christine

/christine

About christine

This author has not yet filled in any details.
So far christine has created 104 blog entries.

Week 47 In Review – 2016

Events Related BSides DC 2016 - Opening - www.youtube.com Alex Norman does what Alex Norman does best. Open the con. Inspirational, motivational and most importantly... short. AppSecUSA 2016 - www.youtube.com Recordings from AppSecUSA 2016 in Washington, DC Highlights from the O'Reilly Security Conference in Amsterdam 2016 - www.oreilly.com Watch highlights covering security, defense, tools, and [...]

Week 46 In Review – 2016

Resources Security Conference - conferences.oreilly.com Speaker slides & videos Techniques Nintendo Classic Mini Family Talk of computer contents - translate.google.com As the person who disassembled it released before it was released. Interest in contents has been increased, but in this article I would like to drill down to a bit more detail. When CSI meets [...]

Week 45 In Review – 2016

Resources Ruxcon - ruxcon.org.au Presentation Slides from Ruxcon Australia BlackHat Europe 2016 - www.blackhat.com Techniques Kerberoasting Without Mimikatz - www.harmj0y.net Thanks to an awesome PowerView pull request by @machosec, Kerberoasting is easier than ever using pure PowerShell. I wanted to briefly cover this technique and its background, how we’ve been using it recently, and a few awesome new developments. [...]

Week 44 In Review – 2016

Events Related Charlie Miller Keynote, Automotive Security: A Hacker's Eye View - www.youtube.com The security of today's vehicles involves many moving parts, but while manufactures take a majority of the blame, multiple parties contribute to the security debt in today's vehicle ecosystem. This keynote takes a deep dive into automotive security, current attacks and vulnerabilities, [...]

Week 43 In Review – 2016

Events Related Hack.lu I’m back to Luxembourg for a new edition of hack.lu. In fact, I arrived yesterday afternoon to attend the MISP summit. It was a good opportunity to meet MISP users and to get fresh news about the project. Hack.lu 2016 Wrap-Up Day #1 - blog.rootshell.be Hack.lu 2016 Wrap-Up Day #2 - blog.rootshell.be Hack.lu 2016 [...]

Week 42 In Review – 2016

Resources Published "SecDevOps Risk Workflow" Book (v0.57) - blog.diniscruz.com I just published version v0.57 of the (previously called) Jira Risk Workflow book. Vulnerabilities These 60 dumb passwords can hijack over 500,000 IoT devices into the Mirai botnet - www.grahamcluley.com Mirai has become infamous in recent weeks after blasting the website of security blogger Brian Krebs off the [...]

2017-03-12T17:39:11-07:00 October 16th, 2016|Security Vulnerabilities, Site News, Week in Review|1 Comment

Week 41 In Review – 2016

Events Related GrrCON 2016 Videos - irongeek.com These are the videos of the presentations from GrrCON 2016. Videos from the DHS Cyber Security Division (CSD) workshop earlier this year - voipsecurityblog.typepad.com Here are a couple of links to the Department of Homeland Security (DHS) Cyber Security Division (CSD) showcase earlier this year. They did a great [...]

Week 39 In Review – 2016

Resources RECON 2016 Recon Recordings - recon.cx Recon Slides - recon.cx Derbycon 2016 Videos - www.irongeek.com These are the videos of the presentations from Derbycon 2016. Louisville Infosec 2016 Videos - www.irongeek.com Videos from the Louisville Infosec 2016 conference. R00tz 2016 - r00tz.org Tools PowerShell-Suite - github.com Bypass-UAC is self-contained and does not have any dependencies, bar a [...]

2017-03-12T17:39:11-07:00 September 25th, 2016|Security Conferences, Security Tools, Week in Review|0 Comments

Week 38 In Review – 2016

Events Related BSides Augusta 2016 Videos - www.irongeek.com These are the videos from the BSides Augusta conference. Resources Long Secret Stingray Manuals Detail How Police Can Spy On Phones - theintercept.com The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet. Techniques Reprogramming the Defcon 24 badge [...]