Events Related HITB 2017 This year, the conference was based on four(!) tracks: two regular ones, one dedicated to more “practical” presentations (HITBlabs) and the last one dedicated to small talks (30-60 mins). HITB Amsterdam 2017 Day #1 Wrap-Up - blog.rootshell.be HITB Amsterdam 2017 Day #2 Wrap-Up - blog.rootshell.be Resources Over The Air: Exploiting [...]
Events Related BSides Indy 2017 Videos - www.irongeek.com These are the videos from the BSides Indy conference. Tools Worried about Strutshock (CVE-2017-5638)? - www.tinfoilsecurity.com Quick check to see if your website is vulnerable Techniques PlaidCTF 2012 – Traitor (200 pts) - int3pids.blogspot.com The challenge is supposed to be very straightforward, because we only have a recorded audio [...]
Tools Acunetix Free Manual Pen Testing Tools - www.acunetix.com Acunetix Manual Tools allow penetration testers to further automated testing. waveconverter - github.com Factoria Labs 2016 WaveConverter is a Python application, built on GTK+ 3. The GUI has been implemented via Glade. A sqlite database has been implemented via sqlalchemy. Techniques Cracking The 12+ Character Password [...]
Resources VMware Security Advisories - vmware.com vSphere Data Protection (VDP) updates address SSH key-based authentication issue Techniques In Flight Hacking System - blog.ioactive.com What helped a lot to reduce that fear was to understand how things work in planes, and getting used to noises, bumps, and turbulence. This blog post is about understanding a bit more about how things work aboard an aircraft. More specifically, the In-Flight Entertainment Systems (IFE) developed by Panasonic Avionics. Other News Learning From A Year of Security Breaches - medium.com This year (2016) I accepted as much incident response work as I could. I spent about 300 hours responding to security incidents and data breaches this year as a consultant or volunteer.
Resources Security Conference - conferences.oreilly.com Speaker slides & videos Techniques Nintendo Classic Mini Family Talk of computer contents - translate.google.com As the person who disassembled it released before it was released. Interest in contents has been increased, but in this article I would like to drill down to a bit more detail. When CSI meets [...]
Resources Ruxcon - ruxcon.org.au Presentation Slides from Ruxcon Australia BlackHat Europe 2016 - www.blackhat.com Techniques Kerberoasting Without Mimikatz - www.harmj0y.net Thanks to an awesome PowerView pull request by @machosec, Kerberoasting is easier than ever using pure PowerShell. I wanted to briefly cover this technique and its background, how we’ve been using it recently, and a few awesome new developments. [...]
Resources Smart LSA Secrets Module – hackwhackandsmack.com Doug decided to take two modules and crash them together to add some automation to some tasks that he seem to pick up often. He took the LSA Secrets module and the Domain Group Enum module and combined them to be one module. Symantec Intelligence Report: December 2013 – symantec.com [...]
Resources SIM Card Forensics: An Introduction – resources.infosecinstitute.com A detail discussion by Rohit Shaw about SIM (subscriber identity module), SIM structure and it's file systems, security, tools etc. Vulnerabilities Elevating privileges by exploiting weak folder permissions – www.greyhathacker.net This post is about weaknesses in folder permissions leading to elevation of privilege by using DLL hijacking vulnerabilities [...]