Corelan Logo Contest – The submissions
Hi all, As announced a couple of weeks ago, the Corelan Logo contest is now closed, which means we are no longer accepting new submissions. 3 people have submitted one or more designs: Design 1 Design 2 Design 3 Design 4 Design 5 Design 6 […]
Corelan Logo contest – Derbycon 2013
For the third year in a row, I’ll be teaching the Corelan Exploit Dev Bootcamp at Derbycon. If you were able to grab a ticket to the course, you can expect a true bootcamp-style, very hands-on course, spanning 2 (very long) days. I hope you are as excited about it as I am. For the […]
BlackHatEU2013 – Day2 – DropSmack: How cloud synchronization services render your corporate firewall worthless
Jake Williams (@malwareJake) from CSR Group has more than a decade of experience with systems engineering, network defines, malware reverse engineering, penetration testing and forensics. He spent some good time looking at Cloud synchronization services and is presenting some findings in this talks. First of all, think of Dropbox (or any similar tools) as a […]
BlackHatEU2013 – Day2 – Who’s really attacking your ICS devices ?
Kyle Wilhoit, Threat researcher at Trend Micro, explains that he will provide an overview of ICS systems before looking at some interesting attacks at ICS systems. Concerns/Overview of ICS Security and Typical deployments ICS devices are used in production of virtually anything. They are used in water/gas/energy/automobile/manufacturing, etc. They are notoriously insecure in many ways. Software […]
BlackHatEU2013 – Day 1 – To dock or not to dock
Time flies ! After hanging out with @repmovsb and @botherder, it’s time for the last talk of the day. In the “To dock or not to dock, that is the question” talk, Andy Davis, research director at NCC Group shares his research around using laptop docking stations as hardware-based attack platforms. Why docking stations as […]
BlackHatEU2013 – Day1 – Hardening Windows 8 Apps for the Windows Store
The first talk after having lunch at BlackHat Europe 2013, title “Hardening Windows 8 Apps for the Windows Store” is delivered by Bill Sempf (@sempf). Usually, the first slot after lunch is not really a gift to speakers as attendees tend to be busy digesting lunch at that time. Perhaps the absence of slides during the […]
BlackHatEU2013 – Day1 – Hacking Appliances
The second talk I’m attending today is presented by Ben Williams, who’s going to talk about “Ironic exploitation of security products”. He explains that, as a pentester/researcher for NCC Group, he gets the chance to do fun pentests and break a lot of stuff. In the past year, he was able to work on auditing […]
Root Cause Analysis – Memory Corruption Vulnerabilities
Introduction For the past year or so I’ve spent a significant amount of time fuzzing various applications with the hopes of identifying exploitable crashes. Early on in my research I quickly realized that building fuzzers and generating large quantities of crashes, even for heavily targeted applications, was easy. However, determining the exploitability of these crashes, […]