Blog

/Blog/

Week 39 In Review – 2014

Resources (IN)Secure Magazine issue 43 (September 2014) available – net-security.org (IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. You can download it now. A Guide to Gary McGraw's AppsecUSA Keynote – cigital.com Here is a quick guide to the key ideas in the talk. Hope you find this [...]

Week 38 In Review – 2014

Events Related A first-timers view of the “Hacker Summer Camp” – blog.c22.cc The big "Hacker Summer Camp" took place in Las Vegas this August. This get-together describes the occasion of Black Hat, for the Business sponsored InfoSec employee, BSides Las Vegas, for the techies, and DEF CON, which apparently became object of both type of folks [...]

Week 37 In Review – 2014

Events Related ArchC0n ’14 Report – www.digitalbond.com Dale Peterson spoke at the inaugural ArchC0n in St. Louis this Saturday. The main reason he chose to go to this IT security event was they had Richard Bejtlich, Bruce Schneier and Charlie Miller as keynotes. Quite a haul for the first run. Here are some of the items [...]

Week 36 In Review – 2014

Resources iCloud keychain and iOS 7 Data Protection – slideshare.net If you are concerned about cloud security, read this presentation by Andrey Belenko Sr. Security Engineer @ viaForensics and Alexey Troshichev @hackappcom founder. Leveraging WMI for shells – secabstraction.com secabstraction always try to think about how he might get something done by leveraging WMI, since it's usually [...]

Week 35 In Review – 2014

Resources InfowarCon TV – infowarcon.com Here are some of the amazing talks given in January. InfowarCon TV highly suggest you listen to them all; lots of great information, questions, and demonstrations about the most important issues facing us today. Shakacon LLC – www.youtube.com Shakacon, an Information Technology (IT) Security Conference. Here are some of the talks at [...]

2017-03-12T17:39:29-07:00 September 1st, 2014|Security Training, Security Vulnerabilities, Week in Review|0 Comments

Week 34 In Review – 2014

Events Related USENIX Security '14 Technical Sessions – usenix.org The full Proceedings published by USENIX for the symposium are available for download here. Individual papers can also be downloaded from the presentation page. WOOT '14 Workshop Program -usenix.org The full papers published by USENIX for the workshop are available for download as an archive or individually below. [...]

Week 33 In Review – 2014

Events Related Def Con 22 DEFCON 22: The Con That Keeps on Giving – lunalindsey.com Luna Lindsey is redefining the conference experience. She had an amazing time this year, as always. But as a neophile, she crave new experiences. Def Con: the ‘Olympics of hacking’ – www.ft.com Welcome to Def Con, the Olympics of hacking, where for [...]

Week 32 In Review – 2014

Resources Introducing LiveDump.exe – crashdmp.wordpress.com Microsoft has added back the ability to dump physical memory to disk (in the form of a dump file) from user mode via NtSystemDebugControl. Sippy wrote a quick proof-of-concept tool and generated what appears to be a 250mb kernel bitmap dump. About the USB Descriptor Collection – usbdescriptors.com This site tries to [...]

2017-03-12T17:39:30-07:00 August 12th, 2014|Security Tools, Security Vulnerabilities, Week in Review|0 Comments