Security Vulnerabilities

/Security Vulnerabilities

Week 51 In Review – 2014

Resources AthCon 2012 Slides & Notes – kingcope.wordpress.com Slides & notes for “Uncovering Zero-Days and advanced fuzzing” at AthCon 2012. You can download now from here. BalCCon2k14 – youtube.com BalCCon - Balkan Computer Congress 2014 videos are available now. You can watch and download the videos from here. Mass Scanning the Internet – DefCon 2014 (Talk Summary) – [...]

Week 50 In Review – 2014

Resources Free eBook Download, Getting Started with OpenBTS – openbts.org The new OpenBTS book is being made available for free! Fill in your name and e-mail address and they'll send you a DRM-free PDF of the book. Nosuchcon 2014-Live stream – nosuchcon.org Here are a List of HLS streams available. Open with VLC, mplayer, a browser on [...]

Week 49 In Review – 2014

Resources Using PowerShell for Client Side Attacks – abofapenetrationtester.com This blog post details everything that Nikhil Mittal spoke about at DeepSec plus much more. With this blog post, a newer version of Nishang with "Client" category of attacks is also being released. Lets have a look at the scripts one-by-one. Operation Cleaver – cylance.com The Operation Cleaver [...]

Week 48 In Review – 2014

Resources Cyberspectrum: Bay Area Software Defined Radio #1 (Nov 2014) HD – youtube.com A video of DSP topics relevant to implementation of simple software-defined radios. Focuses on visual explanations of fundamental manipulations of digital signals, including analytic signals, frequency shifting, sampling rates, filtering, and the discrete Fourier transform. Tools HDD firmware tools – github.com This repository contains [...]

Week 47 In Review – 2014

Resources SHack3rcon 5 Videos – irongeek.com Here are the videos from Hack3rcon^5. You can watch and download the videos from here. Let's Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools – motherboard.vice.com Last August, at Defcon, the hacker conference in Las Vegas, engineer and security researcher named Michael Ossmann stood on the stage of a lecture [...]

Week 46 In Review – 2014

Events Related Amazon Fire Phone, iPhone, Nexus 5, Samsung S5 All Popped At Mobile Pwn2Own – forbes.com A slew of the world’s most popular smartphones have been prized open at the Mobile Pwn2Own hacking contest in Tokyo, Japan this week. Hosted by the HP Zero Day Initiative, the competition offered up big cash prizes for those [...]

Week 45 In Review – 2014

Resources Secure messaging scorecard – eff.org Many companies offer “secure messaging” products—but are these systems actually secure? EFF decided to find out, in the first phase of a new EFF Campaign for Secure & Usable Crypto. Google Study: Email Users 36 Times More Likely To Get Scammed If Friends’ Accounts Get Hacked – consumerist.com So you think [...]

Week 44 In Review – 2014

Events Related Inside BlackHat Europe 2014 – blog.fortinet.com The conference started with Adi Shamir's keynote. Axelle Apvrille was really happy to listen to such a brilliant mind like Adi Shamir. In this blog post, Axelle has given his personal opinion on some of the best talks he attended. Resources Social-Engineer, Inc. Releases Annual Report on DEF [...]

Week 43 In Review – 2014

Events Related Hack.lu 2014 Wrap-Up Day #1 – blog.rootshell.be After attending BlackHat last week in Amsterdam, Xavier is now in Luxembourg until Friday to attend the 10th edition of Hack.lu. here is Xavier’s wrap-up for the first day. As usual, the first day started via a first bunch of workshops. Hack.lu 2014 Wrap-Up Day #2 – blog.rootshell.be [...]

Week 42 In Review – 2014

Events Related BlackHat Europe 2014 Wrap-Up Day #1 – blog.rootshell.be BlackHat is back in Amsterdam and here is Xavier's wrap-up for the first day. The day started with the Adi Shamir’s keynote and some crypto. BlackHat Europe 2014 Wrap-Up Day #2 – blog.rootshell.be Here is Xavier's small wrap-up for the second BlackHat day. His first choice was [...]