Good morning Amsterdam, good morning readers, welcome to the second day of the Hack In The Box conference. The speaker for the first keynote didn’t show up, so we’ll jump right into the next keynote.
Jennifer starts Read more
Hi all,
I had the pleasure to meet with Katie Moussouris after her keynote at Hack In The Box. After the announcement that she has left Microsoft and now serves as Chief Policy Offer (CPO) at HackerOne. I Read more
Good afternoon everyone,
The next talk I will be covering today is presented by Zhenhua ‘Eric’ Liu, Senior Security researcher at Fortinet.
Facts : Exploiting memory corruption vulnerabilities are more difficult today, Read more
Time flies ! After hanging out with @repmovsb and @botherder, it’s time for the last talk of the day. In the “To dock or not to dock, that is the question” talk, Andy Davis, research director Read more
The second talk I’m attending today is presented by Ben Williams, who’s going to talk about “Ironic exploitation of security products”. He explains that, as a pentester/researcher for NCC Group, he gets the chance to do fun pentests Read more
I’m not going to spend a lot of words on this. Facts speak for themselves.
A short while ago, I discovered this:
http://www.hackforums.net/showthread.php?tid=3031925
(you need to register to get access to the thread). Screenshot :
idle-hands profile :
Reputation
Read more
If you didn’t register your ticket for the Corelan Live Exploit Development training at Derbycon 2012, then there is bad news for you… We’re sold out.
Not all is lost though. For the second year in a row, Corelan Read more
Last week (oct 17 2010), Lincoln (one of the Corelan Team members) informed the other team members about an ongoing hacking challenge (HaXx.Me #03) organized and hosted by MaXe (@intern0t).
When I saw his message, it was already Sunday Read more