Site News

/Site News

Week 50 In Review – 2014

Resources Free eBook Download, Getting Started with OpenBTS – openbts.org The new OpenBTS book is being made available for free! Fill in your name and e-mail address and they'll send you a DRM-free PDF of the book. Nosuchcon 2014-Live stream – nosuchcon.org Here are a List of HLS streams available. Open with VLC, mplayer, a browser on [...]

Week 45 In Review – 2014

Resources Secure messaging scorecard – eff.org Many companies offer “secure messaging” products—but are these systems actually secure? EFF decided to find out, in the first phase of a new EFF Campaign for Secure & Usable Crypto. Google Study: Email Users 36 Times More Likely To Get Scammed If Friends’ Accounts Get Hacked – consumerist.com So you think [...]

Week 44 In Review – 2014

Events Related Inside BlackHat Europe 2014 – blog.fortinet.com The conference started with Adi Shamir's keynote. Axelle Apvrille was really happy to listen to such a brilliant mind like Adi Shamir. In this blog post, Axelle has given his personal opinion on some of the best talks he attended. Resources Social-Engineer, Inc. Releases Annual Report on DEF [...]

Week 41 In Review – 2014

Resources nullcon Goa 2014: Pentesting Proprietary RF Communications by Justin Searle – youtube.com This talk will demonstrate practical techniques to identify, assess, and exploit a subclass of control systems found in your companies that use proprietary RF communications, such as fire alarms, proximity cards, automotive security gates, car alarms, conference rooms, and building automation systems. The [...]

2017-03-12T17:39:29-07:00 October 13th, 2014|Security Vulnerabilities, Site News, Week in Review|0 Comments

Week 36 In Review – 2014

Resources iCloud keychain and iOS 7 Data Protection – slideshare.net If you are concerned about cloud security, read this presentation by Andrey Belenko Sr. Security Engineer @ viaForensics and Alexey Troshichev @hackappcom founder. Leveraging WMI for shells – secabstraction.com secabstraction always try to think about how he might get something done by leveraging WMI, since it's usually [...]

Information Security Twitter Lists

I’m not sure about yourself, but for me I find it hard to consume information from the twitter fire hose which is why they created the lists feature. Looking around there are several lists made for information security only people, but those lists were big and only slightly reduced the noise. Over the weekend I [...]

2017-03-12T17:39:30-07:00 July 14th, 2014|Site News|0 Comments

Week 13 In Review – 2014

Resources iOS Application Security Part 32 - Automating Tasks With iOS Reverse Engineering Toolkit (iRET) – highaltitudehacks.com In this article, we will talk about a new tool named iOS Reverse Engineering Toolkit (iRET) that has just been released to assist penetration testers in automating most of the tasks involved in a iOS penetration test. The project [...]

Week 4 In Review – 2014

Events Related Counter-confab TrustyCon to host speakers boycotting RSA Conference – news.cnet.com A new conference focusing on issues of "trust" at the intersection of privacy and security will take place during RSA's annual show. Resources ShmooCon Firetalks 2014 – www.irongeek.com These are the videos for the ShmooCon Firetalks 2014. Free Tools: The Best Free Tools of 2013? – [...]

Week 3 In Review – 2014

Resources Smart LSA Secrets Module – hackwhackandsmack.com Doug decided to take two modules and crash them together to add some automation to some tasks that he seem to pick up often. He took the LSA Secrets module and the Domain Group Enum module and combined them to be one module. Symantec Intelligence Report: December 2013 – symantec.com [...]

Week 1 In Review – 2014

Resources Phishing Frenzy: Installing the Monster – pentestgeek.com If you’re not a rails guru or haven’t ever dabbled with ruby on rails, the installation process might seem overwhelming. Zeknox created this helpful video which follows the newly created wiki on how to get up and running with PF on Kali linux. 30c3: To Protect And Infect, [...]