- DEFCON posts
- Hacking the DefCon 17 Badges – wired.com
- DefCon 17 Mystery Challenge – wired.com
- Inside the World’s Most Hostile Network – wired.com
- BlackHat Posts
- A few Black Hat USA 2009 talks are available now – mcgrewsecurity.com
- BlackHat 2009 Day 2 – Bruce “Reconceptualizing” – chuvakin.blogspot.com
- All Around My (Black) Hat – h-online.com
- Blackhat, software, developers, and attacks – digitalbond.com
- Black Hat 2009 SSL Review: More Tricks For Defeating SSL In Practice (Moxie Marlinspike) – ivanristic.com
- Black Hat 2009 SSL Review: Black Ops of PKI (Dan Kaminsky) – ivanristic.com
- Black Hat 2009 SSL Review: Breaking the Myths of Extended Validation SSL Certificates (Alexander Sotirov and Mike Zusman) – ivanristic.com
- BlackHat 2009 Inspired – On Media Whoring – chuvakin.blogspot.com
- Blue Team Playbook – pauldotcom.com
It seems to me that every CTF/REBL event the Blue Team gets a bunch of un-patched systems.
- BITS Shared Assessments – Useful or Not – infosecalways.com
Is this another useless assessment methodology, great idea, or a platform for vendors to sell products?
- Louisville Metro InfoSec Conference – louisvilleinfosec.com
The official site of this Kentucky security event.
- Offensive Computing Twitter OComputing – offensivecomputing.net
Follow OComputing for all the malware and reverse engineering 140 characters can handle.
- Stoned Bootkit – stoned-vienna.com
Stoned Bootkit is a new Windows bootkit loaded before Windows starts and is memory resident thus Stoned gains access to the entire system.
- ViewStateViewer: A GUI Tool for deserializing/reserializing ViewState – neohapsis.com
ViewStateViewer seamlessly integrates into the Fiddler workflow, allowing a user to manipulate it just as they would any other variable in a HTTP request.
- Morpheus Beta – sourceforge.net/projects/morpheus-fwknop/
Morpheus is a windows client for fwknop, the Single Packet Authorization System.
- FakeIKEd v0.0.5 – roe.ch
Fiked can impersonate a VPN gateway’s IKE responder in order to capture XAUTH login credentials.
- Update: PDFiD Version 0.0.8 – didierstevens.com
The update packs in Flash detection in PDFs, new date format and more.
- Backtrack 4. MSF – Part 1 – synjunkie.blogspot.com
Using Backtrack and Metasploit together can lead to exciting results.
- A Beta Version of NPing has been released – professionalsecuritytesters.org
It generates network packets of a wide range of protocols, letting users to tune virtually any field of the protocol headers.
- Creating HTML Listeners with JSReg and Hackvertor – thespanner.co.uk
A proof of concept put together using JSReg and Hackvertor
- SSLSniff V0.6 – thoughtcrime.org
It is designed to MITM all SSL connections on a LAN and dynamically generates certs for the domains that are being accessed on the fly.
- UC Sniffer 2.4 – sourceforge.net/projects/ucsniff/
A VoIP Sniffer and security tool with some new features!
- Websecurify – websecurify.com
Websecurify automatically identifies web application vulnerabilities by using advanced discovery and fuzzing technologies.
- iKAT Linux 2.0 – ikat.ha.cked.net
iKAT is designed to provide access to the underlying operating system of a Kiosk terminal by invoking native OS functionality.
- Findbugs v1.3.9-RC1 – findbugs.sourceforge.net
FindBugs™ looks for instances of “bug patterns” and errors in Java programs.
- NetCut v2.0.8 – arcai.com
Basically NetCut is a tool that helps you admin your network by purely on ARP protocol.
- Quick Oracle/MSF Notes – carnal0wnage.attackresearch.com
A couple of notes on the Metasploit Oracle mixin.
- “Death of Anonymous Travel” – philosecurity.org
For security purposes, the public is generally not provided with detailed information about the management and use of mass surveillance systems.
- Defcon 17 Slides, Demos and Tools – notsosecure.com
A demo on exploiting PL/SQL injections, exploiting Oracle using Bsqlbf and Oracle SQL Worm POC
- Researchers Hack IP Video – darkreading.com
Researchers from Viper Lab showed how a criminal could tamper with an IP video surveillance system to cover up a crime.
- Moxie Marlinspike on SSL Attacks – threatpost.com
Dennis Fisher talks with researcher Moxie Marlinspike about the innovative research on attacking the inherent weaknesses in the SSL infrastructure.
- SMBEnum – ha.ckers.org
A way to enumerate certain types of files on Windows from within Internet Explorer.
- BlackHat 2009 and Defcon 17: EV SSL MITM Demo – schmoil.blogspot.com
The demo shows a MITM using a regular SSL certificate to intercept data sent to a site protected with an EV SSL certificate.
- Black Hat: PKI Hack Demonstrates Flaws in Digital Certificate Technology – darkreading.com
Researcher Dan Kaminsky illuminates flaws in X.509 authentication.
- ‘MonkeyFist’ Launches Dynamic CSRF Web Attacks – darkreading.com
Researchers release tool that automates cross-site request forgery attacks.
- Researcher Exposes Flaws In Certificate Authority Web Applications – darkreading.com
SSL certificate validation process easy “to game,” he says.
- BlackHat presentation demo vids: SalesForce ClickJacking – sensepost.com
The implication is that business-critical services and infrastructure maybe at risk due to a web developer’s mistake.
- BlackHat presentation demo vids: SugarSync – sensepost.com
In the following set of videos, we show how an attacker can generate a huge number of password reset links.
- BlackHat presentation demo vids: SalesForce Sifto – sensepost.com
Our proof-of-concept was to port Nikto into a Force.com application, and we named it Sifto.
- BlackHat presentation demo vids: Amazon – sensepost.com
This video demonstrates three separate attacks against EC2 that permit an attacker to boot up massive numbers of machines, steal computing time/bandwidth from other users and steal paid-for AMIs.
- BlackHat presentation demo vids: MobileMe – sensepost.com
This final installment showcases weaknesses in the password reset feature for Apple’s MobileMe service as well as publicizing an XSS vulnerability in the application.
- Release of the Tor Backdoor – carnal0wnage.attackresearch.com
I hope people find it useful, if nothing else as a place to start for a more robust backdoor.
- Switch hardening on your network – isc.sans.org
Badly configured switches and internal routers are almost as common as blank SA passwords on MSSQL databases.
- Security Reputation Monitoring – hexesec.wordpress.com
A client had recently had their web site scraped and placed under a similar domain.