HITB2014AMS – Day 2 – On Her Majesty’s Secret Service: GRX & A Spy Agency
Last year, Belgacom got hacked by an intelligence service (GCHQ?), Rob says. “What is so interesting about this hack, why did they hack into Belgacom, what would or could be the purpose of a similar hack?” Before answering those questions, we need to take a quick look on how mobile networks work and how mobile […]
HITB2014AMS – Day 2 – Keynote 4: Hack It Forward
Good morning Amsterdam, good morning readers, welcome to the second day of the Hack In The Box conference. The speaker for the first keynote didn’t show up, so we’ll jump right into the next keynote. Jennifer starts her keynote by explaining that she’s fortunate to be able to travel to a lot of conferences and […]
HITB2014AMS – Interview with Katie Moussouris
Hi all, I had the pleasure to meet with Katie Moussouris after her keynote at Hack In The Box. After the announcement that she has left Microsoft and now serves as Chief Policy Offer (CPO) at HackerOne. I wanted to ask her 2 questions about this new step in her carreer: Peter: Why HackerOne? Katie: […]
Corelan Logo contest – Derbycon 2013
For the third year in a row, I’ll be teaching the Corelan Exploit Dev Bootcamp at Derbycon. If you were able to grab a ticket to the course, you can expect a true bootcamp-style, very hands-on course, spanning 2 (very long) days. I hope you are as excited about it as I am. For the […]
Free tool – PVE TCP Ping Utility – v1.0.0.1
I wanted to share a small utility that I wrote a while ago, allowing you to run a non-interactive ‘ping’ to a tcp port (e.g. from within a script). This could for example allow you to bring up a VPN tunnel from a script (by generating traffic to a target host), to determine whether a […]