Blog

/Blog/

Week 2 In Review – 2016

Events Related 32C3 Recap – Part1 - www.insinuator.net Every year a group of us are happy to use the holidays to travel to Hamburg to meet other people and learn something new at the 32C3. Tools Kali NetHunter 3.0 Released - www.offensive-security.com NetHunter has been actively developed for over a year now, and  has undergone nothing [...]

Week 1 In Review – 2016

Events Related ICIT Brief: Who’s Behind the Wheel? Exposing the Vulnerabilities and Risks of High Tech Vehicles - icitech.org The brief provides a detailed breakdown of the July 2015 Jeep Cherokee hacking demonstration and an analysis of how hackers would behave during a ‘real-world’ attack Rapid Radio Reversing, ToorCon 2015 - greatscottgadgets.com In this video [...]

2017-03-12T17:39:18-07:00 January 3rd, 2016|Security Conferences, Site News, Week in Review|0 Comments

Week 52 In Review – 2015

Resources pentestpackage - github.com A package of Pentest scripts Tools JexBoss - Jboss Verify And Exploitation Tool - github.com JexBoss is a tool for testing and exploiting vulnerabilities in JBoss Application Server. DVNA - github.com Damn Vulnerable Node Application (DVNA) is a Node.js web application that is damn vulnerable. Its intended purpose is to teach [...]

Week 51 In Review – 2015

Resources Unofficial Guide to Mimikatz & Command Reference - adsecurity.org This page details as best as possible what each command is, how it works, the rights required to run it, the parameters (required & optional), as well as screenshots and additional context (where possible). Index of /docs/Slides/2015 - deepsec.net CVE-2015-8446 (Flash up to 19.0.0.245) And [...]

Week 50 In Review – 2015

Events Related DEFCONConference - www.youtube.com DefCamp 2015 - def.camp Resources Zero Nights - 2015.zeronights.org CheatSheets - github.com Cheat sheets for various projects I contribute to (PowerView, PowerUp, and Empire). Techniques Introduction to Modbus TCP traffic - www.vanimpe.eu Modbus is a serial communication protocol. It is the most widespread used protocol within ICS. It works in a [...]

Week 49 In Review – 2015

Events Related 2015 - Talks - bsidesvienna.at Botconf 2015 The first keynote slot was assigned to Margarita Louca from Europol: “Successful botnets takedowns: The good-cooperation part”. More precisely, it’s the EC3 (“European Cyber Crime Center“). This talk was flagged as “restricted” and not all information will be reported here. Botconf 2015 Wrap-Up Day #1 - blog.rootshell.be Botconf [...]

Week 48 In Review – 2015

Events Related My SecTor Story: Root Shell on the Belkin WeMo Switch - www.tripwire.com Researchers from Tripwire were on hand to help attendees explore the world of IoT hacking. They brought with them a table full of devices ranging from routers to smart televisions. They also had a video demonstration of the exploitation of vulnerabilities in [...]

Week 47 In Review – 2015

Techniques Kaspersky Antivirus Certificate handling path traversal - code.google.com When Kaspersky https inspection is enabled, temporary certificates are created in %PROGRAMDATA% for validation. I observed that the naming pattern is {CN}.cer. Breaking into and Reverse Engineering iOS Photo Vaults - blog.ioactive.com For whatever reason, a lot of people store risqué pictures on their devices. Why [...]