Vídeos de Derbycon 2016
- September 26, 2016
- tuxotron
- Key Note - Jeffrey Snover, Lee Holmes
- Carlos Perez - Thinking Purple
- Ed Skoudis - Internet of Things, Voice Control, AI, and Office Automation: BUILDING YOUR VERY OWN J.A.R.V.I.S.
- David Maloney, James Lee, Brent Cook, Tod Beardsley, Lance Sanchez - Metasploit Townhall
- Parker Schmitt - Data Obfuscation: How to hide data and payloads to make them "not exist"
- Jason Smith - Go with the Flow
- Devon Greene - Abusing RTF: Evasion, Exploitation and Counter Measures
- Mubix "Rob" Fuller - Writing malware while the blue team is staring at you
- Christopher Hadnagy - Mind Reading for Fun and Profit using DISC
- JDuck - Stagefright: An Android Exploitation Case Study
- Arian J Evans & James Pleger - Top 10 2015-2016 compromise patterns observed & how to use non-traditional Internet datasets to detect & avoid them
- Aaron Lafferty - Information Security Proposed Solutions Series - 1. Talent
- Alfredo Ramirez - DNSSUX
- Tyler Halfpop , Jacob Soo - Macs Get Sick Too
- Joe Desimone - Hunting for Exploit Kits
- Stephen Breen, Chris Mallz - Rotten Potato - Privilege Escalation from Service Accounts to SYSTEM
- Nick Cano - +1,000,000 -0: Cloning a Game Using Game Hacking and Terabytes of Data
- Wartortell and Aaron Bayles - Nose Breathing 101: A Guide to Infosec Interviewing
- William McLaughlin - Android Patchwork
- Will Schroeder, Matt Nelson - A Year in the Empire
- Kevin Johnson and Jason Gillam - Next Gen Web Pen Testing: Handling modern applications in a penetration test
- Ken Johnson, Chris Gates - DevOops Redux
- Ryan Voloch and Peter Giannoutsos - To Catch a Penetration Tester: Top SIEM Use Cases
- Spencer McIntyre - Is that a penguin in my Windows?
- Brent White && Tim Roberts - Real World Attacks VS Check-box Security
- Ben0xA - PowerShell Secrets and Tactics
- Michael Allen - Beyond The ?Cript: Practical iOS Reverse Engineering
- Jayson E. Street - .... and bad mistakes I've made a few.....
- Matthew Dunwoody, Nick Carr - No Easy Breach: Challenges and Lessons from an Epic Investigation
- Natalie Vanatta - ARRR Maties! A map to the legal hack-back
- Michael Wharton, Project MVP - Hacking and Protecting SharePoint
- Marcello Salvati - CrackMapExec - Owning Active Directory by using Active Directory
- Rockie Brockway & Adam Hogan - Adaptation of the Security Sub-Culture
- Zach Grace, Brian Genz - Better Network Defense Through Threat Injection and Hunting
- nyxgeek - Hacking Lync (or, 'The Weakest Lync')
- Kevin Gennuso - Responder for Purple Teams
- Ken Toler - Metaprogramming in Ruby and doing it wrong.
- Paul Coggin - Exploiting First Hop Protocols to Own the Network
- Nick Landers - Outlook and Exchange for the Bad Guys
- Valerie Thomas and Harry Regan - It's Never So Bad That It Can't Get Worse
- Nathan Clark - AWSh*t. Pay-as-you-go Mobile Penetration Testing
- Nancy Snoke - Evolving your Office's Security Culture
- Michael Schearer - Confronting Obesity in Infosec
- Mark Mager - Defeating The Latest Advances in Script Obfuscation
- Michael Gough - From Commodity to Advanced (APT) malware, are automated malware analysis sandboxes as useful as your own basic manual analysis?
- Tim MalcomVetter - Breaking Credit Card Tokenization Without Cryptanalysis
- Bill V – Privileged Access Workstations (PAWs)
- Scott Lyons and Joshua Marpet - Business Developement: The best non-four letter dirty word in infosec.
- Scot Berner, Jason Lang - Tool Drop 2.0 - Free As In Pizza
- Joseph Tegg - We're a Shooting Gallery, Now What?
- Doug Burns - Malicious Office Doc Analysis for EVERYONE!
- Sean Metcalf & Will Schroeder - Attacking EvilCorp: Anatomy of a Corporate Hack
- Matt Graeber, Jared Atkinson - Living Off the Land 2: A Minimalist's Guide to Windows Defense
- Kyle Wilhoit - Point of Sale Voyuer- Threat Actor Attribution Through POS Honeypots
- Jeremy Mio, David Lauer, Mike Woolard - The Art of War, Attacking the Organization and Raising the Defense
- Justin Herman & Anna-Jeannine Herman - The 1337 Gods of Geek Mythology
- Josh Huff - Open Source Intelligence - What I learned by being an OSINT creeper
- Jay Beale - Phishing without Failure and Frustration
- Larry Pesce - I don't give one IoTA: Introducing the Internet of Things Attack Methodology.
- Anti-Forensics AF int0x80 (of Dual Core)
- Deral Heiland, Matthew Kienow - Managed to Mangled: Exploitation of Enterprise Network Management Systems
- Joey Maresca - Finding Your Balance
- EvilMog - Hashcat State of the Union
- egypt - New Shiny in Metasploit Framework
- Hacking with Ham Radios: What I have learned in 25 years of being a ham.
- John Strand - Penetration Testing Trends
- Ellen Hartstack and Matthew Sullivan - Garbage in, garbage out
- Casey Smith - Establishing A Foothold With JavaScript
- Jesika McEvoy - Overcoming Imposter Syndrome (even if you're totally faking it)
- FuzzyNop - Embrace the Bogeyman: Tactical Fear Mongering for Those Who Penetrate
- Eric Conrad - Introducing DeepBlueCLI, a PowerShell module for hunt teaming via Windows event logs
- Dr. Jared DeMott & Mr. Josh Stroschein - Using Binary Ninja for Modern Malware Analysis
- Scott M - Fuzzing basics...how to break software
- Craig Bowser - Security v. Ops: Bridging the Gap
- Chris "Lopi" Spehn - From Gaming to Hacking The Planet
- Jason Blanchard - How to Social Engineer your way into your dream job!
- Lee Holmes - Attackers Hunt Sysadmins - It's time to fight back
- Adam Compton, Austin Lane - Scripting Myself Out of a Job - Automating the Penetration Test with APT2
- Branden Miller - Hacking for Homeschoolers: STEM projects for under $20
- Scott Sutherland - SQL Server Hacking on Scale using PowerShell
- Brian Marks, Andrea Sancho Silgado - Dive into DSL: Digital Response Analysis with Elasticsearch
- David Schwartzberg and Chris Sistrunk - Make STEHM Great Again
- Charles L. Yost - Python 3: It's Time
- Philip Martin - DNS in Enterprise IR: Collection, Analysis and Response
- Drew Branch - Need More Sleep? REST Could Help
- Bill Gardner - Making Our Profession More Professional
- Abe Miller - How are tickets paid for?
- Bill Sempf - Breaking Android Apps for Fun and Profit
- Amanda Berlin & Lee Brotherston - So You've Inherited a Security Department, Now What?
- Brandon Young - Reverse engineering all the malware... and why you should stop.
- Nathan Magniez - Body Hacking 101 (or a Healthy Lifestyle for Security Pros)
- Jimmy Byrd - Security Automation in your Continuous Integration Pipeline
- Chad M. Dewey - Cruise Ship Security OR Hacking the High Seas
- Karl Fosaaen - Attacking ADFS Endpoints with PowerShell
- Stephen Hilt - The 90's called, they want their technology back
- Lee Neely - Web Security for Dummies
- Kirk Hayes - I Love myBFF (Brute Force Framework)
- Cameron Craig, Keith Conway - Nobody gets fired by choosing IBM... but maybe they should.
- Mirovengi - Shackles, Shims, and Shivs - Understanding Bypass Techniques
- Jared Haight - Introducing PowerShell into your Arsenal with PS>Attack
- James Jardine - Recharging Penetration Testing to Maximize Value
- hypervista - Poetically Opaque (or other John Updike Quotes)
- David Boyd - Hack Yourself: Building A Pentesting Lab
- Ronnie Flathers - Abusing Linux Trust Relationships: Authentication Back Alleys and Forgotten Features
- Salvador Mendoza - Samsung Pay: Tokenized Numbers, Flaws and Issues
- Andrew Krug & Alex McCormack - Hardening AWS Environments and Automating Incident Response
- Andrew Plunkett - Yara Rule QA: Can't I Write Code to do This for Me?
- Anthony Kasza - Java RATS: Not even your Macs are safe
- Beau Bullock, Derek Banks, Joff Thyer - The Advanced Persistent Pentester (All Your Networks Are Belong 2 Us)
- Russell Butturini - Fire Away! Sinking the Next Gen Firewall
- Daniel Bohannon - Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e`Tec`T 'Th'+'em'
- Dav Wilson - Mobile Device Forensics
- Casey Cammilleri & Hans Lakhan - Hashview, a new tool aimed to improve your password cracking endeavors.
- Brian Fehrman - Hardware Hacking the Easyware Way
- Matthew Lichtenberger - PacketKO - Data Exfiltration Via Port Knocking
- Jamie Murdock - Ransomware: An overview
- Ben Stillman - MariaDB: Lock it down like a chastity belt
- Aaron Guzman - IoT Defenses - Software, Hardware, Wireless and Cloud
- Adam Cammack & Brent Cook - Static PIE: How and Why
- Braden Hollembaek, Adam Pond - Finding a Weak Link: Attacking Windows OEM Kernel Drivers
- Dan Bougere - The Beginner's Guide to ICS: How to Never Sleep Soundly Again
 
Ya tenemos disponibles los vídeos (faltan algunos) de una de las conferencias que más ha crecido en los últimos años: Derbycon. La edición de este año 2016 acaba de terminar y nos ha dejado un gran número de charlas interesantes:
RootedCON Valencia 2016
- September 7, 2016
- cybercaronte
 El congreso RootedValencia se celebrará los días 9 y 10 de Septiembre. El viernes día 9 tendrá lugar un training llamado "RB16-1 Hacking ético" (pulsa aquí para más información) y durante el sábado día 10 se celebrarán conferencias desde las 10am hasta las 8pm. Nosotros estaremos por allí el sábado para saludar a viejos y nuevos amigos, disfrutar de las conferencias y además tomar algunas cervezas ;)
El congreso RootedValencia se celebrará los días 9 y 10 de Septiembre. El viernes día 9 tendrá lugar un training llamado "RB16-1 Hacking ético" (pulsa aquí para más información) y durante el sábado día 10 se celebrarán conferencias desde las 10am hasta las 8pm. Nosotros estaremos por allí el sábado para saludar a viejos y nuevos amigos, disfrutar de las conferencias y además tomar algunas cervezas ;)
Lugar: ADEIT - Fundación Universidad - Plaza Virgen de la Paz, 3, 46001 Valencia (España)
Pwntools 3.0
- August 23, 2016
- tuxotron
- pwnlib.adb— Android Debug Bridge
- pwnlib.asm— Assembler functions
- pwnlib.atexception— Callbacks on unhandled exception
- pwnlib.atexit— Replacement for atexit
- pwnlib.constants— Easy access to header file constants
- pwnlib.context— Setting runtime variables
- pwnlib.dynelf— Resolving remote functions using leaks
- pwnlib.encoders— Encoding Shellcode
- pwnlib.elf— Working with ELF binaries
- pwnlib.exception— Pwnlib exceptions
- pwnlib.fmtstr— Format string bug exploitation tools
- pwnlib.gdb— Working with GDB
- pwnlib.log— Logging stuff
- pwnlib.memleak— Helper class for leaking memory
- pwnlib.replacements— Replacements for various functions
- pwnlib.rop— Return Oriented Programming
- pwnlib.rop.rop— Return Oriented Programming
- pwnlib.rop.srop— Sigreturn Oriented Programming
- pwnlib.runner— Running Shellcode
- pwnlib.shellcraft— Shellcode generation
- pwnlib.shellcraft.amd64— Shellcode for AMD64
- pwnlib.shellcraft.arm— Shellcode for ARM
- pwnlib.shellcraft.common— Shellcode common to all architecture
- pwnlib.shellcraft.i386— Shellcode for Intel 80386
- pwnlib.regsort— Register sorting
- pwnlib.shellcraft.thumb— Shellcode for Thumb Mode
- pwnlib.term— Terminal handling
- pwnlib.timeout— Timeout handling
- pwnlib.tubes— Talking to the World!
- pwnlib.tubes.process— Processes
- pwnlib.tubes.serialtube— Serial Ports
- pwnlib.tubes.sock— Sockets
- pwnlib.tubes.ssh— SSH
- pwnlib.ui— Functions for user interaction
- pwnlib.useragents— A database of useragent strings
- pwnlib.util.crc— Calculating CRC-sums
- pwnlib.util.cyclic— Generation of unique sequences
- pwnlib.util.fiddling— Utilities bit fiddling
- pwnlib.util.hashes— Hashing functions
- pwnlib.util.iters— Extension of standard module- itertools
- pwnlib.util.lists— Operations on lists
- pwnlib.util.misc— We could not fit it any other place
- pwnlib.util.net— Networking interfaces
- pwnlib.util.packing— Packing and unpacking of strings
- pwnlib.util.proc— Working with- /proc/
- pwnlib.util.safeeval— Safe evaluation of python code
- pwnlib.util.web— Utilities for working with the WWW
 
Los que seáis asiduos a participar en CTFs ya probablemente conozcáis el proyecto Pwntools.
Éste es un conjunto de utilidades, librerías o framework pensado para hacerte la vida más fácil a la hora de escribir tus exploits o soluciones en los dichos CTFs. Está escrito en Python y provee de una gran cantidad de módulos específicos para cada tarea:
$ apt-get install python2.7 python2.7-dev python-pip $ pip install --upgrade pwntoolsAunque Pwntools está desarrollado en sobre Ubuntu, debería de funcionar sin problemas en otras distribuciones Linux e incluso Mac OS X.
Para que te hagas una idea de como usar este framework, aquí tienes un repositorio con algunas soluciones a varios retos usando el mismo. El código fuente del proyecto se encuentra en Github y su documentación aquí.
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec



