HITB2014AMS – Day 1 – State of the ART: Exploring the New Android KitKat Runtime
Good afternoon and welcome back to Hack In the Box. I can’t think of anything better than a talk on ART, the new Android KitKat Runtime, to digest lunch :) Intro ART was introduced in Android 4.4 back in October 2013 and although it is still in an experimental stage, it’s poised to replace Dalvik […]
HITB2014AMS – Day 1 – Harder, Better, Faster Fuzzer: Advances in BlackBox Evolutionary Fuzzing
Vulnerability Hunting Active security testing, Fabien explains, is the process of generating input which travel in the application, hit a sink and violate a property. It applies to all kinds of vulnerabilities, not just limited to buffer overflows or memory corruption bugs. Blackbox and whitebox/greybox testing (both static and dynamic) are ways to perform […]
HITB2014AMS – Day 1 – Keynote 2: Building a Strategic Defense Against the Global Threat Landscape
Kristin starts her keynote by explaining that she has been in the business about 22 years ago and used to be in public services. A long time ago, she married a husband who was in the military and ran a program for spouses to meet/connect while their husbands were deployed. During one of the meetings, […]
HITB2014AMS – Day 1 – Keynote 1: Security at the End of the Universe
Good morning friends, welcome to Hack In The Box 2014, hosted at “De Beurs van Berlage” in the beautiful city of Amsterdam. This year’s edition starts with a keynote by Katie Moussouris, previous lead at Microsoft Security Response Center (MSRC) and now the brand new Chief Policy Officer at HackerOne. Katie starts the keynote by […]
HITB2014AMS – Hack In The Box / Haxpo 2014 Amsterdam
Dear friends, I’m getting ready for a short trip to Amsterdam, to attend the 5th Hack In The Box conference tomorrow … and I’m “hashtag” excited about it. HITB Haxpo and HITB2014AMS feature and amazing schedule of talks, an impressive selection of speakers and offers numerous side-events and I really can’t think of a better place […]
A chain is only as strong as its weakest link – DNS Hijack Monitoring
It doesn’t really matter how much time your developers have spent writing secure code and how many layers of security you have implemented to protect your website from being hacked and defaced. Recent incidents have demonstrated that the bad guys will simply look for and find an easier way to hurt your business. Instead of […]