Security Conferences

/Security Conferences

DEFCON 16 Tools

Rob Fuller yesterday did an excellent guest post on the Zero Day ZDNet blog on the tools released at DEFCON 16. Here is the list of DEFCON 16 tools: Beholder: An open source wireless IDS program by Nelson Murilo and Luis Eduardo The Middler: The end-all be-all of MITM tools by Jay Beale ClientIPS: An [...]

2017-03-12T17:40:23-07:00 August 19th, 2008|Security Conferences, Security Tools|1 Comment

The Last HOPE Videos

Some videos from The Last Hope are now online via bittorrent. I hope more videos will come online soon, as many of the presentations sounded interesting. At the least, The Last Hope audio is all online at the offical The Last Hope site. Here is the list of videos currently being distributed: A Hacker's View [...]

2008-08-23T14:24:59-07:00 August 18th, 2008|Security Conferences|0 Comments

Updated DEFCON 16 Presentations

Because the presenters have to submit their slides before the conference (so they can make the presentation discs), often the slides are outdated by the time the conference comes around. Thankfully a few presenters are posting their updated slides online, and here is a list of those that did. NTLM is Dead by Kurt Grutzmacher [...]

2017-03-12T17:40:23-07:00 August 14th, 2008|Security Conferences|0 Comments

Black Hat USA Posts Carnival

Black Hat USA is over, and I think everyone is still in recovery mode. There were tons of presentations, and here are some posts from various people recapping the event. Once I recover, I will be posting my overall thoughts on the conference as well. Day 1: BlackHat 2008 LiveBlog: Day 1 by Security Monkey [...]

2017-03-12T17:40:23-07:00 August 12th, 2008|Security Conferences|0 Comments

MetaPost Exploitation Notes

Here are my notes from the Black Hat USA 2008 presentation called 'MetaPost Exploitation' by Val Smith and Colin Ames. The MetaPost Exploitation slides are now online, as well as demo movies at offensivecomputing.net. If you do any sort of enterprise level penetration testing, you should definitely check it out. Credential Management Wordpad and paper [...]

2017-03-12T17:40:23-07:00 August 10th, 2008|Security Conferences|0 Comments

Profiting From Business Logic Flaws

Yesterday Jeremiah Grossman and Trey Ford from WhiteHat Security gave a very interesting and fun presentation called 'Get Rich or Die Trying - Making Money on The Web, The Black Hat Way'. They went over several real world examples of business logic flaws, and in some cases profited (a lot) from those flaws. The Get [...]

2017-03-12T17:40:23-07:00 August 8th, 2008|Security Conferences|0 Comments

Extreme Client Side Exploitation Notes

Here are my notes from the Black Hat USA 2008 presentation called 'The Internet is Broken: Beyond Document.Cookie - Extreme Client Side Exploitation' by Nathan McFeters, John Heasman, and Rob Carter. GIFAR Hybrid .gif and .jar file .gif header is in the beginning of the file .jar header is in the end of the file [...]

2017-03-12T17:40:23-07:00 August 7th, 2008|Security Conferences|0 Comments

Dan Kaminsky’s DNS Presentation Carnival

Dan Kaminsky's Black Hat USA presentation was a bit different than what I was expecting, but it was still very interesting. Instead of going into details on the vulnerability, he spent the majority of time identifying the systems that would break if someone were able to manipulate the DNS system. He basically said that once [...]

2017-03-12T17:40:23-07:00 August 7th, 2008|Security Conferences|0 Comments