Security Training

/Security Training

Week 38 in Review – 2012

Event Related Columbus OWASP Meeting Presentation - stateofsecurity.com Last week, I presented at the Columbus OWASP meeting on defensive fuzzing, tampering with production web applications as a defensive tactic and some of the other odd stuff we have done in that arena. Charlie Miller & Dino Dai Zovi at CodenomiCON 2012: iOS Hacker's Update - [...]

Week 36 in Review – 2012

Resources Elderwood Project 'Elderwood' Crew, Tied to Google Aurora Attack, Targeting Defense, Energy, Finance Companies - threatpost.com The same team that attacked Google in the Aurora campaign in 2009 is still active and has been conducting a long-term campaign targeting defense contractors, financial services companies, energy companies, human rights organizations and government agencies using a [...]

Week 27 in Review – 2012

Event Related Layer One 2012 Security Conference - layerone.org All of the videos from the LayerOne 2012 security conference are now online! Check everything out on the 2012 Archives page. RECON 2012 – GPUS FOR MOBILE MALWARE, MITIGATION AND MORE - viaforensics.com The following presentation was delivered by Jared Carlson at REcon 2012 on June [...]

Week 19 in Review – 2012

Resources Research for SharePoint (MOSS) - owasp.org This page contains research notes on Microsoft's SharePoint MOSS and WSS MS SQL - Useful Stored Procedures for SQL Injection and Ports Info - pentesticles.com The following post lists and describes various useful stored procedures and port information for MS SQL. Portable Executable 101 - a windows executable [...]