CSO : Common Sense Operator/Operations
As the CSO/CISO/person responsible for Information Security, your job is to… well … do you even know? Does upper management know? “Our crappy CSO …” and “Our stupid CSO …” are statements commonly used by various (techie) people, throwing their hands up in despair, attempting to prove that their CSO doesn’t understand technology and has […]
HITB2014AMS – Day 2 – Keynote 4: Hack It Forward
Good morning Amsterdam, good morning readers, welcome to the second day of the Hack In The Box conference. The speaker for the first keynote didn’t show up, so we’ll jump right into the next keynote. Jennifer starts her keynote by explaining that she’s fortunate to be able to travel to a lot of conferences and […]
HITB2014AMS – Interview with Katie Moussouris
Hi all, I had the pleasure to meet with Katie Moussouris after her keynote at Hack In The Box. After the announcement that she has left Microsoft and now serves as Chief Policy Offer (CPO) at HackerOne. I wanted to ask her 2 questions about this new step in her carreer: Peter: Why HackerOne? Katie: […]
HITB2014AMS – Day 1 – Keynote 2: Building a Strategic Defense Against the Global Threat Landscape
Kristin starts her keynote by explaining that she has been in the business about 22 years ago and used to be in public services. A long time ago, she married a husband who was in the military and ran a program for spouses to meet/connect while their husbands were deployed. During one of the meetings, […]
HITB2014AMS – Day 1 – Keynote 1: Security at the End of the Universe
Good morning friends, welcome to Hack In The Box 2014, hosted at “De Beurs van Berlage” in the beautiful city of Amsterdam. This year’s edition starts with a keynote by Katie Moussouris, previous lead at Microsoft Security Response Center (MSRC) and now the brand new Chief Policy Officer at HackerOne. Katie starts the keynote by […]
HITB2014AMS – Hack In The Box / Haxpo 2014 Amsterdam
Dear friends, I’m getting ready for a short trip to Amsterdam, to attend the 5th Hack In The Box conference tomorrow … and I’m “hashtag” excited about it. HITB Haxpo and HITB2014AMS feature and amazing schedule of talks, an impressive selection of speakers and offers numerous side-events and I really can’t think of a better place […]
A chain is only as strong as its weakest link – DNS Hijack Monitoring
It doesn’t really matter how much time your developers have spent writing secure code and how many layers of security you have implemented to protect your website from being hacked and defaced. Recent incidents have demonstrated that the bad guys will simply look for and find an easier way to hurt your business. Instead of […]
Using DBI for solving Reverse Engineering 101 – Newbie Contest from eLearnSecurity
Introduction Last weekend I had some time so I wanted to have a look at a reversing challenge which you can find here: https://www.ethicalhacker.net/features/special-events/reverse-engineering-101-newbie-contest-webcast-elearnsecurity Reverse Engineering 101 Contest Steps Get the exe to be hacked Break it open and start exploring. The only rule for the challenge is that it has to be solved by […]