Vídeos de Derbycon 2016
- September 26, 2016
- tuxotron
- Key Note - Jeffrey Snover, Lee Holmes
- Carlos Perez - Thinking Purple
- Ed Skoudis - Internet of Things, Voice Control, AI, and Office Automation: BUILDING YOUR VERY OWN J.A.R.V.I.S.
- David Maloney, James Lee, Brent Cook, Tod Beardsley, Lance Sanchez - Metasploit Townhall
- Parker Schmitt - Data Obfuscation: How to hide data and payloads to make them "not exist"
- Jason Smith - Go with the Flow
- Devon Greene - Abusing RTF: Evasion, Exploitation and Counter Measures
- Mubix "Rob" Fuller - Writing malware while the blue team is staring at you
- Christopher Hadnagy - Mind Reading for Fun and Profit using DISC
- JDuck - Stagefright: An Android Exploitation Case Study
- Arian J Evans & James Pleger - Top 10 2015-2016 compromise patterns observed & how to use non-traditional Internet datasets to detect & avoid them
- Aaron Lafferty - Information Security Proposed Solutions Series - 1. Talent
- Alfredo Ramirez - DNSSUX
- Tyler Halfpop , Jacob Soo - Macs Get Sick Too
- Joe Desimone - Hunting for Exploit Kits
- Stephen Breen, Chris Mallz - Rotten Potato - Privilege Escalation from Service Accounts to SYSTEM
- Nick Cano - +1,000,000 -0: Cloning a Game Using Game Hacking and Terabytes of Data
- Wartortell and Aaron Bayles - Nose Breathing 101: A Guide to Infosec Interviewing
- William McLaughlin - Android Patchwork
- Will Schroeder, Matt Nelson - A Year in the Empire
- Kevin Johnson and Jason Gillam - Next Gen Web Pen Testing: Handling modern applications in a penetration test
- Ken Johnson, Chris Gates - DevOops Redux
- Ryan Voloch and Peter Giannoutsos - To Catch a Penetration Tester: Top SIEM Use Cases
- Spencer McIntyre - Is that a penguin in my Windows?
- Brent White && Tim Roberts - Real World Attacks VS Check-box Security
- Ben0xA - PowerShell Secrets and Tactics
- Michael Allen - Beyond The ?Cript: Practical iOS Reverse Engineering
- Jayson E. Street - .... and bad mistakes I've made a few.....
- Matthew Dunwoody, Nick Carr - No Easy Breach: Challenges and Lessons from an Epic Investigation
- Natalie Vanatta - ARRR Maties! A map to the legal hack-back
- Michael Wharton, Project MVP - Hacking and Protecting SharePoint
- Marcello Salvati - CrackMapExec - Owning Active Directory by using Active Directory
- Rockie Brockway & Adam Hogan - Adaptation of the Security Sub-Culture
- Zach Grace, Brian Genz - Better Network Defense Through Threat Injection and Hunting
- nyxgeek - Hacking Lync (or, 'The Weakest Lync')
- Kevin Gennuso - Responder for Purple Teams
- Ken Toler - Metaprogramming in Ruby and doing it wrong.
- Paul Coggin - Exploiting First Hop Protocols to Own the Network
- Nick Landers - Outlook and Exchange for the Bad Guys
- Valerie Thomas and Harry Regan - It's Never So Bad That It Can't Get Worse
- Nathan Clark - AWSh*t. Pay-as-you-go Mobile Penetration Testing
- Nancy Snoke - Evolving your Office's Security Culture
- Michael Schearer - Confronting Obesity in Infosec
- Mark Mager - Defeating The Latest Advances in Script Obfuscation
- Michael Gough - From Commodity to Advanced (APT) malware, are automated malware analysis sandboxes as useful as your own basic manual analysis?
- Tim MalcomVetter - Breaking Credit Card Tokenization Without Cryptanalysis
- Bill V – Privileged Access Workstations (PAWs)
- Scott Lyons and Joshua Marpet - Business Developement: The best non-four letter dirty word in infosec.
- Scot Berner, Jason Lang - Tool Drop 2.0 - Free As In Pizza
- Joseph Tegg - We're a Shooting Gallery, Now What?
- Doug Burns - Malicious Office Doc Analysis for EVERYONE!
- Sean Metcalf & Will Schroeder - Attacking EvilCorp: Anatomy of a Corporate Hack
- Matt Graeber, Jared Atkinson - Living Off the Land 2: A Minimalist's Guide to Windows Defense
- Kyle Wilhoit - Point of Sale Voyuer- Threat Actor Attribution Through POS Honeypots
- Jeremy Mio, David Lauer, Mike Woolard - The Art of War, Attacking the Organization and Raising the Defense
- Justin Herman & Anna-Jeannine Herman - The 1337 Gods of Geek Mythology
- Josh Huff - Open Source Intelligence - What I learned by being an OSINT creeper
- Jay Beale - Phishing without Failure and Frustration
- Larry Pesce - I don't give one IoTA: Introducing the Internet of Things Attack Methodology.
- Anti-Forensics AF int0x80 (of Dual Core)
- Deral Heiland, Matthew Kienow - Managed to Mangled: Exploitation of Enterprise Network Management Systems
- Joey Maresca - Finding Your Balance
- EvilMog - Hashcat State of the Union
- egypt - New Shiny in Metasploit Framework
- Hacking with Ham Radios: What I have learned in 25 years of being a ham.
- John Strand - Penetration Testing Trends
- Ellen Hartstack and Matthew Sullivan - Garbage in, garbage out
- Casey Smith - Establishing A Foothold With JavaScript
- Jesika McEvoy - Overcoming Imposter Syndrome (even if you're totally faking it)
- FuzzyNop - Embrace the Bogeyman: Tactical Fear Mongering for Those Who Penetrate
- Eric Conrad - Introducing DeepBlueCLI, a PowerShell module for hunt teaming via Windows event logs
- Dr. Jared DeMott & Mr. Josh Stroschein - Using Binary Ninja for Modern Malware Analysis
- Scott M - Fuzzing basics...how to break software
- Craig Bowser - Security v. Ops: Bridging the Gap
- Chris "Lopi" Spehn - From Gaming to Hacking The Planet
- Jason Blanchard - How to Social Engineer your way into your dream job!
- Lee Holmes - Attackers Hunt Sysadmins - It's time to fight back
- Adam Compton, Austin Lane - Scripting Myself Out of a Job - Automating the Penetration Test with APT2
- Branden Miller - Hacking for Homeschoolers: STEM projects for under $20
- Scott Sutherland - SQL Server Hacking on Scale using PowerShell
- Brian Marks, Andrea Sancho Silgado - Dive into DSL: Digital Response Analysis with Elasticsearch
- David Schwartzberg and Chris Sistrunk - Make STEHM Great Again
- Charles L. Yost - Python 3: It's Time
- Philip Martin - DNS in Enterprise IR: Collection, Analysis and Response
- Drew Branch - Need More Sleep? REST Could Help
- Bill Gardner - Making Our Profession More Professional
- Abe Miller - How are tickets paid for?
- Bill Sempf - Breaking Android Apps for Fun and Profit
- Amanda Berlin & Lee Brotherston - So You've Inherited a Security Department, Now What?
- Brandon Young - Reverse engineering all the malware... and why you should stop.
- Nathan Magniez - Body Hacking 101 (or a Healthy Lifestyle for Security Pros)
- Jimmy Byrd - Security Automation in your Continuous Integration Pipeline
- Chad M. Dewey - Cruise Ship Security OR Hacking the High Seas
- Karl Fosaaen - Attacking ADFS Endpoints with PowerShell
- Stephen Hilt - The 90's called, they want their technology back
- Lee Neely - Web Security for Dummies
- Kirk Hayes - I Love myBFF (Brute Force Framework)
- Cameron Craig, Keith Conway - Nobody gets fired by choosing IBM... but maybe they should.
- Mirovengi - Shackles, Shims, and Shivs - Understanding Bypass Techniques
- Jared Haight - Introducing PowerShell into your Arsenal with PS>Attack
- James Jardine - Recharging Penetration Testing to Maximize Value
- hypervista - Poetically Opaque (or other John Updike Quotes)
- David Boyd - Hack Yourself: Building A Pentesting Lab
- Ronnie Flathers - Abusing Linux Trust Relationships: Authentication Back Alleys and Forgotten Features
- Salvador Mendoza - Samsung Pay: Tokenized Numbers, Flaws and Issues
- Andrew Krug & Alex McCormack - Hardening AWS Environments and Automating Incident Response
- Andrew Plunkett - Yara Rule QA: Can't I Write Code to do This for Me?
- Anthony Kasza - Java RATS: Not even your Macs are safe
- Beau Bullock, Derek Banks, Joff Thyer - The Advanced Persistent Pentester (All Your Networks Are Belong 2 Us)
- Russell Butturini - Fire Away! Sinking the Next Gen Firewall
- Daniel Bohannon - Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e`Tec`T 'Th'+'em'
- Dav Wilson - Mobile Device Forensics
- Casey Cammilleri & Hans Lakhan - Hashview, a new tool aimed to improve your password cracking endeavors.
- Brian Fehrman - Hardware Hacking the Easyware Way
- Matthew Lichtenberger - PacketKO - Data Exfiltration Via Port Knocking
- Jamie Murdock - Ransomware: An overview
- Ben Stillman - MariaDB: Lock it down like a chastity belt
- Aaron Guzman - IoT Defenses - Software, Hardware, Wireless and Cloud
- Adam Cammack & Brent Cook - Static PIE: How and Why
- Braden Hollembaek, Adam Pond - Finding a Weak Link: Attacking Windows OEM Kernel Drivers
- Dan Bougere - The Beginner's Guide to ICS: How to Never Sleep Soundly Again
Ya tenemos disponibles los vídeos (faltan algunos) de una de las conferencias que más ha crecido en los últimos años: Derbycon. La edición de este año 2016 acaba de terminar y nos ha dejado un gran número de charlas interesantes:
RootedCON Valencia 2016
- September 7, 2016
- cybercaronte
El congreso RootedValencia se celebrará los días 9 y 10 de Septiembre. El viernes día 9 tendrá lugar un training llamado "RB16-1 Hacking ético" (pulsa aquí para más información) y durante el sábado día 10 se celebrarán conferencias desde las 10am hasta las 8pm. Nosotros estaremos por allí el sábado para saludar a viejos y nuevos amigos, disfrutar de las conferencias y además tomar algunas cervezas ;)
Lugar: ADEIT - Fundación Universidad - Plaza Virgen de la Paz, 3, 46001 Valencia (España)
Pwntools 3.0
- August 23, 2016
- tuxotron
pwnlib.adb
— Android Debug Bridgepwnlib.asm
— Assembler functionspwnlib.atexception
— Callbacks on unhandled exceptionpwnlib.atexit
— Replacement for atexitpwnlib.constants
— Easy access to header file constantspwnlib.context
— Setting runtime variablespwnlib.dynelf
— Resolving remote functions using leakspwnlib.encoders
— Encoding Shellcodepwnlib.elf
— Working with ELF binariespwnlib.exception
— Pwnlib exceptionspwnlib.fmtstr
— Format string bug exploitation toolspwnlib.gdb
— Working with GDBpwnlib.log
— Logging stuffpwnlib.memleak
— Helper class for leaking memorypwnlib.replacements
— Replacements for various functionspwnlib.rop
— Return Oriented Programmingpwnlib.rop.rop
— Return Oriented Programmingpwnlib.rop.srop
— Sigreturn Oriented Programmingpwnlib.runner
— Running Shellcodepwnlib.shellcraft
— Shellcode generationpwnlib.shellcraft.amd64
— Shellcode for AMD64pwnlib.shellcraft.arm
— Shellcode for ARMpwnlib.shellcraft.common
— Shellcode common to all architecturepwnlib.shellcraft.i386
— Shellcode for Intel 80386pwnlib.regsort
— Register sortingpwnlib.shellcraft.thumb
— Shellcode for Thumb Modepwnlib.term
— Terminal handlingpwnlib.timeout
— Timeout handlingpwnlib.tubes
— Talking to the World!pwnlib.tubes.process
— Processespwnlib.tubes.serialtube
— Serial Portspwnlib.tubes.sock
— Socketspwnlib.tubes.ssh
— SSHpwnlib.ui
— Functions for user interactionpwnlib.useragents
— A database of useragent stringspwnlib.util.crc
— Calculating CRC-sumspwnlib.util.cyclic
— Generation of unique sequencespwnlib.util.fiddling
— Utilities bit fiddlingpwnlib.util.hashes
— Hashing functionspwnlib.util.iters
— Extension of standard moduleitertools
pwnlib.util.lists
— Operations on listspwnlib.util.misc
— We could not fit it any other placepwnlib.util.net
— Networking interfacespwnlib.util.packing
— Packing and unpacking of stringspwnlib.util.proc
— Working with/proc/
pwnlib.util.safeeval
— Safe evaluation of python codepwnlib.util.web
— Utilities for working with the WWW
Los que seáis asiduos a participar en CTFs ya probablemente conozcáis el proyecto Pwntools.
Éste es un conjunto de utilidades, librerías o framework pensado para hacerte la vida más fácil a la hora de escribir tus exploits o soluciones en los dichos CTFs. Está escrito en Python y provee de una gran cantidad de módulos específicos para cada tarea:
$ apt-get install python2.7 python2.7-dev python-pip $ pip install --upgrade pwntoolsAunque Pwntools está desarrollado en sobre Ubuntu, debería de funcionar sin problemas en otras distribuciones Linux e incluso Mac OS X.
Para que te hagas una idea de como usar este framework, aquí tienes un repositorio con algunas soluciones a varios retos usando el mismo. El código fuente del proyecto se encuentra en Github y su documentación aquí.
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec