OWASP Top 10 - 2017
- November 20, 2017
- tuxotron
- A1:2017-Injection
- A2:2017-Broken Authentication
- A3:2017-Sensitive Data Exposure
- A4:2017-XML External Entities (XXE)
- A5:2017-Broken Access Control
- A6:2017-Security Misconfiguration
- A7:2017-Cross-Site Scripting (XSS)
- A8:2017-Insecure Deserialization
- A9:2017-Using Components with Known Vulnerabilities
- A10:2017-Insufficient Logging & Monitoring
Después de versiones previas, ya ha sido publicada la versión final del OWASP Top 10 de este año 2017. Un documento que recopila las 10 vulnerabilidades más críticas en aplicaciones web.
Este año se han colado tres tipos nuevos de amenazas: XXE, Deserialización insegura y falta de monitorización y registros. La primera basado en datos reales, y las dos últimas por votación de la comunidad.
La lista es la siguiente:
Además de dicha lista con detalles sobre cada amenaza, el documento también recopila recomendaciones sobre seguridad para desarrolladores, testeadores de seguridad, organizaciones y jefes de proyectos.
Introducción a la Organización del Ordenador Usando Ensamblador con un Raspberry Pi
- November 16, 2017
- tuxotron
- Introduction
- Efficient Use of This Book
- Computer Subsystems
- How the Subsystems Interact
- Setting Up Your Raspberry Pi
- Data Storage Formats
- Bits and Groups of Bits
- Exercises
- Mathematical Equivalence of Binary and Decimal
- Exercises
- Unsigned Decimal to Binary Conversion
- Exercises
- Memory
- Exercises
- Using C Programs to Explore Data Formats
- Programming Exercises
- Examining Memory With a Debugger
- Programming Exercise
- Storing Characters
- Programming Exercise
- Low-level Character Handling
- Programming Exercises
- Accessing the GPIO in C
- Computer Arithmetic
- Addition and Subtraction
- Exercises
- Arithmetic Errors—Unsigned Integers
- Signed Integers
- Exercises
- Arithmetic Errors—Signed Integers
- Exercises
- Basic Data Types
- C/C++ Basic Data Types
- Hexadecimal to Integer Conversion
- Programming Exercise
- Bitwise Logical Operations
- Programming Exercise
- Other Codes.
- Boolean Algebra
- Boolean Algebra Operations
- Exercises
- Canonical (Standard) Forms
- Exercise
- Boolean Function Minimization
- Exercises
- Logic Gates
- Crash Course in Electronics
- CMOS Transistors
- NAND and NOR Gates
- Exercise
- Logic Circuits
- Combinational Logic Circuits
- Programmable Logic Devices
- Sequential Logic Circuits
- Designing Sequential Circuits
- Memory Organization
- Central Processing Unit
- Overview
- CPU Registers
- CPU Interaction with Memory
- Program Execution in the CPU
- Using gdb to View the CPU Registers
- Programming Exercises
- Programming in Assembly Language
- Program Organization
- First Assembly Language Instructions
- Creating a Program in Assembly Language
- Programming Exercises
- Assemblers and Linkers
- Structure of the main Function
- Passing Arguments in Registers
- The Stack
- Stack Management In a Function
- Programming Exercise
- Local Variables on the Stack
- Programming Exercise
- Data Storage in Memory
- Instruction Details
- Addressing Modes
- The Assignment Operator
- Machine Code, Assignment
- Branching
- Machine Code, Branching
- Assembler Listings
- Program Flow Constructs
- Repetition
- Programming Exercises
- Binary Decisions
- Programming Exercise
- Writing Your Own Functions
- Overview of Passing Arguments
- Accessing Arguments in a Function
- Programming Exercises
- Bit Operations; Multiplication and Division
- Logical Instructions
- Programming Exercise
- Shifting Bits
- Programming Exercises
- Multiplication
- Division
- Programming Exercises
- Data Structures
- Arrays
- Programming Exercise
- Records (structs)
- structs as Function Arguments
- Programming Exercise
- structs as C++ Objects
- Programming Exercise
- Fractional Numbers
- Fractional Values in Binary
- Programming Exercise
- Fixed Point Fractional Values
- Floating Point Format
- IEEE 754
- Exercises
- Floating-Point Hardware
- Interrupts and Exceptions
- CPU Features
- Supervisor Call
- Interrupts
- Error Condition
- Input/Output
- Memory Timing
- I/O Device Timing
- Bus Timing
- I/O Interfacing
- I/O Ports
- Programming Exercise
- General Purpose Input/Output (GPIO) Device
- GPIO I/O Memory
- GPIO Connections
- Programming Exercise
[Introduction to Computer OrganizationARM Assembly Language Using the Raspberry Pi] (http://bob.cs.sonoma.edu/IntroCompOrg-RPi/frontmatter-1.html) es un libro electrónico y gratuito que nos enseña cómo funciona el hardware, a bajo nivel, de un ordenador desde el punto de vista del programador.
Para ello, se basa en uno de nuestros “juguetes” favoritos: Raspberry Pi, con Raspbian y usando lenguaje ensamblador para la arquitectura de la CPU de dicho dispositivo: ARM.
El objetivo del libro es que el lector llegue a entender como funciona un ordenador desde el nivel más bajo. Aunque uno prácticamente no escriba aplicaciones directamente en ensamblador, sin duda alguna te hará mucho mejor a la hora de programar, analizar malware, realizar ingeniería inversa, etc.
El libro empieza desde los conceptos más básicos como la preparación de tu Raspberry Pi o el sistema binario, hasta el uso de interrupciones y el GPIO.
El índice del mismo es el siguiente:
Vídeos DEF CON 25
- November 4, 2017
- tuxotron
- Cheng - The spear to break the security wall of S7CommPlus
- Christopher Domas - Breaking the x86 Instruction Set
- Damien Cauquil - Weaponizing the BBC Micro Bit
- Dennis Maldonado - Real time RFID Cloning in the Field
- Daniel Bohannon, Lee Holmes - Revoke Obfuscation: PowerShell Obfuscation
- Duncan Woodbury, Nicholas Haltmeyer - Linux Stack Based V2X Framework
- Dor Azouri - BITSInject
- Dimitry Snezhkov - Abusing Webhooks for Command and Control
- Gerald Steere, Sean Metcalf - Hacking the Cloud
- Gabriel Ryan - The Black Art of Wireless Post Exploitation
- Hanno Bõck - Abusing Certificate Transparency Logs
- Gil Cohen - Call the plumber: You have a leak in your named pipe
- Hyrum Anderson - Evading next gen AV using AI
- Itzik Kotler, Amit Klein - The Adventures of AV and the Leaky Sandbox
- Ilja van Sprundel - Are all BSDs are created equally? A survey of BSD kerne
- Jeff Moss and Panel - DEF CON Groups Panel
- Jason Haddix - Introducing HUNT Data Driven Web Hacking & Manual Testing
- Joe Rozner - Wiping out CSRF
- JoSh Pitts - Teaching Old Shellcode New Tricks
- K2 - UnFucking Forensics: Active Passive memory hacking debugging
- Luke Young - Thereâs no place like 127.001: Achieving reliable DNS rebinding
- Lee Holmes - Get $pwnd: Attacking Battle Hardened Windows Server
- Marina Simakov, Igal Gofman - Gaining persistency by abusing advanced authe
- Marc Newlin, Logan Lamb, Chris Grayson - CableTap: Wirelessly Tapping Home Networks
- Matt Knight - Radio Exploitation 101
- Matt Joyce - Amateur Digital Archeology
- Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level
- Min Zheng, Xiangyu Liu - macOS:iOS Kernel Debugging and Heap Feng Shui
- Mikhail Sosonkin - Hacking travel routers like it’s 1999
- Nick Cano - XenoScan Scanning Memory Like a Boss
- Nathan Seidle -Open Source Safe Cracking Robots: Combinations Under 1 Hour
- Redezem - PEIMA Using Power Laws to address Denial of Service Attacks
- Professor Plum - Digital Vengeance Exploiting the Most Notorious C&C Toolki
- Philip Tully, Michael T Raggo - A Picture is Worth a Thousand Words, Literally
- Saif El Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects
- Ryan Baxendale - Microservices and FaaS for Offensive Security
- Romain Coltel, Yves Le Provost - WSUSpendu: How to hang WSUS clients
- Sean Dillon, Zach Harding - Koadic C: Windows COM Command & Control Framework
- Scott Behrens, Jeremy Heffner - Application DoS In Microservice Architectures
- Salvador Mendoza - Exploiting 0ld Mag stripe information with New technology
- spaceB0x - Exploiting Continuous Integration (CI) and Automated Build systems
- Trey Forgety - Inside the âMeet Desaiâ Attack Defending Distributed Targets
- Tomer Cohen - Game of Chromes: Owning the Web with Zombie Chrome Extensions
- Thomas Mathew, Dhia Mahjoub - Malicious CDNs
- DEF CON 25 -The Dark Tangent, Def Con Goons - DEF CON Closing Ceremonies
- The Dark Tangent - Welcome to DEF CON 25
- Alvaro Muñoz, Alexandr Mirosh - Friday the 13th JSON attacks
- Avi Bashan, Slava Makkaveev - Everything to know about Android packers
- William Knowles - Persisting with Microsoft Office Abusing Extensibility Options
- XlogicX - Assembly Language is Too High Level
- Artem Kondratenko - Cisco Catalyst Exploitation
- Josh Schwartz, John Cramb - MEATPISTOL, A Modular Malware Implant Framework
- Andy Robbins, Will Schroeder - Designing Active Directory DACL Backdoors
- Chris Wysopal - How Hackers Changed the Security Industry
- Catherine Ullman, Chris Roberts - Breaking the Bad News
- HighWiz, Malware Unicorn, Niki7a, Roamer, Wiseacre, Shaggy - DEF CON 101 Panel
- Inbar Raz, Eden Schochat - From One Country, One Floppy to Startup Nation
- Jason Hernandez, Sam Richards, Jerod MacDonald-Evoy - Tracking Spies in the Skies
- John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome
- Matt Wixey - See no evil, hear no evil: Hacking invisibly & silently with light & sound
- Octane - Untrustworthy Hardware and How to Fix It
- Snide Owen - Phone system testing and other fun tricks
- Whitney Merrill, Terrell McSweeny - Tick, Tick, Tick Boom You’re Dead: Tech & the FTC
- Jason Staggs - Breaking Wind: Adventures Hacking Wind Farm Control Networks
- Stanislav Naydin, Vlad Gostomelsky - Medical Device Ethics
- Amanda Plimpton, Evan Anderson - Psychoactive Chemicals in Combat
- Christopher Frenz - Standardizing Deployment Of Medical Devices
- Kevin Sacco - Tales of A Healthcare Hacker
- Szkatulski Lawless - How Your Doctor Might Be Trying To Kill You
- Trevor Goodman - Hack Your Senses: Sensory Augementation
- Travis Lawrence - Hacking the Second Genetic Code
- Tim Cannon - The Moral Imperative of Biohacking
- Tess Schrodinger - Total Recall: Implicit Learning As Crypto
- Ryan Schmoll, Peter Hefley - Trigraph: Ethereum-based Teleradiology
- Robin Farmanfarmaian - The Patient as CEO
- RenderMan - Hacking The Internet of Dongs
- Paul Ashley - The Future is Fake Identities
- Meow Ludo Meow Meow - DIYBioweapons and Regulation
- Louis Auguste Jr - Microscopes Are Stupid
- Jun Axup - The Brave New World of Bio Entrepreneurship
- John Bass - Medical Industry Disrupt: Blockchain
- Jeffrey Tibbetts - Biohackers Die
- Jay Radcliffe - The Scientific Method in Security Research
- Gingerbread - Neurogenic Peptides Smart Drugs 4 Minute Mile
- Edward You - Biotechnology Needs A Security Patch Badly
- Amirs Panel - Ethics in BioHacking
- C00p3r, Cur50r - Implantable Technology Show and Tell
- Yuwue Zheng, Lin Huang - Ghost Telephonist Impersonates You Through LTE CSF
- David Robinson - Using GPS Spoofing to control time
- Haoqi Shan, Jian Yuan - Man in the NFC
- Chaosdata - Ghost in the Droid: Possessing Android Applications with ParaSpectre
- Tarah - How To Explain Crypto To Practically Anyone
- Rsnake Robert Hansen - Searching The Invisible Internet
- Patrick McCanna - Tips for Internet Privacy at College
- Leonard Bailey - Everything You Need To Know About The US Dept of Justice
- Erin Owens - Drone Wars
- Erin Owens - Hacking & Robotics v2 point 0
- EFF, Nic0 - Opening Ceremonies:A Place Where Kids Learn White Hat Hacking
- Deviant - Home Depot and A Plan of Attack for Hackers
- David Weinman - Introduction To Cheat Engine
- Cory Doctorow - You are not a Digital Native and that’s OK
- Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer
- Aron Rosenberg, Aaron Standridge - Hacking an Insecure WiFi Camera
- Alex Stamos, CSO Facebook - Keynote
- Matt Suiche - Porosity A Decompiler For Blockchain Based Smart Contracts Bytecode
- Josh Datko, Chris Quartier - Breaking Bitcoin Hardware Wallets
- Konstantinos Karagiannis - Hacking Smart Contracts
- Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon
- Tracy Maleeff - Into the Bird’s Nest: A Comprehensive Look at Twitter
- Winner Announcement Prize Distribution
- Simon Roses - OSINT Tactics on Source Code and Developers
- Shane MacDougal - Keynote: Seeing is Believing The Future of Recon
- Mikhail Sasonkin - Up Close and Personal: Keeping an Eye On Mobile
- Leah Figueroa - FERPA: Only Grades Are Safe; OSINT In Higher Education
- Kunal Aggarwal - DataSploit Open Source Assistant for OSINT
- Jason Haddix - Domain Discovery:Expanding Your Scope Like A Boss
- Inbar Raz - Do Tinder Bots Dream of Electric Toys
- Guillermo Buendia, Yael Esquivel - How To Obtain 100 Facebooks a Day
- Dakota Nelson -Total Recoll
- Anthony Russell - Building Google For Criminal Enterprises
- Andrew Hay - An Introduction to Graph Theory for OSINT
- Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story
- Corey Theun - Heavy Truck and Electronic Logging Devices
- Weston Hecker - Grand Theft Radio Stopping SDR Relay Attacks
- Vlad Gostomelsky - GPS System Integrity
- Tim b1tbane, Mitch Johnson, ehntoo - That’s No Car Its a Network
- Sheila Ayelen Berta, Claudio Caracciolo - The Bicho
- Sameer Dixit, Vlad Gostomelsky - Abusing Smart Cars with QR Codes
- Montalbano, Gillispie, Connett - Attacking Wireless Interfaces
- Jeffrey Quesnelle - An Introduction to AUTOSAR Secure Onboard
- Woodbury, Haltmeyer - Linux Stack Based V2X Framework
- Badge Life: DEFCON Unofficial Badges Panel
- Mickey Shkatov, Jesse Michael, Oleksandr Bazhaniuk - Driving down the rabbit hole
- Rhett Greenhagen - Skip Tracing For Fun and Profit
- J0n J4rv1s - Surveillance Capitalism Will Continue til Morale Improves
- [Deleted video]
- Gus Fritschie, Evan Teitelman - Backdooring the Lottery and Other Security Tales
- Svea Eckert, Andreas Dewes - Dark Data
- Yan Shoshitaishvili - 25 Years of Program Analysis
- Chris Sumner - Rage Against the Weaponized AI Propaganda Machine
- Ryan Lackey - Cypherpunks History
- Kevin Sacco - Tales of A Healthcare Hacker
- Aardvark, Darkmatter - WIGLE Like You Mean It Maximizing Your Wardriving
- Woody, Tim Kuester - GODUMPiNG packet sniffing the Gotenna
- Vivek Ramachandran, Nishant Sharma, Ashish Bhangale- Deceptacon
- Robert Ghilduta - Designing An Automatic Gain Control
- Nick Delewski - Failsafe: Yet Another SimpliSafe Attack Vector
- Matt Blaze - Sigint for the rest of us
- Eric Escobar - SecureWorks: SDR Replay Attacks On Home Security Systems
- Balint Seeber - Hacking Some More of the Wireless World
- Andrew Strutt - Suitcase Repeater Build for UHF 70cm
- Andrew Strutt - POCSAG Amateur Pager Network
- Alexander Zakarov - Large Scale Wireless Monitoring: KISMET Packet Sniffer
- Jake Braun - Securing the Election Office A Local Response
- Joseph Hall, David Jefferson - Common Misconceptions and False Parallels
- Matt Blaze - How did we get here? A history of voting technology
- Mary Brady, Josh Franklin - The State of US Voting System Security
- Joseph Hall - Election Hacking: Legal Considerations from the Civil Side
- Harri Hursti - Brief history of election machine hacking
- General Douglas Lute - National Security Implications of Voting Attacks
- Barbara Simons, David Jefferson - Election Systems: More Than the Booth
- Billy Boatright - Nor Lose The Common Touch
- Fahey Owens - Beyond Phishing â Building & Sustaining a Corporate SE Program
- Robert Wood - Thematic Social Engineering
- Yaiza Rubio, Félix Brezo - Heavy Diving For Credentials
- Tyler Rosonke - Social Engineering With Web Analytics
- Jayson Street - Strategies on Securing Your Banks and Enterprises
- Helen Thackray - Hackers Gonna Hack , But Do They Know Why?
- Chris Hadnagy - SE vs Predator: Using SE In Ways I Never Thought
- Brent White, Tim Roberts - Skills For A Red Teamer
- John Nye -The Human Factor Why Are We So Bad at Security
- Michele Fincher - Are You Killing Your Security Program?
- Keith Conway, Cameron Craig - Change Agents How to Affect Corp. Culture
- Arnaud Soullié - Fun with Modbus 0x5a Nothing New Still Relevant?
- DEF CON 25 ICS Village Blake Johnson Dissecting Industrial Wireless Implementations
- Bryson Bort, Atlas - Grid Insecurity and How to Really Fix This Shit
- Chris Sistrunk - What’s the DFIRence for ICS
- Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices
- Thomas Brandsetter - InSecurity in Building Automation
- Cooper Quintin, Kashmir Hill - The Internet Already Knows I’m Pregnant
- Jim Nitterauer - DNS: Devious Name Services Destroying Privacy & Anonymity w/o consent
- Peyton Engel - Learning about Government Surveillance Software
- Roger Dingledine - Next Generation Tor Onion Services
- Richard Thieme - When Privacy Goes Poof! Why It’s Gone and Never Coming Back
- Tess Schrodinger - Total Recall Implanting Passwords in Cognitive Memory
- Weston Hecker - Opt Out or Deauth Trying! AntiTracking Bots & Keystroke Injection
- Steinthor Bjarnason, Jason Jones - The call is coming from inside the house
- Sarah Zatko - CITL and the Digital Standard: A Year Later
- Zenofex, 0x00string, CJ 000, Maximus64 - All Your Things Are Belong To Us
- Francis Brown, David Latimer - Putting the Emerging Drone Defense Market to the Test
- Andrew Tierney, Ken Munro - IoT From DVRs to Dildos
- Alex Jay Balan - IoT: The Gift That Keeps on Giving
- Aaron Guzman - Hide Yo Keys, Hide Yo Car
- Aaron Alva, Mark Eichorn - IoT Updates to Help Protect Consumers
- Deral Heiland - The Internet of Vulnerabilities
- Dan Regalado - Inside the Alaris Infusion Pump, not too much medicine, plz
- Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard
- Vladimir Dashchenko, Sergey Temnikov - Pwning the Industrial IoT
- Vivek Ramachandran, Nishant Sharma, Ashish Bhangale - IIDS: IDS FOR IOT
- Rick Ramgattie - Rethinking the Researcher-Vendor Relationshipe
- Caleb Madrigal - Controlling IoT devices with crafted radio signals
Aunque no son todos los vídeos de la DEF CON 25, ya hay bastantes disponibles. Aquí tenéis una lista organizada en varias secciones:
Main Track 1
Packet Hacking Village
AFK2
Biohacking Village
Mobile
R00tz
Cryptocurrency
Recon Village
Car Hacking Village
AFK
Wifi Village
Voting Village
SE Village
ICS Village
Privacy
IoT
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec