investigations Report – verizonenterprise.com
The 2014 Data Breach Investigations Report (DBIR) casts new light on threats — taking 10 years of forensic data and finding that 92% of these can be categorized into nine basic attack patterns. This approach also helps identify primary threats to your industry, which you can analyze to reinforce […]

Week 11 In Review – 2014

Events Related

Pwn2Own 2014: A recap – hp.com
Two record-setting days of payouts for zero-day vulnerabilities brought the 2014 Pwn2Own contest tantalizingly close to the first million-dollar competition, with $850,000 paid to eight entrants. $385,000 of potential prize money remained unclaimed.

Researchers pocket record $400K at Pwn2Own hacking contest’s first day – computerworld.com
Researchers on Wednesday cracked Microsoft’s Internet Explorer […]

Week 10 In Review – 2014


Forgot your Windows admin password? – ogostick.net
This is a utility to reset the password of any user that has a valid local account on your Windows system. Finally! A very major release!
TrustyCon Videos Available – makehacklearn.org
You can find the playlist of all of the videos in Al Jigong Billings YouTube channel but He also […]

March 10th, 2014|Security Tools, Security Training, Vendor News, Week in Review|0 Comments

Week 8 In Review – 2014

Events Related

Course Review: Offensive Security AWE (Advanced Windows Exploitation) – www.ethicalhacker.net
In terms of training, Offensive Security is best known for their Pentesting with BackTrack/Kali (PWK) and Cracking the Perimeter (CTP) courses. The course was delivered by its creators, Matteo Memelli and Devon Kearns. Matteo handled all of the speaking responsibilities, and Devon apparently participated solely […]

Week 6 In Review – 2014


Why PLCpwn Is Important for ICS Cyber Weapons – www.digitalbond.com
The interesting question is what happens when organizations and governments stumble across one of these deployed attack systems and covert channels?

S4x14 Video: Stephen Hilt on PLCpwn -digitalbond.com

Cheat Sheets – packetlife.net
Here are Cheet sheets by packetlife. You can download all from here.
OWASP Cheat Sheet Series – owasp.org
The OWASP Cheat Sheet […]

Week 2 In Review – 2014

Events Related

Why we have to boycott RSA – blog.erratasec.com
The reason isn’t that Robert Graham is upset at RSA, or think that they are evil. He thinks RSA was mostly tricked by the NSA instead of consciously making the choice to backdoor their products.


Stupid IDN Tricks: Unicode Combining Characters – blog.dinaburg.org
Safari will display Unicode combining diacritical marks […]