Security Tools

/Security Tools

Week 43 In Review – 2014

Events Related Hack.lu 2014 Wrap-Up Day #1 – blog.rootshell.be After attending BlackHat last week in Amsterdam, Xavier is now in Luxembourg until Friday to attend the 10th edition of Hack.lu. here is Xavier’s wrap-up for the first day. As usual, the first day started via a first bunch of workshops. Hack.lu 2014 Wrap-Up Day #2 – blog.rootshell.be [...]

Week 42 In Review – 2014

Events Related BlackHat Europe 2014 Wrap-Up Day #1 – blog.rootshell.be BlackHat is back in Amsterdam and here is Xavier's wrap-up for the first day. The day started with the Adi Shamir’s keynote and some crypto. BlackHat Europe 2014 Wrap-Up Day #2 – blog.rootshell.be Here is Xavier's small wrap-up for the second BlackHat day. His first choice was [...]

Week 40 In Review – 2014

Resources SLouisville Infosec 2014 Videos – irongeek.com Here are the videos from the Louisville Infosec 2014 conference. You can download the videos from here. Derbycon 2014 Videos – irongeek.com These are the videos of the presentations from Derbycon 2014. You can watch and download the videos from here. Shellshocker! – Episode 029a – in-security.org You might have head [...]

Week 38 In Review – 2014

Events Related A first-timers view of the “Hacker Summer Camp” – blog.c22.cc The big "Hacker Summer Camp" took place in Las Vegas this August. This get-together describes the occasion of Black Hat, for the Business sponsored InfoSec employee, BSides Las Vegas, for the techies, and DEF CON, which apparently became object of both type of folks [...]

Week 36 In Review – 2014

Resources iCloud keychain and iOS 7 Data Protection – slideshare.net If you are concerned about cloud security, read this presentation by Andrey Belenko Sr. Security Engineer @ viaForensics and Alexey Troshichev @hackappcom founder. Leveraging WMI for shells – secabstraction.com secabstraction always try to think about how he might get something done by leveraging WMI, since it's usually [...]

Week 34 In Review – 2014

Events Related USENIX Security '14 Technical Sessions – usenix.org The full Proceedings published by USENIX for the symposium are available for download here. Individual papers can also be downloaded from the presentation page. WOOT '14 Workshop Program -usenix.org The full papers published by USENIX for the workshop are available for download as an archive or individually below. [...]

Week 33 In Review – 2014

Events Related Def Con 22 DEFCON 22: The Con That Keeps on Giving – lunalindsey.com Luna Lindsey is redefining the conference experience. She had an amazing time this year, as always. But as a neophile, she crave new experiences. Def Con: the ‘Olympics of hacking’ – www.ft.com Welcome to Def Con, the Olympics of hacking, where for [...]

Week 32 In Review – 2014

Resources Introducing LiveDump.exe – crashdmp.wordpress.com Microsoft has added back the ability to dump physical memory to disk (in the form of a dump file) from user mode via NtSystemDebugControl. Sippy wrote a quick proof-of-concept tool and generated what appears to be a 250mb kernel bitmap dump. About the USB Descriptor Collection – usbdescriptors.com This site tries to [...]

2017-03-12T17:39:30-07:00 August 12th, 2014|Security Tools, Security Vulnerabilities, Week in Review|0 Comments

Week 31 In Review – 2014

Resources REcon 2014 Videos – recon.cx REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. Here is the index of REcon 2014 videos. Watch and download the videos from here. RVAsec 2014 Videos – rvasec.com Miss a talk or even the entire conference? No problem! All of the speaker videos [...]

Week 30 In Review – 2014

Resources BSides Cleveland 2014 Videos – irongeek.com These are the videos from the Bsides Cleveland conference. You can watch and download the videos from here. Dispelling Confusion and Myths: iOS Proof-of-Concept – zdziarski.com A quick POC demonstrating how File Relay and other services can be abused to dump a significant amount of personal data from an iOS [...]