Posts:

BlackHatEU2013 – Day2 – DropSmack: How cloud synchronization services render your corporate firewall worthless

Jake Williams (@malwareJake) from CSR Group has more than a decade of experience with systems engineering, network defines, malware reverse engineering, penetration testing and forensics. He spent some good time looking at Cloud synchronization services and is presenting some Read more

Read More

BlackHatEU2013 – Day2 – Advanced Heap Manipulation in Windows 8

Good afternoon everyone,

The next talk I will be covering today is presented by Zhenhua ‘Eric’ Liu, Senior Security researcher at Fortinet.

Why doing this type of research.

Facts : Exploiting memory corruption vulnerabilities are more difficult today, Read more

Read More

BlackHatEU2013 – Day2 – Who’s really attacking your ICS devices ?

Kyle Wilhoit, Threat researcher at Trend Micro, explains that he will provide an overview of ICS systems before looking at some interesting attacks at ICS systems.

Concerns/Overview of ICS Security and Typical deployments

ICS devices are used Read more

Read More

BlackHatEU2013 – Day2 – The Sandbox Roulette: Are you ready to ramble

Good morning friends,

I’d like to welcome you back on this second day of BlackHat Europe 2013.  Day 1 has been pretty interesting, so let’s see how day 2 goes (especially after Rapid7 and IOActive parties last night). Read more

Read More

BlackHatEU2013 – Day 1 – To dock or not to dock

Time flies !  After hanging out with @repmovsb and @botherder, it’s time for the last talk of the day.  In the “To dock or not to dock, that is the question” talk, Andy Davis, research director Read more

Read More

BlackHatEU2013 – Day1 – Hardening Windows 8 Apps for the Windows Store

The first talk after having lunch at BlackHat Europe 2013, title “Hardening Windows 8 Apps for the Windows Store” is delivered by Bill Sempf (@sempf). Usually, the first slot after lunch is not really a gift Read more

Read More

BlackHatEU2013 – Day1 – Hacking Appliances

The second talk I’m attending today is presented by Ben Williams, who’s going to talk about “Ironic exploitation of security products”. He explains that, as a pentester/researcher for NCC Group, he gets the chance to do fun pentests Read more

Read More

BlackHatEU2013 – Day1 – Practical Attacks against MDM solutions

Good morning everyone,

Welcome to BlackHat Europe 2013 !  As announced in my post a couple of days ago, I’ll try to post short write-ups about some of the talks right after the presentation has finished.   Read more

Read More

Black Hat Europe 2013 – Preview

 

Hola dear friends,

There’s only a few days left until Black Hat Europe 2013 opens its doors in the beautiful city of Amsterdam, the Netherlands.   Just like past years, I’ll be covering some of the briefings (semi) live Read more

Read More

Corelan T-Shirt contest – Derbycon 2012

If you didn’t register your ticket for the Corelan Live Exploit Development training at Derbycon 2012, then there is bad news for you…   We’re sold out.

Not all is lost though. For the second year in a row, Corelan Read more

Read More