Week 5 In Review – 2017

Resources Running guide for CTF's - Blackhat Hardware Training Roadmap - This diagram is intended to give an overview of many of the hardware-related trainings available at Black Hat USA 2017. Generally, lower level hardware is at the bottom and more software to the top. Tools Wordpress Exploit Framework - screen2root - [...]

Week 25 In Review – 2015

Resources Circle City Con 2015 Videos – These are the Circle City Con videos. You can watch and download the videos from here. LastPass Security Notice – LastPass want to assure their users that their cyberattack response worked as designed. They have received many questions so they want to take a moment and provide additional [...]

Week 46 In Review – 2013

Tools WCE v1.42beta released (32bit) – WCE v1.42beta released (32bit). This is a minor release. Download it from here. heapLib 2.0 – Chris Valasek released the code for heapLib2. For those of you not familiar, he introduced methods to perform predictable and controllable allocations/deallocations of strings in IE9-IE11 using JavaScript and the DOM. Techniques Unpacking [...]

Week 51 in Review – 2012

Resources Nils Jnemann: News about Google's Vulnerability Reward Program - Recently Adam Mein spoke at AppSec USA 2012 and Kevin Stadmeyer at SysScan 360 in Beijing about Google's experience with the Web Vulnerability Reward Program. Both are Security Program Manager at Google. Techniques 5 Tips to Ensure Safe Penetration Tests with Metasploit - [...]

2017-03-12T17:39:43-07:00 December 24th, 2012|Security Vulnerabilities, Week in Review|0 Comments