Security Tools

/Security Tools

Week 29 In Review – 2014

Resources BGA talk slides – twitter.com Marshall twitted his BGA talk slides on twitter. You can download the pdf from here. Building a Modern Security Engineering Organization – slideshare.net Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes. Car Hacker's [...]

Week 28 In Review – 2014

Resources Vendor Checklist app / Trust Metric app – archon.thewatchers.net ISECOM (the Institute for Security and Open Methodologies) began with the release of the OSSTMM, the Open Source Security Testing Methodology Manual. It was a move to improve how security was tested and implemented. Dumping Data from Memcached Servers – breenmachine.blogspot.com Memcached servers provide a dynamic, distributed [...]

Week 27 In Review – 2014

Black Hat USA Briefings Giveaway Enter to win an Black Hat USA 2014 Briefings ticket worth $2,2000 from Infosec Events Events Related School on Applications of Open Spectrum and White Spaces Technologies - Schedule – wireless.ictp.it ICTP School on Applications of Open Spectrum and White Spaces Technologies - 2014 workshop schedule is available here. You can [...]

Week 25 In Review – 2014

Resources Circle City Con 2014 Videos – www.irongeek.com These are the Circle City Con 2014 videos. You can watch and download all of the recordings from here. OWASP Security Shepherd – owasp.org Security Shepherd has been implemented with the aim of fostering and improving security awareness among a varied skill-set demographic. This project enables users to learn [...]

Week 24 In Review – 2014

Resources CySCA2014-in-a-Box – cyberchallenge.com.au CySCA2014-in-a-Box is a Virtual Machine that contains most of the challenges faced by players during CySCA2014. It allows players to complete challenges in their own time, to learn and develop their cyber security skills. From a Username to Full Account Takeover – blog.spiderlabs.com Usernames, email addresses and phone numbers are invaluable pieces of [...]

Week 21 In Review – 2014

Resources BSides Nashville 2014 Videos – www.irongeek.com These are the videos of BSides Nashville 2014. You can download the videos from here. Powershell's Pastebin – pastebin.com Pastebin is #1 paste tool. Here is a list of Powershell's pastebin. 2014 Trustwave Global Security Report Available Now – blog.spiderlabs.com Trustwave released their annual 2014 Trustwave Global Security Report, an analysis [...]

Week 20 In Review – 2014

Resources Infiltrate 2014 – shadow-file.blogspot.com Here are some additional resources of Zach Cutlip that may have mentioned in his Infiltrate 2014 presentation. BlueHat Security Briefings: Fall 2013 Sessions – channel9.msdn.com The 2013 BlueHat Security Briefings took place on the Microsoft campus in December 2013. Here are the list of talks and discussions. Tools mimikatz 2.0 alpha 20140519 – [...]

Week 19 In Review – 2014

Resources Web security tricks – bugscollector.com Bugs Collector is a database of web security breaches and tricks collected from all over the world. Tricks are available here. ShowMeCon 2014 Videos – irongeek.com These are the videos of ShowMeCon 2014. You can watch and download all the videos from here. LayerOne 2013 – layerone.org Archives of the videos of [...]

Week 17 In Review – 2014

Resources Verizon Data Breach Investigations Report – verizonenterprise.com The 2014 Data Breach Investigations Report (DBIR) casts new light on threats — taking 10 years of forensic data and finding that 92% of these can be categorized into nine basic attack patterns. This approach also helps identify primary threats to your industry, which you can analyze to [...]

Week 16 In Review – 2014

Events Related Highlights from the SyScan 2014 Conference – symantec.com David Maciejak recently attended the Symposium on Security for Asia Network (SyScan), an annual conference held in Singapore, which brings together computer security researchers from around the world. This year, security myths were dispelled and several interesting topics were discussed at the conference. The following is [...]