Security Tools

/Security Tools

Week 12 In Review – 2015

Events Related Troopers15 Wrap-Up Day #1 – blog.rootshell.be This is Xavier's first Troopers conference. Here is the wrap-up for the first day of Troopers15. Before the review of the talks, a few words about the conference. The venue was really nice as well as the facilities. Troopers15 Wrap-Up Day #2 – blog.rootshell.be This is Xavier's wrap-up for [...]

Week 11 In Review – 2015

Resources A Primer on IoT Security Research – community.rapid7.com In this blog post Mstanislav'd like to give a high-level sense of what IoT security research often entails. TThis post is intended for the casual security researcher, or even IoT vendor, who wants to know what this research looks like, and where to get started. ElasticSearch CVE-2015-1427 [...]

Week 10 In Review – 2015

Resources A Visual Introduction to DSP for SDR – visual-dsp.switchb.org This is an animated slide deck providing a tour of digital signal processing topics relevant to implementation of software-defined radios, focusing on building visual/geometric intuition for signals. Anatomy of A Hack – theverge.com Partap Davis online life had been compromised. Read the full story here. A step-by-step [...]

Week 9 In Review – 2015

Resources BSides Tampa 2015 Videos – irongeek.com These are the videos from the BSides Tampa conference. You can watch and download the videos from here. Gemalto presents the findings of its investigations into the alleged hacking of SIM card encryption keys by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA) – gemalto.com The [...]

Week 8 In Review – 2015

Resources Equation Group: The Crown Creator of Cyber-Espionage – kaspersky.com Kaspersky Lab’s experts can confirm they have discovered a threat actor that surpasses anything known in terms of complexity and sophistication of techniques, and that has been active for almost two decades – The Equation Group. Russian researchers expose breakthrough U.S. spying program – reuters.com The U.S. [...]

Week 7 In Review – 2015

Resources Today I Am Releasing Ten Million Passwords – xato.net A carefully-selected set of data provides great insight into user behavior and is valuable for furthering password security. So Mark Burnett built a data set of ten million usernames and passwords that he is releasing to the public domain. BSides Huntsville 2015 Videos – irongeek.com These are [...]

Week 6 In Review – 2015

Resources OWASP Proactive Controls – owasp.org This document was written by developers for developers, to assist those new to secure development. It aims to guide developers and other software development professionals down the path of secure web application software development. Anthem-From the Desk of CEO To Members – anthemfacts.com Anthem was the target of a very sophisticated [...]

Week 5 In Review – 2015

Resources Army cyber defenders open source code in new GitHub project – army.mil Army cyber defenders released code to help detect and understand cyber attacks. The forensic analysis code called Dshell has been used, for nearly five years, as a framework to help the U.S. Army understand the events of compromises of Department of Defense networks. [...]

Week 4 In Review – 2015

Events Related Our Favorite Presentations from ShmooCon 2015 – researchcenter.paloaltonetworks.com Jen and Phil were fortunate to attend this year’s ShmooCon, an annual hacker conference held in Washington, DC. Here are the wrap up of the conference. Resources BSides Columbus 2015 Videos – irongeek.com hese are the videos from the BSides Columbus Ohio conference. You can watch and [...]

Week 3 In Review – 2015

Events Related Hou.Sec.Con 5.0 Experience (by an 8 year old) – prudentgames.com A 8 year old kid, Reuben Paul, share his feeling about Hou.Sec.Con 5.0 Experience! It was about qualities that kids and hackers share which makes kids really good hackers. For example kids are creative, kids are curious, kids are credible and kids are cool [...]