Blog

/Blog/

Week 34 In Review – 2016

Events Related Impressions From DEF CON 24: The Machines Are Rising - securityintelligence.com DEF CON 24, the world’s largest hacker conference, ended Aug. 7, and I must say I enjoyed every moment of it. There was so much to see in so little time; I definitely regret missing some great stuff that happened. Even so, [...]

Week 33 In Review – 2016

Events Related DefCon Event Council of 9 ventured forth to DEFCON 24 to compete in this year’s badge challenge, brought to us each year by 1o57. There was determination among the team to win at DC24 to ensure that last year’s win was not a fluke. After many sleepless nights in Vegas, we emerged victorious for [...]

Week 32 In Review – 2016

Events Related DARPA's Cyber Grand Challenge: Early Highlights from the Competition - www.youtube.com Early highlights from the world's first all-machine hacking tournament, DARPA's Cyber Grand Challenge (CGC). This computer security competition featured seven High Performance Computers as competitors. CGC took place on Thursday, August 4, 2016. Building the Workforce through Cybersecurity Competitions - www.whitehouse.gov The [...]

Week 31 In Review – 2016

Events Related The Security Summer Camp Talks I Want To See… - jerrygamblin.com I took some time tonight and read through the Security Summer Camp (BSidesLV, Blackhat and Defcon) schedules and picked the talks from this year that I think will be the best and that I do not want to miss. BlackHat/Def Con/BSides Talk Picks for 2016 [...]

Week 30 In Review – 2016

Tools Umap2 - github.com Umap2 is the second revision of NCC Group's python based USB host security assessment tool. Nmap 7.25BETA1 Released with our new Npcap driver, 6 new NSE scripts, and more! - nmap.org Nmap and Zenmap (the graphical front end) are available in several versions and formats. Recent source releases and binary packages [...]

2017-03-12T17:39:12-07:00 July 24th, 2016|Security Tools, Week in Review|0 Comments

Week 29 In Review – 2016

Events Related Converge 2016 Videos - www.irongeek.com These are the videos from the Converge Information Security Conference. BSides Detroit 2016 Videos - www.irongeek.com These are the videos from the BSides Detroit 2016 Conference. AppSecEU 16 - Abhay Bhargav - SecDevOps: A View from the Trenches - www.youtube.com Resources KeeThief – A Case Study in Attacking KeePass Part [...]

Week 28 In Review – 2016

Events Related USENIX Annual Technical Conference (ATC) 2016: The Best and Brightest Security Talks - duo.com I recently attended the USENIX Annual Technical Conference (ATC) 2016 in Denver, Colorado. I was invited to give an industry talk, discussing my Bring Your Own Dilemma paper from last March (touching briefly on the Out Of Box Exploitation paper from May). Instead of just flying [...]

Week 27 In Review – 2016

Resources Exploring and exploiting Lenovo firmware secrets - blog.cr4.sh Hi, everyone! In this article I will continue to publish my research of Lenovo ThinkPad’s firmware. Previously I shown how to discover and exploit SMM callout vulnerabilities on example of SystemSmmAhciAspiLegacyRt UEFI driver 1day vulnerability. Also, I introduced a small toolkit called fwexpl that provides API for comfortable development of firmware [...]