Week 13 In Review – 2017

Events Related TROOPERS Conference I’m in Heidelberg (Germany) for the 10th edition of the TROOPERS conference. The regular talks are scheduled on Wednesday and Thursday. The two first days are reserved for some trainings and a pre-conference event called “NGI” for “Next Generation Internet” focusing on two hot topics: IPv6 and IoT. TROOPERS 2017 Day #1 Wrap-Up - [...]

Week 34 In Review – 2016

Events Related Impressions From DEF CON 24: The Machines Are Rising - securityintelligence.com DEF CON 24, the world’s largest hacker conference, ended Aug. 7, and I must say I enjoyed every moment of it. There was so much to see in so little time; I definitely regret missing some great stuff that happened. Even so, [...]

Week 29 In Review – 2016

Events Related Converge 2016 Videos - www.irongeek.com These are the videos from the Converge Information Security Conference. BSides Detroit 2016 Videos - www.irongeek.com These are the videos from the BSides Detroit 2016 Conference. AppSecEU 16 - Abhay Bhargav - SecDevOps: A View from the Trenches - www.youtube.com Resources KeeThief – A Case Study in Attacking KeePass Part [...]

Week 27 In Review – 2016

Resources Exploring and exploiting Lenovo firmware secrets - blog.cr4.sh Hi, everyone! In this article I will continue to publish my research of Lenovo ThinkPad’s firmware. Previously I shown how to discover and exploit SMM callout vulnerabilities on example of SystemSmmAhciAspiLegacyRt UEFI driver 1day vulnerability. Also, I introduced a small toolkit called fwexpl that provides API for comfortable development of firmware [...]

Week 49 In Review – 2015

Events Related 2015 - Talks - bsidesvienna.at Botconf 2015 The first keynote slot was assigned to Margarita Louca from Europol: “Successful botnets takedowns: The good-cooperation part”. More precisely, it’s the EC3 (“European Cyber Crime Center“). This talk was flagged as “restricted” and not all information will be reported here. Botconf 2015 Wrap-Up Day #1 - blog.rootshell.be Botconf [...]

Week 44 In Review – 2015

Resources Welcome to the SaintCON 2015 files section! - files.saintcon.org SaintCON materials. RWSPS: WPA/2 Cracking Using HashCat [ch5pt2] - www.rootsh3ll.com If you remember in the previous part, we learned Speeding up WPA/2 Cracking Using Pre-generated PMKs. Which certainly uses CPU as the primary part for the calculations of the PMKs. It surely gives us speed for cracking [...]