Blog

/Blog/

Week 50 in Review – 2012

Event Related Legal Merits of 'Hack Back' Strategy - bankinfosecurity.com From point-of-sale hacks to malware and DDoS attacks, the top cyberthreats of 2012 have been aggressive and strong. Is it time for organizations to adopt a "hack back" strategy against perceived attackers? Resources Mitigating Targeted Attacks on Your Organization - blogs.technet.com The Trustworthy Computing blog [...]

Week 49 in Review – 2012

Event Related SANS SANS SEC642: Advanced Web App Penetration Testing and Ethical Hacking (review) - blog.c22.cc After taking a year off from SANS London (a trip to Colombia was too much to resist last year), I flew back over to sunny London (ha) to attend the new SEC642: Advanced Web App Penetration Testing class with [...]

Week 48 in Review – 2012

Event Related Hacker Internship - nds.ruhr-uni-bochum.de Web applications are in the age of Web 2.0 increasingly become the target of attackers. Thus no problem SQL injection foreign databases are compromised, stolen by XSS vulnerability browser sessions and via cross-site request forgery you get from one day to the countless new friends in a social network. [...]

2017-03-12T17:39:43-07:00 December 3rd, 2012|Security Conferences, Security Tools, Week in Review|0 Comments

Week 47 in Review – 2012

Event Related DOAG 2012: Best of Oracle Security 2012 - blog.red-database-security.com Yesterday I gave a presentation ”Best of Oracle Security 2012” at the DOAG 2012 conference in Nürnberg. Resources cfbackdoor - gironsec.com This is a text file. Tools Util Util - Windows Handles Viewer (Simple GUI with REPL) v1.0.exe - diniscruz.blogspot.com Based on the Util [...]

2017-03-12T17:39:43-07:00 November 26th, 2012|Security Conferences, Security Tools, Week in Review|0 Comments

Week 46 in Review – 2012

Resources VulnVoIP (Vulnerable VoIP) - The Fundamentals of VoIP Hacking - rebootuser.com VulnVoIP is based on a relatively old AsteriskNOW distribution and has a number of weaknesses. The aim is to locate VoIP users, crack their passwords and gain access to the Support account voicemail. Owning Computers Without Shell Access - accuvant.com What’s This All [...]

Week 45 in Review – 2012

Event Related OWASP OWASP AppSec 2012 Presentation: SQL Server Exploitation, Escalation, and Pilfering - netspi.com During this presentation attendees will be introduced to lesser known, yet significant vulnerabilities in SQL Server implementations related to common trust relationships, misconfigurations, and weak default settings. XSS & CSRF with HTML5 - Attack, Exploit and Defense - shreeraj.blogspot.com HTML5 [...]

Week 44 in Review – 2012

Event Related Hashdays Hashdays Wrap-up Day #1 - blog.rootshell.be I’m in Luzern for a few days but the Hashdays security conference started today! w00t! This is the first edition for me. A very nice opening session performed by the defcon-switzerland group which organises this event. Hashdays Wrap-Up Day #2 - blog.rootshell.be Yesterday evening, I went [...]

Week 43 in Review – 2012

Event Related ToorCon ToorChat - github.com A Chat Program for use with the ToorCon 2013 badge. ToorCon Presentation - brightmoonsecurity.com Thanks for attending my Toorcon Presentation. Below are links to my presentation and the references I mentioned in the talk. Please let me know if you have any recommendations on course materials. ToorCon Presentation - [...]