Apple iOS

/Tag:Apple iOS

Week 49 In Review – 2016

Events Related BSidesLV - Recordings of Security BSides Las Vegas sessions, selected sessions of sister conferences and other Information Security related educational materials. BotConf 2016 This is already the fourth edition of the Botconf security conference, fully dedicated to fighting malware and botnets. Since the first edition, the event location changed every year and it allowed me [...]

Week 43 In Review – 2016

Events Related I’m back to Luxembourg for a new edition of In fact, I arrived yesterday afternoon to attend the MISP summit. It was a good opportunity to meet MISP users and to get fresh news about the project. 2016 Wrap-Up Day #1 - 2016 Wrap-Up Day #2 - 2016 [...]

Week 9 In Review – 2016

Resources USB HID/Fingerprint Reader that enters password if Fingerprint is correct - CCDC Quals Notes (metasploit) - Some quick notes for interesting stuff to keep for CCDC Quals/Notes Tools EZ-Wave - Tools for Evaluating and Exploiting Z-Wave Networks using Software-Defined Radios. firmadyne - FIRMADYNE is an automated and scalable system for [...]

Week 47 In Review – 2015

Techniques Kaspersky Antivirus Certificate handling path traversal - When Kaspersky https inspection is enabled, temporary certificates are created in %PROGRAMDATA% for validation. I observed that the naming pattern is {CN}.cer. Breaking into and Reverse Engineering iOS Photo Vaults - For whatever reason, a lot of people store risqué pictures on their devices. Why [...]

Week 43 In Review – 2015

Events Related HouSecCon v6 2015 Videos - 2015 Today started the 11th edition of in Luxembourg. Being one of my preferred event, I drove to Luxembourg this morning direction to the Alvisse Parc hotel! 2015 Wrap-Up Day #1 - 2015 Wrap-Up Day #2 - 2015 Wrap-Up Day #3 [...]

Week 41 In Review – 2015

Events Related Conference Jumping right in with the keynote of Day 1 by Jon Callas and my favorite quote “Make your devices fixable”. Enough said. Conference Day 1 - Conference Day 2 - Applied Physical Attacks on x86 Systems - GrrCON 2015 Videos - Videos of the presentations from GrrCON 2015 Resources [...]

Week 39 In Review – 2015

Events Related The CIA Campaign to Steal Apple’s Secrets - The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. Resources Reversing Mobile Traffic Lights - I wanted to have a look at [...]

Week 36 In Review – 2015

Events Related Chaos Communication Camp 2015 - Resources microchips - Tools WPSploit - This repository is designed for creating and/or porting of specific exploits for WordPress using metasploit as exploitation tool. armory-pass - Password manager for USB Armory Sleepy Puppy - Sleepy Puppy is a cross-site scripting (XSS) payload management [...]

Week 6 In Review – 2015

Resources OWASP Proactive Controls – This document was written by developers for developers, to assist those new to secure development. It aims to guide developers and other software development professionals down the path of secure web application software development. Anthem-From the Desk of CEO To Members – Anthem was the target of a very sophisticated [...]

Week 39 In Review – 2014

Resources (IN)Secure Magazine issue 43 (September 2014) available – (IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. You can download it now. A Guide to Gary McGraw's AppsecUSA Keynote – Here is a quick guide to the key ideas in the talk. Hope you find this [...]