Week in Review

/Week in Review

Week 38 In Review – 2014

Events Related A first-timers view of the “Hacker Summer Camp” – blog.c22.cc The big "Hacker Summer Camp" took place in Las Vegas this August. This get-together describes the occasion of Black Hat, for the Business sponsored InfoSec employee, BSides Las Vegas, for the techies, and DEF CON, which apparently became object of both type of folks [...]

Week 37 In Review – 2014

Events Related ArchC0n ’14 Report – www.digitalbond.com Dale Peterson spoke at the inaugural ArchC0n in St. Louis this Saturday. The main reason he chose to go to this IT security event was they had Richard Bejtlich, Bruce Schneier and Charlie Miller as keynotes. Quite a haul for the first run. Here are some of the items [...]

Week 36 In Review – 2014

Resources iCloud keychain and iOS 7 Data Protection – slideshare.net If you are concerned about cloud security, read this presentation by Andrey Belenko Sr. Security Engineer @ viaForensics and Alexey Troshichev @hackappcom founder. Leveraging WMI for shells – secabstraction.com secabstraction always try to think about how he might get something done by leveraging WMI, since it's usually [...]

Week 35 In Review – 2014

Resources InfowarCon TV – infowarcon.com Here are some of the amazing talks given in January. InfowarCon TV highly suggest you listen to them all; lots of great information, questions, and demonstrations about the most important issues facing us today. Shakacon LLC – www.youtube.com Shakacon, an Information Technology (IT) Security Conference. Here are some of the talks at [...]

2017-03-12T17:39:29-07:00 September 1st, 2014|Security Training, Security Vulnerabilities, Week in Review|0 Comments

Week 34 In Review – 2014

Events Related USENIX Security '14 Technical Sessions – usenix.org The full Proceedings published by USENIX for the symposium are available for download here. Individual papers can also be downloaded from the presentation page. WOOT '14 Workshop Program -usenix.org The full papers published by USENIX for the workshop are available for download as an archive or individually below. [...]

Week 33 In Review – 2014

Events Related Def Con 22 DEFCON 22: The Con That Keeps on Giving – lunalindsey.com Luna Lindsey is redefining the conference experience. She had an amazing time this year, as always. But as a neophile, she crave new experiences. Def Con: the ‘Olympics of hacking’ – www.ft.com Welcome to Def Con, the Olympics of hacking, where for [...]

Week 32 In Review – 2014

Resources Introducing LiveDump.exe – crashdmp.wordpress.com Microsoft has added back the ability to dump physical memory to disk (in the form of a dump file) from user mode via NtSystemDebugControl. Sippy wrote a quick proof-of-concept tool and generated what appears to be a 250mb kernel bitmap dump. About the USB Descriptor Collection – usbdescriptors.com This site tries to [...]

2017-03-12T17:39:30-07:00 August 12th, 2014|Security Tools, Security Vulnerabilities, Week in Review|0 Comments

Week 31 In Review – 2014

Resources REcon 2014 Videos – recon.cx REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. Here is the index of REcon 2014 videos. Watch and download the videos from here. RVAsec 2014 Videos – rvasec.com Miss a talk or even the entire conference? No problem! All of the speaker videos [...]

Week 30 In Review – 2014

Resources BSides Cleveland 2014 Videos – irongeek.com These are the videos from the Bsides Cleveland conference. You can watch and download the videos from here. Dispelling Confusion and Myths: iOS Proof-of-Concept – zdziarski.com A quick POC demonstrating how File Relay and other services can be abused to dump a significant amount of personal data from an iOS [...]

Week 29 In Review – 2014

Resources BGA talk slides – twitter.com Marshall twitted his BGA talk slides on twitter. You can download the pdf from here. Building a Modern Security Engineering Organization – slideshare.net Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes. Car Hacker's [...]